Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2019-9514
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T21:54:44.511Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "VU#605641", "tags": [ "third-party-advisory", "x_transferred" ], "url": "https://kb.cert.org/vuls/id/605641/" }, { "tags": [ "x_transferred" ], "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "name": "[trafficserver-dev] 20190813 Apache Traffic Server is vulnerable to various HTTP/2 attacks", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.apache.org/thread.html/bde52309316ae798186d783a5e29f4ad1527f61c9219a289d0eee0a7%40%3Cdev.trafficserver.apache.org%3E" }, { "name": "[trafficserver-users] 20190813 Apache Traffic Server is vulnerable to various HTTP/2 attacks", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.apache.org/thread.html/392108390cef48af647a2e47b7fd5380e050e35ae8d1aa2030254c04%40%3Cusers.trafficserver.apache.org%3E" }, { "name": "[trafficserver-announce] 20190813 Apache Traffic Server is vulnerable to various HTTP/2 attacks", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.apache.org/thread.html/ad3d01e767199c1aed8033bb6b3f5bf98c011c7c536f07a5d34b3c19%40%3Cannounce.trafficserver.apache.org%3E" }, { "name": "20190814 APPLE-SA-2019-08-13-5 SwiftNIO HTTP/2 1.5.0", "tags": [ "mailing-list", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/Aug/24" }, { "name": "20190816 APPLE-SA-2019-08-13-5 SwiftNIO HTTP/2 1.5.0", "tags": [ "mailing-list", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2019/Aug/16" }, { "tags": [ "x_transferred" ], "url": "https://www.synology.com/security/advisory/Synology_SA_19_33" }, { "name": "20190819 [SECURITY] [DSA 4503-1] golang-1.11 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/Aug/31" }, { "name": "DSA-4503", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2019/dsa-4503" }, { "tags": [ "x_transferred" ], "url": "https://support.f5.com/csp/article/K01988340" }, { "name": "[oss-security] 20190819 [ANNOUNCE] Security release of Kubernetes v1.15.3, v1.14.6, v1.13.10 - CVE-2019-9512 and CVE-2019-9514", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2019/08/20/1" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20190823-0001/" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20190823-0004/" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20190823-0005/" }, { "name": "openSUSE-SU-2019:2000", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00076.html" }, { "name": "FEDORA-2019-5a6a7bc12c", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP/" }, { "name": "FEDORA-2019-6a2980de56", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC/" }, { "name": "20190825 [SECURITY] [DSA 4508-1] h2o security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/Aug/43" }, { "name": "DSA-4508", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2019/dsa-4508" }, { "name": "openSUSE-SU-2019:2056", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00002.html" }, { "name": "openSUSE-SU-2019:2072", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00011.html" }, { "name": "FEDORA-2019-55d101a740", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LYO6E3H34C346D2E443GLXK7OK6KIYIQ/" }, { "name": "FEDORA-2019-65db7ad6c7", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4BBP27PZGSY6OP6D26E5FW4GZKBFHNU7/" }, { "name": "openSUSE-SU-2019:2085", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00021.html" }, { "name": "RHSA-2019:2682", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:2682" }, { "name": "DSA-4520", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2019/dsa-4520" }, { "name": "RHSA-2019:2726", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:2726" }, { "name": "20190910 [SECURITY] [DSA 4520-1] trafficserver security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/Sep/18" }, { "name": "RHSA-2019:2594", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:2594" }, { "name": "openSUSE-SU-2019:2114", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html" }, { "name": "openSUSE-SU-2019:2115", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html" }, { "name": "RHSA-2019:2661", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:2661" }, { "tags": [ "x_transferred" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10296" }, { "name": "RHSA-2019:2690", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:2690" }, { "name": "RHSA-2019:2766", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:2766" }, { "name": "openSUSE-SU-2019:2130", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00038.html" }, { "name": "RHSA-2019:2796", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:2796" }, { "name": "RHSA-2019:2861", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:2861" }, { "name": "RHSA-2019:2925", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:2925" }, { "name": "RHSA-2019:2939", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:2939" }, { "name": "RHSA-2019:2955", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:2955" }, { "name": "RHSA-2019:2966", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:2966" }, { "tags": [ "x_transferred" ], "url": "https://support.f5.com/csp/article/K01988340?utm_source=f5support\u0026amp%3Butm_medium=RSS" }, { "name": "RHSA-2019:3131", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:3131" }, { "name": "RHSA-2019:2769", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:2769" }, { "name": "RHSA-2019:3245", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:3245" }, { "name": "RHSA-2019:3265", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:3265" }, { "name": "RHSA-2019:3892", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:3892" }, { "name": "RHSA-2019:3906", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:3906" }, { "name": "RHSA-2019:4018", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:4018" }, { "name": "RHSA-2019:4019", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:4019" }, { "name": "RHSA-2019:4021", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:4021" }, { "name": "RHSA-2019:4020", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:4020" }, { "name": "RHSA-2019:4045", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:4045" }, { "name": "RHSA-2019:4042", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:4042" }, { "name": "RHSA-2019:4040", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:4040" }, { "name": "RHSA-2019:4041", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:4041" }, { "name": "RHSA-2019:4269", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:4269" }, { "name": "RHSA-2019:4273", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:4273" }, { "name": "RHSA-2019:4352", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:4352" }, { "name": "RHSA-2020:0406", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2020:0406" }, { "name": "RHSA-2020:0727", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2020:0727" }, { "name": "USN-4308-1", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://usn.ubuntu.com/4308-1/" }, { "name": "DSA-4669", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2020/dsa-4669" }, { "name": "[debian-lts-announce] 20201208 [SECURITY] [DLA 2485-1] golang-golang-x-net-dev security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00011.html" }, { "name": "[oss-security] 20231018 Re: CVE-2023-44487: HTTP/2 Rapid Reset attack against many implementations", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2023/10/18/8" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "credits": [ { "lang": "en", "value": "Thanks to Jonathan Looney of Netflix for reporting this vulnerability." } ], "descriptions": [ { "lang": "en", "value": "Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400 Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-19T02:06:30.169190", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "name": "VU#605641", "tags": [ "third-party-advisory" ], "url": "https://kb.cert.org/vuls/id/605641/" }, { "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "name": "[trafficserver-dev] 20190813 Apache Traffic Server is vulnerable to various HTTP/2 attacks", "tags": [ "mailing-list" ], "url": "https://lists.apache.org/thread.html/bde52309316ae798186d783a5e29f4ad1527f61c9219a289d0eee0a7%40%3Cdev.trafficserver.apache.org%3E" }, { "name": "[trafficserver-users] 20190813 Apache Traffic Server is vulnerable to various HTTP/2 attacks", "tags": [ "mailing-list" ], "url": "https://lists.apache.org/thread.html/392108390cef48af647a2e47b7fd5380e050e35ae8d1aa2030254c04%40%3Cusers.trafficserver.apache.org%3E" }, { "name": "[trafficserver-announce] 20190813 Apache Traffic Server is vulnerable to various HTTP/2 attacks", "tags": [ "mailing-list" ], "url": "https://lists.apache.org/thread.html/ad3d01e767199c1aed8033bb6b3f5bf98c011c7c536f07a5d34b3c19%40%3Cannounce.trafficserver.apache.org%3E" }, { "name": "20190814 APPLE-SA-2019-08-13-5 SwiftNIO HTTP/2 1.5.0", "tags": [ "mailing-list" ], "url": "https://seclists.org/bugtraq/2019/Aug/24" }, { "name": "20190816 APPLE-SA-2019-08-13-5 SwiftNIO HTTP/2 1.5.0", "tags": [ "mailing-list" ], "url": "http://seclists.org/fulldisclosure/2019/Aug/16" }, { "url": "https://www.synology.com/security/advisory/Synology_SA_19_33" }, { "name": "20190819 [SECURITY] [DSA 4503-1] golang-1.11 security update", "tags": [ "mailing-list" ], "url": "https://seclists.org/bugtraq/2019/Aug/31" }, { "name": "DSA-4503", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2019/dsa-4503" }, { "url": "https://support.f5.com/csp/article/K01988340" }, { "name": "[oss-security] 20190819 [ANNOUNCE] Security release of Kubernetes v1.15.3, v1.14.6, v1.13.10 - CVE-2019-9512 and CVE-2019-9514", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2019/08/20/1" }, { "url": "https://security.netapp.com/advisory/ntap-20190823-0001/" }, { "url": "https://security.netapp.com/advisory/ntap-20190823-0004/" }, { "url": "https://security.netapp.com/advisory/ntap-20190823-0005/" }, { "name": "openSUSE-SU-2019:2000", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00076.html" }, { "name": "FEDORA-2019-5a6a7bc12c", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP/" }, { "name": "FEDORA-2019-6a2980de56", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC/" }, { "name": "20190825 [SECURITY] [DSA 4508-1] h2o security update", "tags": [ "mailing-list" ], "url": "https://seclists.org/bugtraq/2019/Aug/43" }, { "name": "DSA-4508", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2019/dsa-4508" }, { "name": "openSUSE-SU-2019:2056", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00002.html" }, { "name": "openSUSE-SU-2019:2072", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00011.html" }, { "name": "FEDORA-2019-55d101a740", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LYO6E3H34C346D2E443GLXK7OK6KIYIQ/" }, { "name": "FEDORA-2019-65db7ad6c7", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4BBP27PZGSY6OP6D26E5FW4GZKBFHNU7/" }, { "name": "openSUSE-SU-2019:2085", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00021.html" }, { "name": "RHSA-2019:2682", "tags": [ "vendor-advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2682" }, { "name": "DSA-4520", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2019/dsa-4520" }, { "name": "RHSA-2019:2726", "tags": [ "vendor-advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2726" }, { "name": "20190910 [SECURITY] [DSA 4520-1] trafficserver security update", "tags": [ "mailing-list" ], "url": "https://seclists.org/bugtraq/2019/Sep/18" }, { "name": "RHSA-2019:2594", "tags": [ "vendor-advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2594" }, { "name": "openSUSE-SU-2019:2114", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html" }, { "name": "openSUSE-SU-2019:2115", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html" }, { "name": "RHSA-2019:2661", "tags": [ "vendor-advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2661" }, { "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10296" }, { "name": "RHSA-2019:2690", "tags": [ "vendor-advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2690" }, { "name": "RHSA-2019:2766", "tags": [ "vendor-advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2766" }, { "name": "openSUSE-SU-2019:2130", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00038.html" }, { "name": "RHSA-2019:2796", "tags": [ "vendor-advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2796" }, { "name": "RHSA-2019:2861", "tags": [ "vendor-advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2861" }, { "name": "RHSA-2019:2925", "tags": [ "vendor-advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2925" }, { "name": "RHSA-2019:2939", "tags": [ "vendor-advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2939" }, { "name": "RHSA-2019:2955", "tags": [ "vendor-advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2955" }, { "name": "RHSA-2019:2966", "tags": [ "vendor-advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2966" }, { "url": "https://support.f5.com/csp/article/K01988340?utm_source=f5support\u0026amp%3Butm_medium=RSS" }, { "name": "RHSA-2019:3131", "tags": [ "vendor-advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3131" }, { "name": "RHSA-2019:2769", "tags": [ "vendor-advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2769" }, { "name": "RHSA-2019:3245", "tags": [ "vendor-advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3245" }, { "name": "RHSA-2019:3265", "tags": [ "vendor-advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3265" }, { "name": "RHSA-2019:3892", "tags": [ "vendor-advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3892" }, { "name": "RHSA-2019:3906", "tags": [ "vendor-advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3906" }, { "name": "RHSA-2019:4018", "tags": [ "vendor-advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:4018" }, { "name": "RHSA-2019:4019", "tags": [ "vendor-advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:4019" }, { "name": "RHSA-2019:4021", "tags": [ "vendor-advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:4021" }, { "name": "RHSA-2019:4020", "tags": [ "vendor-advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:4020" }, { "name": "RHSA-2019:4045", "tags": [ "vendor-advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:4045" }, { "name": "RHSA-2019:4042", "tags": [ "vendor-advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:4042" }, { "name": "RHSA-2019:4040", "tags": [ "vendor-advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:4040" }, { "name": "RHSA-2019:4041", "tags": [ "vendor-advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:4041" }, { "name": "RHSA-2019:4269", "tags": [ "vendor-advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:4269" }, { "name": "RHSA-2019:4273", "tags": [ "vendor-advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:4273" }, { "name": "RHSA-2019:4352", "tags": [ "vendor-advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:4352" }, { "name": "RHSA-2020:0406", "tags": [ "vendor-advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0406" }, { "name": "RHSA-2020:0727", "tags": [ "vendor-advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0727" }, { "name": "USN-4308-1", "tags": [ "vendor-advisory" ], "url": "https://usn.ubuntu.com/4308-1/" }, { "name": "DSA-4669", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2020/dsa-4669" }, { "name": "[debian-lts-announce] 20201208 [SECURITY] [DLA 2485-1] golang-golang-x-net-dev security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00011.html" }, { "name": "[oss-security] 20231018 Re: CVE-2023-44487: HTTP/2 Rapid Reset attack against many implementations", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2023/10/18/8" } ], "source": { "discovery": "UNKNOWN" }, "title": "Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service", "x_generator": { "engine": "Vulnogram 0.0.7" } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2019-9514", "datePublished": "2019-08-13T00:00:00", "dateReserved": "2019-03-01T00:00:00", "dateUpdated": "2024-08-04T21:54:44.511Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2019-9514\",\"sourceIdentifier\":\"[email protected]\",\"published\":\"2019-08-13T21:15:12.443\",\"lastModified\":\"2025-01-14T19:29:55.853\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.\"},{\"lang\":\"es\",\"value\":\"Algunas implementaciones de HTTP / 2 son vulnerables a una inundaci\u00f3n de reinicio, lo que puede conducir a una denegaci\u00f3n de servicio. El atacante abre una serie de secuencias y env\u00eda una solicitud no v\u00e1lida sobre cada secuencia que deber\u00eda solicitar una secuencia de tramas RST_STREAM del par. Dependiendo de c\u00f3mo el igual pone en cola las tramas RST_STREAM, esto puede consumir un exceso de memoria, CPU o ambos.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"[email protected]\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV30\":[{\"source\":\"[email protected]\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"[email protected]\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":7.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"[email protected]\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-400\"}]},{\"source\":\"[email protected]\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-770\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:swiftnio:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0.0\",\"versionEndIncluding\":\"1.4.0\",\"matchCriteriaId\":\"93988E60-006B-434D-AB16-1FA1D2FEBC2A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.12\",\"matchCriteriaId\":\"1D294D56-E784-4DA8-9C2C-BC5A05C92C0C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.04\",\"matchCriteriaId\":\"65B1D2F6-BC1F-47AF-B4E6-4B50986AC622\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.0.0\",\"versionEndIncluding\":\"6.2.3\",\"matchCriteriaId\":\"603BF43B-FC99-4039-A3C0-467F015A32FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.0.0\",\"versionEndIncluding\":\"7.1.6\",\"matchCriteriaId\":\"07BB02CE-D4F2-459C-B0C6-FF78BF7996AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.0.0\",\"versionEndIncluding\":\"8.0.3\",\"matchCriteriaId\":\"D875E0D8-D109-4F7F-A4C4-9EDD66CEE74E\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD783B0C-9246-47D9-A937-6144FE8BFF0F\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:synology:skynas:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C997777-BE79-4F77-90D7-E1A71D474D88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:synology:diskstation_manager:6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9685B12-824F-42AD-B87C-6E7A78BB7FA5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:synology:vs960hd_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D0C5120-B961-440F-B454-584BC54B549C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:synology:vs960hd:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CCBDFF9-AF42-4681-879B-CF789EBAD130\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D100F7CE-FC64-4CC6-852A-6136D72DA419\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97A4B8DF-58DA-4AB6-A1F9-331B36409BA3\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1E78106-58E6-4D59-990F-75DA575BFAD9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B620311B-34A3-48A6-82DF-6F078D7A4493\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:developer_tools:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60937D60-6B78-400F-8D30-7FCF328659A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_core_services:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2466282-51AB-478D-9FF4-FA524265ED2E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0952BA1A-5DF9-400F-B01F-C3A398A8A2D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B157A2D-3422-4224-82D9-15AB3B989075\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openshift_container_platform:3.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"309CB6F8-F178-454C-BE97-787F78647C28\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openshift_container_platform:3.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DBCD38F-BBE8-488C-A8C3-5782F191D915\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F87326E-0B56-4356-A889-73D026DB1D4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openshift_container_platform:4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"064E7BDD-4EF0-4A0D-A38D-8C75BAFEDCEF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openshift_container_platform:4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C85A84D-A70F-4B02-9E5D-CD9660ABF048\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openshift_service_mesh:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"732F14CE-7994-4DD2-A28B-AE9E79826C01\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openstack:14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB7F358B-5E56-41AB-BB8A-23D3CB7A248B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1987BDA-0113-4603-B9BE-76647EB043F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:single_sign-on:7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E939A0E0-3437-459E-9FAB-FE42811B1D32\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D7EE4B6-A6EC-4B9B-91DF-79615796673F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4CFF558-3C47-480D-A2F0-BABF26042943\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92BC9265-6959-4D37-BE5E-8C45E98992F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51EF4996-72F4-4FA4-814F-F5991E7A8318\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"825ECE2D-E232-46E0-A047-074B34DB1E97\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:graalvm:19.2.0:*:*:*:enterprise:*:*:*\",\"matchCriteriaId\":\"C120C2F1-D50D-49CC-8E96-207ACCA49674\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.7.2.0\",\"versionEndExcluding\":\"7.7.2.24\",\"matchCriteriaId\":\"765E9856-2748-4A8B-91F5-A4DB3C8C547A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.8.2.0\",\"versionEndExcluding\":\"7.8.2.13\",\"matchCriteriaId\":\"EE6E66B1-3291-4E8E-93D6-30E9FDCF983E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.1.0\",\"versionEndExcluding\":\"8.2.0\",\"matchCriteriaId\":\"227104AD-396D-4ADD-87C7-C4CD5583DA04\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:cloud_insights:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26FCA75B-4282-4E0F-95B4-640A82C8E91C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:trident:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D9A34F5-AC03-4098-A37D-AD50727DDB11\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.6.1\",\"versionEndExcluding\":\"11.6.5.1\",\"matchCriteriaId\":\"99C12BA5-2D81-4973-824E-2BDDA70F2485\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.0\",\"versionEndExcluding\":\"12.1.5.1\",\"matchCriteriaId\":\"591EA641-C103-4575-97D5-15D41B20E581\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.1.0\",\"versionEndExcluding\":\"13.1.3.2\",\"matchCriteriaId\":\"A3F3F4FD-8BB9-468D-B50F-B25B17AF0F3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.0.0\",\"versionEndExcluding\":\"14.0.1.1\",\"matchCriteriaId\":\"63529AEA-8B74-4CA1-BADF-14514D243DC5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.1.0\",\"versionEndExcluding\":\"14.1.2.1\",\"matchCriteriaId\":\"A4D87CCF-ED81-4B69-9D02-D5B79082E0FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"15.0.0\",\"versionEndExcluding\":\"15.0.1.1\",\"matchCriteriaId\":\"5485F6ED-F324-4124-9116-79E70909C5F7\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*\",\"versionStartIncluding\":\"8.0.0\",\"versionEndIncluding\":\"8.8.1\",\"matchCriteriaId\":\"74FB695D-2C76-47AB-988E-5629D2E695E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*\",\"versionStartIncluding\":\"8.9.0\",\"versionEndExcluding\":\"8.16.1\",\"matchCriteriaId\":\"CFC0252A-DF1D-4CF4-B450-27267227B599\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*\",\"versionStartIncluding\":\"10.0.0\",\"versionEndIncluding\":\"10.12.0\",\"matchCriteriaId\":\"25A3180B-21AF-4010-9DAB-41ADFD2D8031\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*\",\"versionStartIncluding\":\"10.13.0\",\"versionEndExcluding\":\"10.16.3\",\"matchCriteriaId\":\"2EC65858-FF7B-4171-82EA-80942D426F40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*\",\"versionStartIncluding\":\"12.0.0\",\"versionEndExcluding\":\"12.8.1\",\"matchCriteriaId\":\"F522C500-AA33-4029-865F-F27FB00A354E\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00076.html\",\"source\":\"[email protected]\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00002.html\",\"source\":\"[email protected]\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00011.html\",\"source\":\"[email protected]\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00021.html\",\"source\":\"[email protected]\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html\",\"source\":\"[email protected]\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html\",\"source\":\"[email protected]\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00038.html\",\"source\":\"[email protected]\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2019/Aug/16\",\"source\":\"[email protected]\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2019/08/20/1\",\"source\":\"[email protected]\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2023/10/18/8\",\"source\":\"[email protected]\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2594\",\"source\":\"[email protected]\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2661\",\"source\":\"[email protected]\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2682\",\"source\":\"[email protected]\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2690\",\"source\":\"[email protected]\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2726\",\"source\":\"[email protected]\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2766\",\"source\":\"[email protected]\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2769\",\"source\":\"[email protected]\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2796\",\"source\":\"[email protected]\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2861\",\"source\":\"[email protected]\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2925\",\"source\":\"[email protected]\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2939\",\"source\":\"[email protected]\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2955\",\"source\":\"[email protected]\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2966\",\"source\":\"[email protected]\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:3131\",\"source\":\"[email protected]\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:3245\",\"source\":\"[email protected]\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:3265\",\"source\":\"[email protected]\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:3892\",\"source\":\"[email protected]\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:3906\",\"source\":\"[email protected]\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:4018\",\"source\":\"[email protected]\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:4019\",\"source\":\"[email protected]\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:4020\",\"source\":\"[email protected]\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:4021\",\"source\":\"[email protected]\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:4040\",\"source\":\"[email protected]\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:4041\",\"source\":\"[email protected]\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:4042\",\"source\":\"[email protected]\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:4045\",\"source\":\"[email protected]\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:4269\",\"source\":\"[email protected]\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:4273\",\"source\":\"[email protected]\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:4352\",\"source\":\"[email protected]\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2020:0406\",\"source\":\"[email protected]\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2020:0727\",\"source\":\"[email protected]\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md\",\"source\":\"[email protected]\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://kb.cert.org/vuls/id/605641/\",\"source\":\"[email protected]\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10296\",\"source\":\"[email protected]\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.apache.org/thread.html/392108390cef48af647a2e47b7fd5380e050e35ae8d1aa2030254c04%40%3Cusers.trafficserver.apache.org%3E\",\"source\":\"[email protected]\"},{\"url\":\"https://lists.apache.org/thread.html/ad3d01e767199c1aed8033bb6b3f5bf98c011c7c536f07a5d34b3c19%40%3Cannounce.trafficserver.apache.org%3E\",\"source\":\"[email protected]\"},{\"url\":\"https://lists.apache.org/thread.html/bde52309316ae798186d783a5e29f4ad1527f61c9219a289d0eee0a7%40%3Cdev.trafficserver.apache.org%3E\",\"source\":\"[email protected]\"},{\"url\":\"https://lists.debian.org/debian-lts-announce/2020/12/msg00011.html\",\"source\":\"[email protected]\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4BBP27PZGSY6OP6D26E5FW4GZKBFHNU7/\",\"source\":\"[email protected]\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC/\",\"source\":\"[email protected]\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP/\",\"source\":\"[email protected]\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LYO6E3H34C346D2E443GLXK7OK6KIYIQ/\",\"source\":\"[email protected]\"},{\"url\":\"https://seclists.org/bugtraq/2019/Aug/24\",\"source\":\"[email protected]\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://seclists.org/bugtraq/2019/Aug/31\",\"source\":\"[email protected]\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://seclists.org/bugtraq/2019/Aug/43\",\"source\":\"[email protected]\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://seclists.org/bugtraq/2019/Sep/18\",\"source\":\"[email protected]\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20190823-0001/\",\"source\":\"[email protected]\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20190823-0004/\",\"source\":\"[email protected]\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20190823-0005/\",\"source\":\"[email protected]\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.f5.com/csp/article/K01988340\",\"source\":\"[email protected]\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.f5.com/csp/article/K01988340?utm_source=f5support\u0026amp%3Butm_medium=RSS\",\"source\":\"[email protected]\"},{\"url\":\"https://usn.ubuntu.com/4308-1/\",\"source\":\"[email protected]\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2019/dsa-4503\",\"source\":\"[email protected]\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2019/dsa-4508\",\"source\":\"[email protected]\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2019/dsa-4520\",\"source\":\"[email protected]\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2020/dsa-4669\",\"source\":\"[email protected]\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.synology.com/security/advisory/Synology_SA_19_33\",\"source\":\"[email protected]\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00076.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00002.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00011.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00021.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00038.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2019/Aug/16\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2019/08/20/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2023/10/18/8\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2594\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2661\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2682\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2690\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2726\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2766\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2769\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2796\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2861\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2925\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2939\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2955\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2966\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:3131\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:3245\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:3265\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:3892\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:3906\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:4018\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:4019\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:4020\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:4021\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:4040\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:4041\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:4042\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:4045\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:4269\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:4273\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:4352\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2020:0406\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2020:0727\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://kb.cert.org/vuls/id/605641/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10296\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.apache.org/thread.html/392108390cef48af647a2e47b7fd5380e050e35ae8d1aa2030254c04%40%3Cusers.trafficserver.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/ad3d01e767199c1aed8033bb6b3f5bf98c011c7c536f07a5d34b3c19%40%3Cannounce.trafficserver.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/bde52309316ae798186d783a5e29f4ad1527f61c9219a289d0eee0a7%40%3Cdev.trafficserver.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.debian.org/debian-lts-announce/2020/12/msg00011.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4BBP27PZGSY6OP6D26E5FW4GZKBFHNU7/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LYO6E3H34C346D2E443GLXK7OK6KIYIQ/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://seclists.org/bugtraq/2019/Aug/24\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://seclists.org/bugtraq/2019/Aug/31\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://seclists.org/bugtraq/2019/Aug/43\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://seclists.org/bugtraq/2019/Sep/18\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20190823-0001/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20190823-0004/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20190823-0005/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.f5.com/csp/article/K01988340\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.f5.com/csp/article/K01988340?utm_source=f5support\u0026amp%3Butm_medium=RSS\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://usn.ubuntu.com/4308-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2019/dsa-4503\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2019/dsa-4508\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2019/dsa-4520\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2020/dsa-4669\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.synology.com/security/advisory/Synology_SA_19_33\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
RHSA-2019:3245
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for apb, containernetworking-plugins, and golang-github-prometheus-promu is now available for Red Hat OpenShift Container Platform 4.2.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThe following packages have been rebuilt with an updated version of golang: apb (2.0.3), containernetworking-plugins (0.8.1), and golang-github-prometheus-promu (0.5.0). \n\nSecurity Fix(es):\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:3245", "url": "https://access.redhat.com/errata/RHSA-2019:3245" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3245.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 4.2 security update", "tracking": { "current_release_date": "2025-03-15T19:43:49+00:00", "generator": { "date": "2025-03-15T19:43:49+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.1" } }, "id": "RHSA-2019:3245", "initial_release_date": "2019-10-29T17:43:03+00:00", "revision_history": [ { "date": "2019-10-29T17:43:03+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-10-29T17:43:03+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-03-15T19:43:49+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.2", "product": { "name": "Red Hat OpenShift Container Platform 4.2", "product_id": "7Server-RH7-RHOSE-4.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.2::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "apb-0:2.0.3-2.el7.x86_64", "product": { "name": "apb-0:2.0.3-2.el7.x86_64", "product_id": "apb-0:2.0.3-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.8.1-4.el7.x86_64", "product": { "name": "containernetworking-plugins-0:0.8.1-4.el7.x86_64", "product_id": "containernetworking-plugins-0:0.8.1-4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64", "product": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64", "product_id": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64", "product": { "name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64", "product_id": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64", "product": { "name": "prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64", "product_id": "prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "apb-0:2.0.3-2.el7.src", "product": { "name": "apb-0:2.0.3-2.el7.src", "product_id": "apb-0:2.0.3-2.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.8.1-4.el7.src", "product": { "name": "containernetworking-plugins-0:0.8.1-4.el7.src", "product_id": "containernetworking-plugins-0:0.8.1-4.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.src", "product": { "name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.src", "product_id": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "apb-container-scripts-0:2.0.3-2.el7.noarch", "product": { "name": "apb-container-scripts-0:2.0.3-2.el7.noarch", "product_id": "apb-container-scripts-0:2.0.3-2.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } }, { "category": "product_version", "name": "apb-devel-0:2.0.3-2.el7.noarch", "product": { "name": "apb-devel-0:2.0.3-2.el7.noarch", "product_id": "apb-devel-0:2.0.3-2.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "apb-0:2.0.3-2.el7.src as a component of Red Hat OpenShift Container Platform 4.2", "product_id": "7Server-RH7-RHOSE-4.2:apb-0:2.0.3-2.el7.src" }, "product_reference": "apb-0:2.0.3-2.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.2" }, { "category": "default_component_of", "full_product_name": { "name": "apb-0:2.0.3-2.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.2", "product_id": "7Server-RH7-RHOSE-4.2:apb-0:2.0.3-2.el7.x86_64" }, "product_reference": "apb-0:2.0.3-2.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.2" }, { "category": "default_component_of", "full_product_name": { "name": "apb-container-scripts-0:2.0.3-2.el7.noarch as a component of Red Hat OpenShift Container Platform 4.2", "product_id": "7Server-RH7-RHOSE-4.2:apb-container-scripts-0:2.0.3-2.el7.noarch" }, "product_reference": "apb-container-scripts-0:2.0.3-2.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.2" }, { "category": "default_component_of", "full_product_name": { "name": "apb-devel-0:2.0.3-2.el7.noarch as a component of Red Hat OpenShift Container Platform 4.2", "product_id": "7Server-RH7-RHOSE-4.2:apb-devel-0:2.0.3-2.el7.noarch" }, "product_reference": "apb-devel-0:2.0.3-2.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.2" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.1-4.el7.src as a component of Red Hat OpenShift Container Platform 4.2", "product_id": "7Server-RH7-RHOSE-4.2:containernetworking-plugins-0:0.8.1-4.el7.src" }, "product_reference": "containernetworking-plugins-0:0.8.1-4.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.2" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.1-4.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.2", "product_id": "7Server-RH7-RHOSE-4.2:containernetworking-plugins-0:0.8.1-4.el7.x86_64" }, "product_reference": "containernetworking-plugins-0:0.8.1-4.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.2" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.2", "product_id": "7Server-RH7-RHOSE-4.2:containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.2" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.src as a component of Red Hat OpenShift Container Platform 4.2", "product_id": "7Server-RH7-RHOSE-4.2:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.src" }, "product_reference": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.2" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.2", "product_id": "7Server-RH7-RHOSE-4.2:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64" }, "product_reference": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.2" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.2", "product_id": "7Server-RH7-RHOSE-4.2:prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64" }, "product_reference": "prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.2" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.2:apb-0:2.0.3-2.el7.src", "7Server-RH7-RHOSE-4.2:apb-0:2.0.3-2.el7.x86_64", "7Server-RH7-RHOSE-4.2:apb-container-scripts-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.2:apb-devel-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.2:containernetworking-plugins-0:0.8.1-4.el7.src", "7Server-RH7-RHOSE-4.2:containernetworking-plugins-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.2:containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.2:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.src", "7Server-RH7-RHOSE-4.2:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64", "7Server-RH7-RHOSE-4.2:prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-29T17:43:03+00:00", "details": "For OpenShift Container Platform 4.2 see the following documentation, which\nwill be updated shortly for release 4.2.1, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.2/release_notes/ocp-4-2-release-notes.html", "product_ids": [ "7Server-RH7-RHOSE-4.2:apb-0:2.0.3-2.el7.src", "7Server-RH7-RHOSE-4.2:apb-0:2.0.3-2.el7.x86_64", "7Server-RH7-RHOSE-4.2:apb-container-scripts-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.2:apb-devel-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.2:containernetworking-plugins-0:0.8.1-4.el7.src", "7Server-RH7-RHOSE-4.2:containernetworking-plugins-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.2:containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.2:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.src", "7Server-RH7-RHOSE-4.2:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64", "7Server-RH7-RHOSE-4.2:prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3245" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-4.2:apb-0:2.0.3-2.el7.src", "7Server-RH7-RHOSE-4.2:apb-0:2.0.3-2.el7.x86_64", "7Server-RH7-RHOSE-4.2:apb-container-scripts-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.2:apb-devel-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.2:containernetworking-plugins-0:0.8.1-4.el7.src", "7Server-RH7-RHOSE-4.2:containernetworking-plugins-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.2:containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.2:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.src", "7Server-RH7-RHOSE-4.2:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64", "7Server-RH7-RHOSE-4.2:prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.2:apb-0:2.0.3-2.el7.src", "7Server-RH7-RHOSE-4.2:apb-0:2.0.3-2.el7.x86_64", "7Server-RH7-RHOSE-4.2:apb-container-scripts-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.2:apb-devel-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.2:containernetworking-plugins-0:0.8.1-4.el7.src", "7Server-RH7-RHOSE-4.2:containernetworking-plugins-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.2:containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.2:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.src", "7Server-RH7-RHOSE-4.2:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64", "7Server-RH7-RHOSE-4.2:prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-29T17:43:03+00:00", "details": "For OpenShift Container Platform 4.2 see the following documentation, which\nwill be updated shortly for release 4.2.1, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.2/release_notes/ocp-4-2-release-notes.html", "product_ids": [ "7Server-RH7-RHOSE-4.2:apb-0:2.0.3-2.el7.src", "7Server-RH7-RHOSE-4.2:apb-0:2.0.3-2.el7.x86_64", "7Server-RH7-RHOSE-4.2:apb-container-scripts-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.2:apb-devel-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.2:containernetworking-plugins-0:0.8.1-4.el7.src", "7Server-RH7-RHOSE-4.2:containernetworking-plugins-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.2:containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.2:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.src", "7Server-RH7-RHOSE-4.2:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64", "7Server-RH7-RHOSE-4.2:prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3245" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-4.2:apb-0:2.0.3-2.el7.src", "7Server-RH7-RHOSE-4.2:apb-0:2.0.3-2.el7.x86_64", "7Server-RH7-RHOSE-4.2:apb-container-scripts-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.2:apb-devel-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.2:containernetworking-plugins-0:0.8.1-4.el7.src", "7Server-RH7-RHOSE-4.2:containernetworking-plugins-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.2:containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.2:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.src", "7Server-RH7-RHOSE-4.2:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64", "7Server-RH7-RHOSE-4.2:prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" } ] }
rhsa-2019_4041
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "New Red Hat Single Sign-On 7.3.5 packages are now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Single Sign-On 7.3 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications.\n\nThis release of Red Hat Single Sign-On 7.3.5 on RHEL 7 serves as a replacement for Red Hat Single Sign-On 7.3.4, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* keycloak: Service accounts reset password flow not using placeholder.org domain anymore (CVE-2019-14837)\n\n* undertow: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* undertow: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* undertow: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default (CVE-2019-14838)\n\n* wildfly: wildfly-security-manager: security manager authorization bypass (CVE-2019-14843)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:4041", "url": "https://access.redhat.com/errata/RHSA-2019:4041" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.3/", "url": "https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.3/" }, { "category": "external", "summary": "1730227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1730227" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1751227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751227" }, { "category": "external", "summary": "1752980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752980" }, { "category": "external", "summary": "KEYCLOAK-11816", "url": "https://issues.redhat.com/browse/KEYCLOAK-11816" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_4041.json" } ], "title": "Red Hat Security Advisory: Red Hat Single Sign-On 7.3.5 security update on RHEL 7", "tracking": { "current_release_date": "2024-11-15T04:13:44+00:00", "generator": { "date": "2024-11-15T04:13:44+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2019:4041", "initial_release_date": "2019-12-02T17:04:03+00:00", "revision_history": [ { "date": "2019-12-02T17:04:03+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-12-02T17:04:03+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T04:13:44+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Single Sign-On 7.3 for RHEL 7 Server", "product": { "name": "Red Hat Single Sign-On 7.3 for RHEL 7 Server", "product_id": "7Server-RHSSO-7.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:red_hat_single_sign_on:7::el7" } } } ], "category": "product_family", "name": "Red Hat Single Sign-On" }, { "branches": [ { "category": "product_version", "name": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "product": { "name": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "product_id": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7sso?arch=noarch" } } }, { "category": "product_version", "name": "rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "product": { "name": "rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "product_id": "rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7sso?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "product": { "name": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "product_id": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7sso?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch as a component of Red Hat Single Sign-On 7.3 for RHEL 7 Server", "product_id": "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" }, "product_reference": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "relates_to_product_reference": "7Server-RHSSO-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src as a component of Red Hat Single Sign-On 7.3 for RHEL 7 Server", "product_id": "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src" }, "product_reference": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "relates_to_product_reference": "7Server-RHSSO-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch as a component of Red Hat Single Sign-On 7.3 for RHEL 7 Server", "product_id": "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" }, "product_reference": "rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "relates_to_product_reference": "7Server-RHSSO-7.3" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:04:03+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4041" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:04:03+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4041" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:04:03+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4041" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "Vadim Ashikhman" ] } ], "cve": "CVE-2019-14837", "cwe": { "id": "CWE-547", "name": "Use of Hard-coded, Security-relevant Constants" }, "discovery_date": "2019-07-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1730227" } ], "notes": [ { "category": "description", "text": "A flaw was found in Keycloak. The use of an open hard-coded domain can allow an unauthorized login by setting up a mail server and resetting the user credentials, enabling information disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak: keycloak uses hardcoded open dummy domain for new accounts enabling information disclosure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14837" }, { "category": "external", "summary": "RHBZ#1730227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1730227" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14837", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14837" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14837", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14837" } ], "release_date": "2019-12-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:04:03+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4041" }, { "category": "workaround", "details": "It is not a very straight forward workaround but it is possible to mitigate this by manually editing the default Email ID ([email protected]) to some valid email ID ([email protected]) in the USER_ENTITY table in the RHSSO database used.", "product_ids": [ "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "keycloak: keycloak uses hardcoded open dummy domain for new accounts enabling information disclosure" }, { "acknowledgments": [ { "names": [ "F\u00e1bio Magalh\u00e3es de Andrade" ], "organization": "Sonda Ativas" }, { "names": [ "Juliano de Castro Santos", "Leonard Lunardi" ], "organization": "UnimedBH" } ], "cve": "CVE-2019-14838", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2019-08-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1751227" } ], "notes": [ { "category": "description", "text": "It was found that Wildfly users had default user permissions set incorrectly. A malicious user could use this flaw to access unauthorized controls for the application server.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14838" }, { "category": "external", "summary": "RHBZ#1751227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751227" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14838", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14838" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14838", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14838" }, { "category": "external", "summary": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14838", "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14838" } ], "release_date": "2019-10-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:04:03+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4041" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default" }, { "cve": "CVE-2019-14843", "cwe": { "id": "CWE-592", "name": "CWE-592" }, "discovery_date": "2019-09-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1752980" } ], "notes": [ { "category": "description", "text": "A flaw was found in Wildfly Security Manager, running under JDK 11 or 8, that authorized requests for any requester. This flaw could be used by a malicious app deployed on the app server to access unauthorized information and possibly conduct further attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-security-manager: security manager authorization bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14843" }, { "category": "external", "summary": "RHBZ#1752980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752980" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14843", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14843" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14843", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14843" } ], "release_date": "2019-09-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:04:03+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4041" }, { "category": "workaround", "details": "This flaw only affects the Security Manager running under JDK 11 or 8. To mitigate exposure to this flaw, do not run under those JDK versions.", "product_ids": [ "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "wildfly-security-manager: security manager authorization bypass" } ] }
rhsa-2019:2726
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the go-toolset:rhel8 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.\n\nSecurity Fix(es):\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Failure trying to conntect to image registry using TLS when buildah is compiled with FIPS mode (BZ#1743169)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:2726", "url": "https://access.redhat.com/errata/RHSA-2019:2726" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1743169", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1743169" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2726.json" } ], "title": "Red Hat Security Advisory: go-toolset:rhel8 security and bug fix update", "tracking": { "current_release_date": "2025-03-15T19:43:57+00:00", "generator": { "date": "2025-03-15T19:43:57+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.1" } }, "id": "RHSA-2019:2726", "initial_release_date": "2019-09-12T12:29:22+00:00", "revision_history": [ { "date": "2019-09-12T12:29:22+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-09-12T12:29:22+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-03-15T19:43:57+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "go-toolset:rhel8:8000120190828225436:14bc675c", "product": { "name": "go-toolset:rhel8:8000120190828225436:14bc675c", "product_id": "go-toolset:rhel8:8000120190828225436:14bc675c", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/go-toolset@rhel8:8000120190828225436:14bc675c" } } }, { "category": "product_version", "name": "golang-docs-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "product": { "name": "golang-docs-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "product_id": "golang-docs-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.1%2B4087%2Bd8180914?arch=noarch" } } }, { "category": "product_version", "name": "golang-misc-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "product": { "name": "golang-misc-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "product_id": "golang-misc-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.1%2B4087%2Bd8180914?arch=noarch" } } }, { "category": "product_version", "name": "golang-src-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "product": { "name": "golang-src-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "product_id": "golang-src-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.1%2B4087%2Bd8180914?arch=noarch" } } }, { "category": "product_version", "name": "golang-tests-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "product": { "name": "golang-tests-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "product_id": "golang-tests-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.1%2B4087%2Bd8180914?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.src", "product": { "name": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.src", "product_id": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.1%2B4087%2Bd8180914?arch=src" } } }, { "category": "product_version", "name": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.src", "product": { "name": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.src", "product_id": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.1%2B4087%2Bd8180914?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.x86_64", "product": { "name": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.x86_64", "product_id": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.1%2B4087%2Bd8180914?arch=x86_64" } } }, { "category": "product_version", "name": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "product": { "name": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "product_id": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.1%2B4087%2Bd8180914?arch=x86_64" } } }, { "category": "product_version", "name": "golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "product": { "name": "golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "product_id": "golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.1%2B4087%2Bd8180914?arch=x86_64" } } }, { "category": "product_version", "name": "golang-race-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "product": { "name": "golang-race-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "product_id": "golang-race-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.1%2B4087%2Bd8180914?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.s390x", "product": { "name": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.s390x", "product_id": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.1%2B4087%2Bd8180914?arch=s390x" } } }, { "category": "product_version", "name": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x", "product": { "name": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x", "product_id": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.1%2B4087%2Bd8180914?arch=s390x" } } }, { "category": "product_version", "name": "golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x", "product": { "name": "golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x", "product_id": "golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.1%2B4087%2Bd8180914?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.ppc64le", "product": { "name": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.ppc64le", "product_id": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.1%2B4087%2Bd8180914?arch=ppc64le" } } }, { "category": "product_version", "name": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le", "product": { "name": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le", "product_id": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.1%2B4087%2Bd8180914?arch=ppc64le" } } }, { "category": "product_version", "name": "golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le", "product": { "name": "golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le", "product_id": "golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.1%2B4087%2Bd8180914?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.aarch64", "product": { "name": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.aarch64", "product_id": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.1%2B4087%2Bd8180914?arch=aarch64" } } }, { "category": "product_version", "name": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64", "product": { "name": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64", "product_id": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.1%2B4087%2Bd8180914?arch=aarch64" } } }, { "category": "product_version", "name": "golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64", "product": { "name": "golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64", "product_id": "golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.1%2B4087%2Bd8180914?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "go-toolset:rhel8:8000120190828225436:14bc675c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c" }, "product_reference": "go-toolset:rhel8:8000120190828225436:14bc675c", "relates_to_product_reference": "AppStream-8.0.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.aarch64 as a component of go-toolset:rhel8:8000120190828225436:14bc675c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.aarch64" }, "product_reference": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.aarch64", "relates_to_product_reference": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.ppc64le as a component of go-toolset:rhel8:8000120190828225436:14bc675c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.ppc64le" }, "product_reference": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.ppc64le", "relates_to_product_reference": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.s390x as a component of go-toolset:rhel8:8000120190828225436:14bc675c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.s390x" }, "product_reference": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.s390x", "relates_to_product_reference": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.src as a component of go-toolset:rhel8:8000120190828225436:14bc675c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.src" }, "product_reference": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.src", "relates_to_product_reference": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.x86_64 as a component of go-toolset:rhel8:8000120190828225436:14bc675c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.x86_64" }, "product_reference": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.x86_64", "relates_to_product_reference": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64 as a component of go-toolset:rhel8:8000120190828225436:14bc675c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64" }, "product_reference": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64", "relates_to_product_reference": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le as a component of go-toolset:rhel8:8000120190828225436:14bc675c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le" }, "product_reference": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le", "relates_to_product_reference": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x as a component of go-toolset:rhel8:8000120190828225436:14bc675c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x" }, "product_reference": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x", "relates_to_product_reference": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.src as a component of go-toolset:rhel8:8000120190828225436:14bc675c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.src" }, "product_reference": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.src", "relates_to_product_reference": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64 as a component of go-toolset:rhel8:8000120190828225436:14bc675c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64" }, "product_reference": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "relates_to_product_reference": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64 as a component of go-toolset:rhel8:8000120190828225436:14bc675c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64" }, "product_reference": "golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64", "relates_to_product_reference": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le as a component of go-toolset:rhel8:8000120190828225436:14bc675c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le" }, "product_reference": "golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le", "relates_to_product_reference": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x as a component of go-toolset:rhel8:8000120190828225436:14bc675c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x" }, "product_reference": "golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x", "relates_to_product_reference": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64 as a component of go-toolset:rhel8:8000120190828225436:14bc675c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64" }, "product_reference": "golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "relates_to_product_reference": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c" }, { "category": "default_component_of", "full_product_name": { "name": "golang-docs-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch as a component of go-toolset:rhel8:8000120190828225436:14bc675c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-docs-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch" }, "product_reference": "golang-docs-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "relates_to_product_reference": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c" }, { "category": "default_component_of", "full_product_name": { "name": "golang-misc-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch as a component of go-toolset:rhel8:8000120190828225436:14bc675c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-misc-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch" }, "product_reference": "golang-misc-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "relates_to_product_reference": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c" }, { "category": "default_component_of", "full_product_name": { "name": "golang-race-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64 as a component of go-toolset:rhel8:8000120190828225436:14bc675c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-race-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64" }, "product_reference": "golang-race-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "relates_to_product_reference": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c" }, { "category": "default_component_of", "full_product_name": { "name": "golang-src-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch as a component of go-toolset:rhel8:8000120190828225436:14bc675c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-src-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch" }, "product_reference": "golang-src-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "relates_to_product_reference": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c" }, { "category": "default_component_of", "full_product_name": { "name": "golang-tests-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch as a component of go-toolset:rhel8:8000120190828225436:14bc675c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-tests-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch" }, "product_reference": "golang-tests-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "relates_to_product_reference": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.aarch64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.ppc64le", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.s390x", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.src", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.src", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-docs-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-misc-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-race-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-src-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-tests-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-12T12:29:22+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.aarch64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.ppc64le", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.s390x", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.src", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.src", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-docs-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-misc-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-race-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-src-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-tests-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2726" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.aarch64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.ppc64le", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.s390x", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.src", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.src", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-docs-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-misc-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-race-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-src-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-tests-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.aarch64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.ppc64le", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.s390x", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.src", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.src", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-docs-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-misc-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-race-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-src-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-tests-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-12T12:29:22+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.aarch64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.ppc64le", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.s390x", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.src", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.src", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-docs-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-misc-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-race-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-src-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-tests-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2726" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.aarch64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.ppc64le", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.s390x", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.src", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.src", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-docs-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-misc-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-race-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-src-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-tests-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" } ] }
rhsa-2019:3245
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for apb, containernetworking-plugins, and golang-github-prometheus-promu is now available for Red Hat OpenShift Container Platform 4.2.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThe following packages have been rebuilt with an updated version of golang: apb (2.0.3), containernetworking-plugins (0.8.1), and golang-github-prometheus-promu (0.5.0). \n\nSecurity Fix(es):\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:3245", "url": "https://access.redhat.com/errata/RHSA-2019:3245" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3245.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 4.2 security update", "tracking": { "current_release_date": "2025-03-15T19:43:49+00:00", "generator": { "date": "2025-03-15T19:43:49+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.1" } }, "id": "RHSA-2019:3245", "initial_release_date": "2019-10-29T17:43:03+00:00", "revision_history": [ { "date": "2019-10-29T17:43:03+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-10-29T17:43:03+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-03-15T19:43:49+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.2", "product": { "name": "Red Hat OpenShift Container Platform 4.2", "product_id": "7Server-RH7-RHOSE-4.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.2::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "apb-0:2.0.3-2.el7.x86_64", "product": { "name": "apb-0:2.0.3-2.el7.x86_64", "product_id": "apb-0:2.0.3-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.8.1-4.el7.x86_64", "product": { "name": "containernetworking-plugins-0:0.8.1-4.el7.x86_64", "product_id": "containernetworking-plugins-0:0.8.1-4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64", "product": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64", "product_id": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64", "product": { "name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64", "product_id": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64", "product": { "name": "prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64", "product_id": "prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "apb-0:2.0.3-2.el7.src", "product": { "name": "apb-0:2.0.3-2.el7.src", "product_id": "apb-0:2.0.3-2.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.8.1-4.el7.src", "product": { "name": "containernetworking-plugins-0:0.8.1-4.el7.src", "product_id": "containernetworking-plugins-0:0.8.1-4.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.src", "product": { "name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.src", "product_id": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "apb-container-scripts-0:2.0.3-2.el7.noarch", "product": { "name": "apb-container-scripts-0:2.0.3-2.el7.noarch", "product_id": "apb-container-scripts-0:2.0.3-2.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } }, { "category": "product_version", "name": "apb-devel-0:2.0.3-2.el7.noarch", "product": { "name": "apb-devel-0:2.0.3-2.el7.noarch", "product_id": "apb-devel-0:2.0.3-2.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "apb-0:2.0.3-2.el7.src as a component of Red Hat OpenShift Container Platform 4.2", "product_id": "7Server-RH7-RHOSE-4.2:apb-0:2.0.3-2.el7.src" }, "product_reference": "apb-0:2.0.3-2.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.2" }, { "category": "default_component_of", "full_product_name": { "name": "apb-0:2.0.3-2.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.2", "product_id": "7Server-RH7-RHOSE-4.2:apb-0:2.0.3-2.el7.x86_64" }, "product_reference": "apb-0:2.0.3-2.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.2" }, { "category": "default_component_of", "full_product_name": { "name": "apb-container-scripts-0:2.0.3-2.el7.noarch as a component of Red Hat OpenShift Container Platform 4.2", "product_id": "7Server-RH7-RHOSE-4.2:apb-container-scripts-0:2.0.3-2.el7.noarch" }, "product_reference": "apb-container-scripts-0:2.0.3-2.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.2" }, { "category": "default_component_of", "full_product_name": { "name": "apb-devel-0:2.0.3-2.el7.noarch as a component of Red Hat OpenShift Container Platform 4.2", "product_id": "7Server-RH7-RHOSE-4.2:apb-devel-0:2.0.3-2.el7.noarch" }, "product_reference": "apb-devel-0:2.0.3-2.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.2" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.1-4.el7.src as a component of Red Hat OpenShift Container Platform 4.2", "product_id": "7Server-RH7-RHOSE-4.2:containernetworking-plugins-0:0.8.1-4.el7.src" }, "product_reference": "containernetworking-plugins-0:0.8.1-4.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.2" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.1-4.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.2", "product_id": "7Server-RH7-RHOSE-4.2:containernetworking-plugins-0:0.8.1-4.el7.x86_64" }, "product_reference": "containernetworking-plugins-0:0.8.1-4.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.2" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.2", "product_id": "7Server-RH7-RHOSE-4.2:containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.2" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.src as a component of Red Hat OpenShift Container Platform 4.2", "product_id": "7Server-RH7-RHOSE-4.2:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.src" }, "product_reference": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.2" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.2", "product_id": "7Server-RH7-RHOSE-4.2:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64" }, "product_reference": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.2" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.2", "product_id": "7Server-RH7-RHOSE-4.2:prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64" }, "product_reference": "prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.2" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.2:apb-0:2.0.3-2.el7.src", "7Server-RH7-RHOSE-4.2:apb-0:2.0.3-2.el7.x86_64", "7Server-RH7-RHOSE-4.2:apb-container-scripts-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.2:apb-devel-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.2:containernetworking-plugins-0:0.8.1-4.el7.src", "7Server-RH7-RHOSE-4.2:containernetworking-plugins-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.2:containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.2:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.src", "7Server-RH7-RHOSE-4.2:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64", "7Server-RH7-RHOSE-4.2:prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-29T17:43:03+00:00", "details": "For OpenShift Container Platform 4.2 see the following documentation, which\nwill be updated shortly for release 4.2.1, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.2/release_notes/ocp-4-2-release-notes.html", "product_ids": [ "7Server-RH7-RHOSE-4.2:apb-0:2.0.3-2.el7.src", "7Server-RH7-RHOSE-4.2:apb-0:2.0.3-2.el7.x86_64", "7Server-RH7-RHOSE-4.2:apb-container-scripts-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.2:apb-devel-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.2:containernetworking-plugins-0:0.8.1-4.el7.src", "7Server-RH7-RHOSE-4.2:containernetworking-plugins-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.2:containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.2:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.src", "7Server-RH7-RHOSE-4.2:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64", "7Server-RH7-RHOSE-4.2:prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3245" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-4.2:apb-0:2.0.3-2.el7.src", "7Server-RH7-RHOSE-4.2:apb-0:2.0.3-2.el7.x86_64", "7Server-RH7-RHOSE-4.2:apb-container-scripts-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.2:apb-devel-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.2:containernetworking-plugins-0:0.8.1-4.el7.src", "7Server-RH7-RHOSE-4.2:containernetworking-plugins-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.2:containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.2:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.src", "7Server-RH7-RHOSE-4.2:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64", "7Server-RH7-RHOSE-4.2:prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.2:apb-0:2.0.3-2.el7.src", "7Server-RH7-RHOSE-4.2:apb-0:2.0.3-2.el7.x86_64", "7Server-RH7-RHOSE-4.2:apb-container-scripts-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.2:apb-devel-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.2:containernetworking-plugins-0:0.8.1-4.el7.src", "7Server-RH7-RHOSE-4.2:containernetworking-plugins-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.2:containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.2:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.src", "7Server-RH7-RHOSE-4.2:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64", "7Server-RH7-RHOSE-4.2:prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-29T17:43:03+00:00", "details": "For OpenShift Container Platform 4.2 see the following documentation, which\nwill be updated shortly for release 4.2.1, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.2/release_notes/ocp-4-2-release-notes.html", "product_ids": [ "7Server-RH7-RHOSE-4.2:apb-0:2.0.3-2.el7.src", "7Server-RH7-RHOSE-4.2:apb-0:2.0.3-2.el7.x86_64", "7Server-RH7-RHOSE-4.2:apb-container-scripts-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.2:apb-devel-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.2:containernetworking-plugins-0:0.8.1-4.el7.src", "7Server-RH7-RHOSE-4.2:containernetworking-plugins-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.2:containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.2:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.src", "7Server-RH7-RHOSE-4.2:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64", "7Server-RH7-RHOSE-4.2:prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3245" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-4.2:apb-0:2.0.3-2.el7.src", "7Server-RH7-RHOSE-4.2:apb-0:2.0.3-2.el7.x86_64", "7Server-RH7-RHOSE-4.2:apb-container-scripts-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.2:apb-devel-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.2:containernetworking-plugins-0:0.8.1-4.el7.src", "7Server-RH7-RHOSE-4.2:containernetworking-plugins-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.2:containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.2:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.src", "7Server-RH7-RHOSE-4.2:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64", "7Server-RH7-RHOSE-4.2:prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" } ] }
rhsa-2019:4019
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat JBoss Enterprise Application Platform 7.2 for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime.\n\nThis release of Red Hat JBoss Enterprise Application Platform 7.2.5 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.2.4, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.2.5 Release Notes for information about the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* undertow: HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511)\n\n* undertow: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* undertow: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* undertow: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default (CVE-2019-14838)\n\n* wildfly: wildfly-security-manager: security manager authorization bypass (CVE-2019-14843)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:4019", "url": "https://access.redhat.com/errata/RHSA-2019:4019" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/", "url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/html-single/installation_guide/", "url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/html-single/installation_guide/" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "1751227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751227" }, { "category": "external", "summary": "1752980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752980" }, { "category": "external", "summary": "JBEAP-17075", "url": "https://issues.redhat.com/browse/JBEAP-17075" }, { "category": "external", "summary": "JBEAP-17220", "url": "https://issues.redhat.com/browse/JBEAP-17220" }, { "category": "external", "summary": "JBEAP-17365", "url": "https://issues.redhat.com/browse/JBEAP-17365" }, { "category": "external", "summary": "JBEAP-17476", "url": "https://issues.redhat.com/browse/JBEAP-17476" }, { "category": "external", "summary": "JBEAP-17478", "url": "https://issues.redhat.com/browse/JBEAP-17478" }, { "category": "external", "summary": "JBEAP-17483", "url": "https://issues.redhat.com/browse/JBEAP-17483" }, { "category": "external", "summary": "JBEAP-17495", "url": "https://issues.redhat.com/browse/JBEAP-17495" }, { "category": "external", "summary": "JBEAP-17496", "url": "https://issues.redhat.com/browse/JBEAP-17496" }, { "category": "external", "summary": "JBEAP-17513", "url": "https://issues.redhat.com/browse/JBEAP-17513" }, { "category": "external", "summary": "JBEAP-17521", "url": "https://issues.redhat.com/browse/JBEAP-17521" }, { "category": "external", "summary": "JBEAP-17523", "url": "https://issues.redhat.com/browse/JBEAP-17523" }, { "category": "external", "summary": "JBEAP-17547", "url": "https://issues.redhat.com/browse/JBEAP-17547" }, { "category": "external", "summary": "JBEAP-17548", "url": "https://issues.redhat.com/browse/JBEAP-17548" }, { "category": "external", "summary": "JBEAP-17560", "url": "https://issues.redhat.com/browse/JBEAP-17560" }, { "category": "external", "summary": "JBEAP-17579", "url": "https://issues.redhat.com/browse/JBEAP-17579" }, { "category": "external", "summary": "JBEAP-17582", "url": "https://issues.redhat.com/browse/JBEAP-17582" }, { "category": "external", "summary": "JBEAP-17604", "url": "https://issues.redhat.com/browse/JBEAP-17604" }, { "category": "external", "summary": "JBEAP-17631", "url": "https://issues.redhat.com/browse/JBEAP-17631" }, { "category": "external", "summary": "JBEAP-17647", "url": "https://issues.redhat.com/browse/JBEAP-17647" }, { "category": "external", "summary": "JBEAP-17665", "url": "https://issues.redhat.com/browse/JBEAP-17665" }, { "category": "external", "summary": "JBEAP-17722", "url": "https://issues.redhat.com/browse/JBEAP-17722" }, { "category": "external", "summary": "JBEAP-17874", "url": "https://issues.redhat.com/browse/JBEAP-17874" }, { "category": "external", "summary": "JBEAP-17880", "url": "https://issues.redhat.com/browse/JBEAP-17880" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_4019.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update", "tracking": { "current_release_date": "2025-03-19T15:00:36+00:00", "generator": { "date": "2025-03-19T15:00:36+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.1" } }, "id": "RHSA-2019:4019", "initial_release_date": "2019-11-26T20:01:24+00:00", "revision_history": [ { "date": "2019-11-26T20:01:24+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-11-26T20:01:24+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-03-19T15:00:36+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product": { "name": "Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el7" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" }, { "branches": [ { "category": "product_version", "name": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "product": { "name": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "product_id": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00005.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "product": { "name": "eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "product_id": "eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00005.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "product_id": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "product_id": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "product_id": "eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "product_id": "eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "product_id": "eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "product": { "name": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "product_id": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00003.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "product": { "name": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "product_id": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00002.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product": { "name": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product_id": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product": { "name": "eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product_id": "eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product": { "name": "eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product_id": "eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product": { "name": "eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product_id": "eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product": { "name": "eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product_id": "eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product": { "name": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product_id": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product": { "name": "eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product_id": "eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product": { "name": "eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product_id": "eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product": { "name": "eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product_id": "eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product": { "name": "eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product_id": "eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "product_id": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "product_id": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "product": { "name": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "product_id": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00002.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "product": { "name": "eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "product_id": "eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00002.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "product": { "name": "eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "product_id": "eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00002.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "product": { "name": "eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "product_id": "eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00002.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "product": { "name": "eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "product_id": "eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00002.1.el7eap?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "product": { "name": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "product_id": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00005.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "product": { "name": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "product_id": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "product": { "name": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "product_id": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "product": { "name": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "product_id": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00003.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "product": { "name": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "product_id": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00002.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "product": { "name": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "product_id": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "product": { "name": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "product_id": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "product": { "name": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "product_id": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "product": { "name": "eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "product_id": "eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "product": { "name": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "product_id": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "product": { "name": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "product_id": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "product": { "name": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "product_id": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "product": { "name": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "product_id": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "product": { "name": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "product_id": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "product": { "name": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "product_id": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "product": { "name": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "product_id": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "product": { "name": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "product_id": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "product": { "name": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "product_id": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src", "product": { "name": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src", "product_id": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "product": { "name": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "product_id": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "product": { "name": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "product_id": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "product": { "name": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "product_id": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00002.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "product": { "name": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "product_id": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "product": { "name": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "product_id": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=x86_64" } } }, { "category": "product_version", "name": "eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "product": { "name": "eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "product_id": "eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src" }, "product_reference": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch" }, "product_reference": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src" }, "product_reference": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch" }, "product_reference": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src" }, "product_reference": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src" }, "product_reference": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src" }, "product_reference": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src" }, "product_reference": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src" }, "product_reference": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src" }, "product_reference": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src" }, "product_reference": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src" }, "product_reference": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src" }, "product_reference": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch" }, "product_reference": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src" }, "product_reference": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch" }, "product_reference": "eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch" }, "product_reference": "eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch" }, "product_reference": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src" }, "product_reference": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch" }, "product_reference": "eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch" }, "product_reference": "eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch" }, "product_reference": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src" }, "product_reference": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch" }, "product_reference": "eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch" }, "product_reference": "eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch" }, "product_reference": "eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch" }, "product_reference": "eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch" }, "product_reference": "eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src" }, "product_reference": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src" }, "product_reference": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch" }, "product_reference": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src" }, "product_reference": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src" }, "product_reference": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src" }, "product_reference": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src" }, "product_reference": "eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch" }, "product_reference": "eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch" }, "product_reference": "eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch" }, "product_reference": "eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch" }, "product_reference": "eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src" }, "product_reference": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src" }, "product_reference": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64 as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64" }, "product_reference": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64 as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64" }, "product_reference": "eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" }, "product_reference": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-9511", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741860" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker can request a large amount of data by manipulating window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this queue can consume excess CPU, memory, or both, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: large amount of data requests leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "There are no mitigations available for nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "RHBZ#1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9511", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T20:01:24+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4019" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: large amount of data requests leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T20:01:24+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4019" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T20:01:24+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4019" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T20:01:24+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4019" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "F\u00e1bio Magalh\u00e3es de Andrade" ], "organization": "Sonda Ativas" }, { "names": [ "Juliano de Castro Santos", "Leonard Lunardi" ], "organization": "UnimedBH" } ], "cve": "CVE-2019-14838", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2019-08-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1751227" } ], "notes": [ { "category": "description", "text": "It was found that Wildfly users had default user permissions set incorrectly. A malicious user could use this flaw to access unauthorized controls for the application server.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14838" }, { "category": "external", "summary": "RHBZ#1751227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751227" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14838", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14838" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14838", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14838" }, { "category": "external", "summary": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14838", "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14838" } ], "release_date": "2019-10-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T20:01:24+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4019" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default" }, { "cve": "CVE-2019-14843", "cwe": { "id": "CWE-592", "name": "CWE-592" }, "discovery_date": "2019-09-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1752980" } ], "notes": [ { "category": "description", "text": "A flaw was found in Wildfly Security Manager, running under JDK 11 or 8, that authorized requests for any requester. This flaw could be used by a malicious app deployed on the app server to access unauthorized information and possibly conduct further attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-security-manager: security manager authorization bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14843" }, { "category": "external", "summary": "RHBZ#1752980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752980" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14843", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14843" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14843", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14843" } ], "release_date": "2019-09-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T20:01:24+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4019" }, { "category": "workaround", "details": "This flaw only affects the Security Manager running under JDK 11 or 8. To mitigate exposure to this flaw, do not run under those JDK versions.", "product_ids": [ "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "wildfly-security-manager: security manager authorization bypass" } ] }
rhsa-2020:0983
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "A minor version update (from 7.5 to 7.6) is now available for Red Hat Fuse. The purpose of this text-only errata is to inform you about the security issues fixed in this release.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.\n\n[2020-04-17 update: descriptions for mutiple components fixed for the same CVE added; also added golang CVE descriptions that were unintentionally ommitted from the original publication]", "title": "Topic" }, { "category": "general", "text": "This release of Red Hat Fuse 7.6.0 serves as a replacement for Red Hat Fuse 7.5, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* undertow: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* golang: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* undertow: HTTP/2: flood using PRIORITY frames results in excessive resource consumption (CVE-2019-9513)\n\n* undertow: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* golang: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* undertow: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* undertow: HTTP/2: 0-length headers lead to denial of service (CVE-2019-9516)\n\n* undertow: HTTP/2: request for large response leads to denial of service (CVE-2019-9517)\n\n* undertow: HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)\n\n* infinispan: invokeAccessibly method from ReflectionUtil class allows to invoke private methods (CVE-2019-10174)\n\n* spring-security-core: mishandling of user passwords allows logging in with a password of NULL (CVE-2019-11272)\n\n* jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution (CVE-2019-12384)\n\n* jackson-databind: default typing mishandling leading to remote code execution (CVE-2019-14379)\n\n* xmlrpc: Deserialization of server-side exception from faultCause in XMLRPC error response (CVE-2019-17570)\n\n* js-jquery: Cross-site scripting via cross-domain ajax requests (CVE-2015-9251)\n\n* logback: Serialization vulnerability in SocketServer and ServerSocketReceiver (CVE-2017-5929)\n\n* js-jquery: XSS in responses from cross-origin ajax requests (CVE-2017-16012)\n\n* apache-commons-compress: ZipArchiveInputStream.read() fails to identify correct EOF allowing for DoS via crafted zip (CVE-2018-11771)\n\n* spring-data-api: potential information disclosure through maliciously crafted example value in ExampleMatcher (CVE-2019-3802)\n\n* undertow: leak credentials to log files UndertowLogger.REQUEST_LOGGER.undertowRequestFailed (CVE-2019-3888)\n\n* shiro: Cookie padding oracle vulnerability with default configuration (CVE-2019-12422)\n\n* jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message. (CVE-2019-12814)\n\n* jackson-databind: Polymorphic typing issue related to logback/JNDI (CVE-2019-14439)\n\n* springframework: DoS Attack via Range Requests (CVE-2018-15756)\n\n* c3p0: loading XML configuration leads to denial of service (CVE-2019-5427)\n\n* undertow: Information leak in requests for directories without trailing slashes (CVE-2019-10184)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:0983", "url": "https://access.redhat.com/errata/RHSA-2020:0983" }, { "category": "external", "summary": "1730316", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1730316" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735741" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "1737517", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1737517" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=jboss.fuse\u0026version=7.6.0", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=jboss.fuse\u0026version=7.6.0" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "url": "https://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/" }, { "category": "external", "summary": "1399546", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1399546" }, { "category": "external", "summary": "1432858", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1432858" }, { "category": "external", "summary": "1591854", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1591854" }, { "category": "external", "summary": "1618573", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618573" }, { "category": "external", "summary": "1643043", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1643043" }, { "category": "external", "summary": "1693777", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1693777" }, { "category": "external", "summary": "1703469", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1703469" }, { "category": "external", "summary": "1709860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1709860" }, { "category": "external", "summary": "1713068", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1713068" }, { "category": "external", "summary": "1725795", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1725795" }, { "category": "external", "summary": "1725807", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1725807" }, { "category": "external", "summary": "1728993", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1728993" }, { "category": "external", "summary": "1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "external", "summary": "1752962", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752962" }, { "category": "external", "summary": "1774726", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774726" }, { "category": "external", "summary": "1775193", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775193" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_0983.json" } ], "title": "Red Hat Security Advisory: Red Hat Fuse 7.6.0 security update", "tracking": { "current_release_date": "2025-04-10T05:23:50+00:00", "generator": { "date": "2025-04-10T05:23:50+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.2" } }, "id": "RHSA-2020:0983", "initial_release_date": "2020-03-26T15:46:59+00:00", "revision_history": [ { "date": "2020-03-26T15:46:59+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-04-20T07:19:13+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-04-10T05:23:50+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Fuse 7.6.0", "product": { "name": "Red Hat Fuse 7.6.0", "product_id": "Red Hat Fuse 7.6.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_fuse:7" } } } ], "category": "product_family", "name": "Red Hat JBoss Fuse" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-9251", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2016-11-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1399546" } ], "notes": [ { "category": "description", "text": "jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.", "title": "Vulnerability description" }, { "category": "summary", "text": "jquery: Cross-site scripting via cross-domain ajax requests", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-9251" }, { "category": "external", "summary": "RHBZ#1399546", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1399546" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-9251", "url": "https://www.cve.org/CVERecord?id=CVE-2015-9251" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-9251", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-9251" } ], "release_date": "2015-06-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jquery: Cross-site scripting via cross-domain ajax requests" }, { "cve": "CVE-2017-5929", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2017-03-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1432858" } ], "notes": [ { "category": "description", "text": "It was found that logback is vulnerable to a deserialization issue. Logback can be configured to allow remote logging through SocketServer/ServerSocketReceiver interfaces that can accept untrusted serialized data. Authenticated attackers on the adjacent network can leverage this vulnerability to execute arbitrary code through deserialization of custom gadget chains.", "title": "Vulnerability description" }, { "category": "summary", "text": "logback: Serialization vulnerability in SocketServer and ServerSocketReceiver", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-5929" }, { "category": "external", "summary": "RHBZ#1432858", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1432858" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-5929", "url": "https://www.cve.org/CVERecord?id=CVE-2017-5929" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5929", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5929" } ], "release_date": "2017-02-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "logback: Serialization vulnerability in SocketServer and ServerSocketReceiver" }, { "cve": "CVE-2017-16012", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2018-06-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1591854" } ], "notes": [ { "category": "description", "text": "[REJECTED CVE] This CVE has been rejected. This candidate is a duplicate of CVE-2015-9251. Note: All CVE users should reference CVE-2015-9251 instead of this candidate.", "title": "Vulnerability description" }, { "category": "summary", "text": "js-jquery: XSS in responses from cross-origin ajax requests", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-16012" }, { "category": "external", "summary": "RHBZ#1591854", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1591854" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-16012", "url": "https://www.cve.org/CVERecord?id=CVE-2017-16012" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-16012", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16012" } ], "release_date": "2017-03-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "js-jquery: XSS in responses from cross-origin ajax requests" }, { "cve": "CVE-2018-11771", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2018-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618573" } ], "notes": [ { "category": "description", "text": "When reading a specially crafted ZIP archive, the read method of Apache Commons Compress 1.7 to 1.17\u0027s ZipArchiveInputStream can fail to return the correct EOF indication after the end of the stream has been reached. When combined with a java.io.InputStreamReader this can lead to an infinite stream, which can be used to mount a denial of service attack against services that use Compress\u0027 zip package.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-commons-compress: ZipArchiveInputStream.read() fails to identify correct EOF allowing for DoS via crafted zip", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-11771" }, { "category": "external", "summary": "RHBZ#1618573", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618573" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-11771", "url": "https://www.cve.org/CVERecord?id=CVE-2018-11771" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-11771", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11771" }, { "category": "external", "summary": "https://lists.apache.org/thread.html/b8da751fc0ca949534cdf2744111da6bb0349d2798fac94b0a50f330@%3Cannounce.apache.org%3E", "url": "https://lists.apache.org/thread.html/b8da751fc0ca949534cdf2744111da6bb0349d2798fac94b0a50f330@%3Cannounce.apache.org%3E" } ], "release_date": "2018-08-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "apache-commons-compress: ZipArchiveInputStream.read() fails to identify correct EOF allowing for DoS via crafted zip" }, { "cve": "CVE-2018-12536", "cwe": { "id": "CWE-209", "name": "Generation of Error Message Containing Sensitive Information" }, "discovery_date": "2018-06-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1597418" } ], "notes": [ { "category": "description", "text": "In Eclipse Jetty Server, all 9.x versions, on webapps deployed using default Error Handling, when an intentionally bad query arrives that doesn\u0027t match a dynamic url-pattern, and is eventually handled by the DefaultServlet\u0027s static file serving, the bad characters can trigger a java.nio.file.InvalidPathException which includes the full path to the base resource directory that the DefaultServlet and/or webapp is using. If this InvalidPathException is then handled by the default Error Handler, the InvalidPathException message is included in the error response, revealing the full server path to the requesting system.", "title": "Vulnerability description" }, { "category": "summary", "text": "jetty: full server path revealed when using the default Error Handling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-12536" }, { "category": "external", "summary": "RHBZ#1597418", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1597418" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-12536", "url": "https://www.cve.org/CVERecord?id=CVE-2018-12536" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12536", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12536" } ], "release_date": "2018-06-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" }, { "category": "workaround", "details": "Information disclosure occurs when java.nio.file.InvalidPathException occurs and is handled by the default Jetty error handler. To protect against this, a custom error handler can be configured for that particular error or for a larger set of errors according to the documentation link below. Red Hat Product Security advises that production deployments on Jetty use custom error handlers to limit the information disclosed and to ensure effective logging of error conditions.\n\nhttp://www.eclipse.org/jetty/documentation/current/custom-error-pages.html", "product_ids": [ "Red Hat Fuse 7.6.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "jetty: full server path revealed when using the default Error Handling" }, { "cve": "CVE-2018-15756", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2018-10-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1643043" } ], "notes": [ { "category": "description", "text": "Spring Framework, version 5.1, versions 5.0.x prior to 5.0.10, versions 4.3.x prior to 4.3.20, and older unsupported versions on the 4.2.x branch provide support for range requests when serving static resources through the ResourceHttpRequestHandler, or starting in 5.0 when an annotated controller returns an org.springframework.core.io.Resource. A malicious user (or attacker) can add a range header with a high number of ranges, or with wide ranges that overlap, or both, for a denial of service attack. This vulnerability affects applications that depend on either spring-webmvc or spring-webflux. Such applications must also have a registration for serving static resources (e.g. JS, CSS, images, and others), or have an annotated controller that returns an org.springframework.core.io.Resource. Spring Boot applications that depend on spring-boot-starter-web or spring-boot-starter-webflux are ready to serve static resources out of the box and are therefore vulnerable.", "title": "Vulnerability description" }, { "category": "summary", "text": "springframework: DoS Attack via Range Requests", "title": "Vulnerability summary" }, { "category": "other", "text": "The package rhvm-dependencies does not include the vulnerable spring-webmvc component.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-15756" }, { "category": "external", "summary": "RHBZ#1643043", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1643043" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-15756", "url": "https://www.cve.org/CVERecord?id=CVE-2018-15756" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-15756", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-15756" }, { "category": "external", "summary": "https://pivotal.io/security/cve-2018-15756", "url": "https://pivotal.io/security/cve-2018-15756" } ], "release_date": "2018-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "springframework: DoS Attack via Range Requests" }, { "cve": "CVE-2019-3802", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-06-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1730316" } ], "notes": [ { "category": "description", "text": "This affects Spring Data JPA in versions up to and including 2.1.6, 2.0.14 and 1.11.20. ExampleMatcher using ExampleMatcher.StringMatcher.STARTING, ExampleMatcher.StringMatcher.ENDING or ExampleMatcher.StringMatcher.CONTAINING could return more results than anticipated when a maliciously crafted example value is supplied.", "title": "Vulnerability description" }, { "category": "summary", "text": "spring-data-api: potential information disclosure through maliciously crafted example value in ExampleMatcher", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-3802" }, { "category": "external", "summary": "RHBZ#1730316", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1730316" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-3802", "url": "https://www.cve.org/CVERecord?id=CVE-2019-3802" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3802", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3802" }, { "category": "external", "summary": "https://pivotal.io/security/cve-2019-3802", "url": "https://pivotal.io/security/cve-2019-3802" } ], "release_date": "2019-07-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "spring-data-api: potential information disclosure through maliciously crafted example value in ExampleMatcher" }, { "acknowledgments": [ { "names": [ "Carter Kozak" ] } ], "cve": "CVE-2019-3888", "cwe": { "id": "CWE-532", "name": "Insertion of Sensitive Information into Log File" }, "discovery_date": "2019-03-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1693777" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Undertow web server before 2.0.21. An information exposure of plain text credentials through log files because Connectors.executeRootHandler:402 logs the HttpServerExchange object at ERROR level using UndertowLogger.REQUEST_LOGGER.undertowRequestFailed(t, exchange)", "title": "Vulnerability description" }, { "category": "summary", "text": "undertow: leak credentials to log files UndertowLogger.REQUEST_LOGGER.undertowRequestFailed", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-3888" }, { "category": "external", "summary": "RHBZ#1693777", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1693777" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-3888", "url": "https://www.cve.org/CVERecord?id=CVE-2019-3888" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3888", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3888" } ], "release_date": "2019-06-10T15:13:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "undertow: leak credentials to log files UndertowLogger.REQUEST_LOGGER.undertowRequestFailed" }, { "cve": "CVE-2019-5427", "cwe": { "id": "CWE-776", "name": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)" }, "discovery_date": "2019-04-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1709860" } ], "notes": [ { "category": "description", "text": "c3p0 version \u003c 0.9.5.4 may be exploited by a billion laughs attack when loading XML configuration due to missing protections against recursive entity expansion when loading configuration.", "title": "Vulnerability description" }, { "category": "summary", "text": "c3p0: loading XML configuration leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 is not vulnerable to this issue, because the candlepin component who uses the c3p0 jar never passes a XML configuration file to c3p0, even though it includes a vulnerable version of the latter. Since this issue requires a XML files to be loaded by c3p0, an exploitation path doesn\u0027t exist.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-5427" }, { "category": "external", "summary": "RHBZ#1709860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1709860" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-5427", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5427" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5427", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5427" } ], "release_date": "2019-04-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "c3p0: loading XML configuration leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9513", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735741" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker, using PRIORITY frames to flood the system, could cause excessive CPU usage and starvation of other clients. The largest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PRIORITY frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for packages nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9513" }, { "category": "external", "summary": "RHBZ#1735741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735741" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9513", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9513" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9513", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9513" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nghttp2.org/blog/2019/08/19/nghttp2-v1-39-2/", "url": "https://nghttp2.org/blog/2019/08/19/nghttp2-v1-39-2/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "Red Hat Fuse 7.6.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PRIORITY frames results in excessive resource consumption" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "cve": "CVE-2019-9516", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741864" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker, sending a stream of header with a 0-length header name and a 0-length header value, could cause some implementations to allocate memory for these headers and keep the allocations alive until the session dies. The can consume excess memory, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: 0-length headers lead to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9516" }, { "category": "external", "summary": "RHBZ#1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9516", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9516" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://github.com/nghttp2/nghttp2/issues/1382#", "url": "https://github.com/nghttp2/nghttp2/issues/1382#" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "Red Hat Fuse 7.6.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: 0-length headers lead to denial of service" }, { "cve": "CVE-2019-9517", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741868" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in HTTP/2. An attacker can open a HTTP/2 window so the peer can send without constraint. The TCP window remains closed so the peer cannot write the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the server\u0027s queue is setup, the responses can consume excess memory, CPU, or both, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: request for large response leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "The package httpd versions as shipped with Red Hat Enterprise Linux 5, 6 and 7 are not affected by this issue as HTTP/2 support is not provided.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9517" }, { "category": "external", "summary": "RHBZ#1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9517", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9517" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" }, { "category": "workaround", "details": "The httpd version shipped with Red Hat Enterprise Linux 8 provides HTTP/2 support through mod_http2 package. While mod_http2 package is not updated, users can disable HTTP/2 support as mitigation action by executing the following steps:\n\n1. Stop httpd service:\n$ systemctl stop httpd\n\n2. Remove http/2 protocol support from configuration files:\n$ sed -i \u0027s/\\(h2\\)\\|\\(h2c\\)//g\u0027 \u003chttpd_config_file\u003e\n\n3. Validate configuration files to make sure all syntax is valid:\n$ apachectl configtest\n\n4. Restart httpd service:\n$ systemctl start httpd", "product_ids": [ "Red Hat Fuse 7.6.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: request for large response leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9518", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735749" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using frames with an empty payload, a flood could occur that results in excessive CPU usage and starvation of other clients. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using empty frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9518" }, { "category": "external", "summary": "RHBZ#1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9518", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using empty frames results in excessive resource consumption" }, { "cve": "CVE-2019-10174", "cwe": { "id": "CWE-470", "name": "Use of Externally-Controlled Input to Select Classes or Code (\u0027Unsafe Reflection\u0027)" }, "discovery_date": "2018-10-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1703469" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Infinispan such that the invokeAccessibly method from the public class ReflectionUtil allows any application class to invoke private methods in any class with Infinispan\u0027s privileges. The attacker can use reflection to introduce new, malicious behavior into the application.", "title": "Vulnerability description" }, { "category": "summary", "text": "infinispan: invokeAccessibly method from ReflectionUtil class allows to invoke private methods", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform\u0027s OpenDaylight contains the vulnerable library. This library is a requirement of other dependencies (Karaf and Hibernate). Under supported deployments, the vulnerable functionality is not utilized. Based on this, no OpenDaylight versions will not be fixed.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10174" }, { "category": "external", "summary": "RHBZ#1703469", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1703469" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10174", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10174" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10174", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10174" } ], "release_date": "2019-11-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" }, { "category": "workaround", "details": "There is no known mitigation for this issue.", "product_ids": [ "Red Hat Fuse 7.6.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "infinispan: invokeAccessibly method from ReflectionUtil class allows to invoke private methods" }, { "acknowledgments": [ { "names": [ "Christian Schl\u00fcter" ], "organization": "Viada" } ], "cve": "CVE-2019-10184", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "discovery_date": "2019-03-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1713068" } ], "notes": [ { "category": "description", "text": "undertow before version 2.0.23.Final is vulnerable to an information leak issue. Web apps may have their directory structures predicted through requests without trailing slashes via the api.", "title": "Vulnerability description" }, { "category": "summary", "text": "undertow: Information leak in requests for directories without trailing slashes", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10184" }, { "category": "external", "summary": "RHBZ#1713068", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1713068" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10184", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10184" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10184", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10184" } ], "release_date": "2019-07-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "undertow: Information leak in requests for directories without trailing slashes" }, { "cve": "CVE-2019-10241", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2019-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1705924" } ], "notes": [ { "category": "description", "text": "In Eclipse Jetty version 9.2.26 and older, 9.3.25 and older, and 9.4.15 and older, the server is vulnerable to XSS conditions if a remote client USES a specially formatted URL against the DefaultServlet or ResourceHandler that is configured for showing a Listing of directory contents.", "title": "Vulnerability description" }, { "category": "summary", "text": "jetty: using specially formatted URL against DefaultServlet or ResourceHandler leads to XSS conditions", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of jetty which is embedded in the nutch package as shipped with Red Hat Satellite 5. The jetty server is not exposed, as such exploitation is difficult, Red Hat Product Security has rated this issue as having security impact of Low in the context of Red Hat Satellite 5. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10241" }, { "category": "external", "summary": "RHBZ#1705924", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705924" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10241", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10241" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10241", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10241" } ], "release_date": "2019-04-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jetty: using specially formatted URL against DefaultServlet or ResourceHandler leads to XSS conditions" }, { "cve": "CVE-2019-10247", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1705993" } ], "notes": [ { "category": "description", "text": "In Eclipse Jetty version 7.x, 8.x, 9.2.27 and older, 9.3.26 and older, and 9.4.16 and older, the server running on any OS and Jetty version combination will reveal the configured fully qualified directory base resource location on the output of the 404 error for not finding a Context that matches the requested path. The default server behavior on jetty-distribution and jetty-home will include at the end of the Handler tree a DefaultHandler, which is responsible for reporting this 404 error, it presents the various configured contexts as HTML for users to click through to. This produced HTML includes output that contains the configured fully qualified directory base resource location for each context.", "title": "Vulnerability description" }, { "category": "summary", "text": "jetty: error path information disclosure", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of jetty which is embedded in the nutch package as shipped with Red Hat Satellite 5. The jetty server is not exposed, as such exploitation is difficult, Red Hat Product Security has rated this issue as having security impact of Low in the context of Red Hat Satellite 5. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10247" }, { "category": "external", "summary": "RHBZ#1705993", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705993" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10247", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10247" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10247", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10247" } ], "release_date": "2019-04-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "jetty: error path information disclosure" }, { "cve": "CVE-2019-11272", "cwe": { "id": "CWE-305", "name": "Authentication Bypass by Primary Weakness" }, "discovery_date": "2019-06-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1728993" } ], "notes": [ { "category": "description", "text": "A flaw was found in Spring Security in several versions, in the use of plain text passwords using the PlaintextPasswordEncoder. If an application is using an affected version of Spring Security with the PlaintextPasswordEncoder and a user has a null encoded password, an attacker can use this flaw to authenticate using a password of \"null.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "spring-security-core: mishandling of user passwords allows logging in with a password of NULL", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform\u0027s OpenDaylight versions 9 and 10 contain the vulnerable code. However, these OpenDaylight versions were released as technical preview with limited support and will therefore not be updated. Other OpenDaylight versions do not contain the vulnerable library.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-11272" }, { "category": "external", "summary": "RHBZ#1728993", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1728993" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-11272", "url": "https://www.cve.org/CVERecord?id=CVE-2019-11272" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11272", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11272" }, { "category": "external", "summary": "https://pivotal.io/security/cve-2019-11272", "url": "https://pivotal.io/security/cve-2019-11272" } ], "release_date": "2019-07-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "spring-security-core: mishandling of user passwords allows logging in with a password of NULL" }, { "cve": "CVE-2019-12384", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-06-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1725807" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in FasterXML jackson-databind in versions prior to 2.9.9. The vulnerability would permit polymorphic deserialization of malicious objects using the logback-core gadget when used in conjunction with polymorphic type handling methods such as `enableDefaultTyping()` or when @JsonTypeInfo is using `Id.CLASS` or `Id.MINIMAL_CLASS` or in any other way which ObjectMapper.readValue might instantiate objects from unsafe sources. Depending on the classpath content, remote code execution may be possible.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack\u0027s OpenDaylight does not use logback in any supported configuration. Therefore, the prerequisites for this vulnerability are not present and OpenDaylight is not affected.\n\nThis vulnerability relies on logback-core (ch.qos.logback.core) being present in the application\u0027s ClassPath. Logback-core is not packaged as an RPM for Red Hat Enterprise Linux or Red Hat Software Collections. Applications using jackson-databind that do not also use logback-core are not impacted by this vulnerability.\n\nThis issue affects the versions of jackson-databind bundled with candlepin as shipped with Red Hat Satellite 6.x. However the affected code is NOT used at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-12384" }, { "category": "external", "summary": "RHBZ#1725807", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1725807" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-12384", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12384" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-12384", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12384" } ], "release_date": "2019-06-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Fuse 7.6.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution" }, { "cve": "CVE-2019-12422", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2019-11-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1774726" } ], "notes": [ { "category": "description", "text": "Apache Shiro before 1.4.2, when using the default \"remember me\" configuration, cookies could be susceptible to a padding attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "shiro: Cookie padding oracle vulnerability with default configuration", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-12422" }, { "category": "external", "summary": "RHBZ#1774726", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774726" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-12422", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12422" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-12422", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12422" } ], "release_date": "2019-11-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shiro: Cookie padding oracle vulnerability with default configuration" }, { "cve": "CVE-2019-12814", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-06-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1725795" } ], "notes": [ { "category": "description", "text": "A new polymorphic typing flaw was discovered in FasterXML jackson-databind, versions 2.x through 2.9.9. With default typing enabled, an attacker can send a specifically crafted JSON message to the server that allows them to read arbitrary local files.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message.", "title": "Vulnerability summary" }, { "category": "other", "text": "* Red Hat Satellite 6 does not include the jdom or jdom2 packages, thus it is not affected by this vulnerability. \n* Red Hat OpenStack\u0027s OpenDaylight does not include the jdom or jdom2 packages, thus it is not affected by this vulnerability.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-12814" }, { "category": "external", "summary": "RHBZ#1725795", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1725795" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-12814", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12814" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-12814", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12814" } ], "release_date": "2019-06-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" }, { "category": "workaround", "details": "This vulnerability relies on jdom (org.jdom) or jdom2 (org.jdom2) being present in the application\u0027s ClassPath. Applications using jackson-databind that do not also use jdom or jdom2 are not impacted by this vulnerability.", "product_ids": [ "Red Hat Fuse 7.6.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message." }, { "cve": "CVE-2019-14379", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-07-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1737517" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in FasterXML jackson-databind, where it would permit polymorphic deserialization of malicious objects using the ehcache and logback JNDI gadgets when used in conjunction with polymorphic type handling methods such as `enableDefaultTyping()` or when @JsonTypeInfo is using `Id.CLASS` or `Id.MINIMAL_CLASS` or in any other way which ObjectMapper.readValue might instantiate objects from unsafe sources. An attacker could use this flaw to execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: default typing mishandling leading to remote code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nSimilarly, Satellite 6 does not enable polymorphic unmarshmalling, which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14379" }, { "category": "external", "summary": "RHBZ#1737517", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1737517" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14379", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14379" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14379", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14379" } ], "release_date": "2019-07-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Fuse 7.6.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: default typing mishandling leading to remote code execution" }, { "cve": "CVE-2019-14439", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-07-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1752962" } ], "notes": [ { "category": "description", "text": "A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x before 2.9.9.2. This occurs when Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the logback jar in the classpath.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Polymorphic typing issue related to logback/JNDI", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenDaylight provided as part of Red Hat OpenStack does not utilize logback when used in a supported configuration. Therefore, the prerequisites for this vulnerability are not present and OpenDaylight is not affected.\n\nSatellite 6 does not enable polymorphic unmarshmalling, which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14439" }, { "category": "external", "summary": "RHBZ#1752962", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752962" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14439", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14439" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14439", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14439" } ], "release_date": "2019-07-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Fuse 7.6.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Polymorphic typing issue related to logback/JNDI" }, { "acknowledgments": [ { "names": [ "Guillaume Teissier" ], "organization": "Orange" } ], "cve": "CVE-2019-17570", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-11-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1775193" } ], "notes": [ { "category": "description", "text": "A flaw was discovered where the XMLRPC client implementation in Apache XMLRPC, performed deserialization of the server-side exception serialized in the faultCause attribute of XMLRPC error response messages. A malicious or compromised XMLRPC server could possibly use this flaw to execute arbitrary code with the privileges of an application using the Apache XMLRPC client library.", "title": "Vulnerability description" }, { "category": "summary", "text": "xmlrpc: Deserialization of server-side exception from faultCause in XMLRPC error response", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 7 provides vulnerable version of xmlrpc via the Optional repository. As the Optional repository is not supported, this issue is not planned to be addressed there.\n\nRed Hat Virtualization Manager uses xmlrpc only for internal communication with the scheduler. Since this is a component of the Manager itself, it is not subject to attacker influence and does not represent an attack surface.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-17570" }, { "category": "external", "summary": "RHBZ#1775193", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775193" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-17570", "url": "https://www.cve.org/CVERecord?id=CVE-2019-17570" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-17570", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17570" }, { "category": "external", "summary": "https://github.com/orangecertcc/security-research/security/advisories/GHSA-x2r6-4m45-m4jp", "url": "https://github.com/orangecertcc/security-research/security/advisories/GHSA-x2r6-4m45-m4jp" } ], "release_date": "2020-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" }, { "category": "workaround", "details": "There is no known mitigation other than restricting applications using the Apache XMLRPC client library from sending requests to untrusted XMLRPC servers.", "product_ids": [ "Red Hat Fuse 7.6.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xmlrpc: Deserialization of server-side exception from faultCause in XMLRPC error response" } ] }
rhsa-2019_2690
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for atomic-openshift is now available for Red Hat OpenShift Container Platform 3.10.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nSecurity Fix(es):\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* kubernetes: API server allows access to cluster-scoped custom resources as if resources were namespaced (CVE-2019-11247)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAll OpenShift Container Platform 3.10 users are advised to upgrade to these\nupdated packages and images.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:2690", "url": "https://access.redhat.com/errata/RHSA-2019:2690" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1732192", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1732192" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2690.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 3.10 security update", "tracking": { "current_release_date": "2024-11-22T13:35:33+00:00", "generator": { "date": "2024-11-22T13:35:33+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2019:2690", "initial_release_date": "2019-09-12T06:37:28+00:00", "revision_history": [ { "date": "2019-09-12T06:37:28+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-09-12T06:37:28+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T13:35:33+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 3.10", "product": { "name": "Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:3.10::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product": { "name": "atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product_id": "atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product": { "name": "atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product_id": "atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product": { "name": "atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product_id": "atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product": { "name": "atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product_id": "atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product": { "name": "atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product_id": "atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product": { "name": "atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product_id": "atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product": { "name": "atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product_id": "atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product": { "name": "atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product_id": "atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product": { "name": "atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product_id": "atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-template-service-broker@3.10.170-1.git.0.8e592d6.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product": { "name": "atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product_id": "atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product": { "name": "atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_id": "atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product": { "name": "atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_id": "atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-clients-redistributable-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product": { "name": "atomic-openshift-clients-redistributable-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_id": "atomic-openshift-clients-redistributable-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-clients-redistributable@3.10.170-1.git.0.8e592d6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product": { "name": "atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_id": "atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product": { "name": "atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_id": "atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product": { "name": "atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_id": "atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product": { "name": "atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_id": "atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product": { "name": "atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_id": "atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product": { "name": "atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_id": "atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product": { "name": "atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_id": "atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-template-service-broker@3.10.170-1.git.0.8e592d6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product": { "name": "atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_id": "atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.src", "product": { "name": "atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.src", "product_id": "atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "atomic-openshift-docker-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "product": { "name": "atomic-openshift-docker-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "product_id": "atomic-openshift-docker-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } }, { "category": "product_version", "name": "atomic-openshift-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "product": { "name": "atomic-openshift-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "product_id": "atomic-openshift-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le" }, "product_reference": "atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.src as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.src" }, "product_reference": "atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.x86_64" }, "product_reference": "atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.ppc64le" }, "product_reference": "atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.x86_64" }, "product_reference": "atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-clients-redistributable-0:3.10.170-1.git.0.8e592d6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-redistributable-0:3.10.170-1.git.0.8e592d6.el7.x86_64" }, "product_reference": "atomic-openshift-clients-redistributable-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-docker-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-docker-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch" }, "product_reference": "atomic-openshift-docker-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch" }, "product_reference": "atomic-openshift-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.ppc64le" }, "product_reference": "atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.x86_64" }, "product_reference": "atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le" }, "product_reference": "atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.x86_64" }, "product_reference": "atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.ppc64le" }, "product_reference": "atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.x86_64" }, "product_reference": "atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.ppc64le" }, "product_reference": "atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.x86_64" }, "product_reference": "atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.ppc64le" }, "product_reference": "atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.x86_64" }, "product_reference": "atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.ppc64le" }, "product_reference": "atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.x86_64" }, "product_reference": "atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.ppc64le" }, "product_reference": "atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.x86_64" }, "product_reference": "atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.ppc64le" }, "product_reference": "atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.x86_64" }, "product_reference": "atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.src", "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-redistributable-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-docker-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "7Server-RH7-RHOSE-3.10:atomic-openshift-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-12T06:37:28+00:00", "details": "For OpenShift Container Platform 3.10 see the following documentation,\nwhich will be updated shortly for release 3.10.170, for important\ninstructions on how to upgrade your cluster and fully apply this\nasynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/3.10/release_notes/ocp_3_10_release_notes.html", "product_ids": [ "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.src", "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-redistributable-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-docker-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "7Server-RH7-RHOSE-3.10:atomic-openshift-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2690" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.src", "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-redistributable-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-docker-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "7Server-RH7-RHOSE-3.10:atomic-openshift-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.src", "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-redistributable-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-docker-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "7Server-RH7-RHOSE-3.10:atomic-openshift-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-12T06:37:28+00:00", "details": "For OpenShift Container Platform 3.10 see the following documentation,\nwhich will be updated shortly for release 3.10.170, for important\ninstructions on how to upgrade your cluster and fully apply this\nasynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/3.10/release_notes/ocp_3_10_release_notes.html", "product_ids": [ "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.src", "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-redistributable-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-docker-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "7Server-RH7-RHOSE-3.10:atomic-openshift-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2690" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.src", "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-redistributable-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-docker-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "7Server-RH7-RHOSE-3.10:atomic-openshift-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Kubernetes Product Security Committee" ] } ], "cve": "CVE-2019-11247", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2019-07-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1732192" } ], "notes": [ { "category": "description", "text": "The Kubernetes kube-apiserver mistakenly allows access to a cluster-scoped custom resource if the request is made as if the resource were namespaced. Authorizations for the resource accessed in this manner are enforced using roles and role bindings within the namespace, meaning that a user with access only to a resource in one namespace could create, view update or delete the cluster-scoped resource (according to their namespace role privileges). Kubernetes affected versions include versions prior to 1.13.9, versions prior to 1.14.5, versions prior to 1.15.2, and versions 1.7, 1.8, 1.9, 1.10, 1.11, 1.12.", "title": "Vulnerability description" }, { "category": "summary", "text": "kubernetes: API server allows access to cluster-scoped custom resources as if resources were namespaced", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.src", "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-redistributable-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-docker-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "7Server-RH7-RHOSE-3.10:atomic-openshift-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-11247" }, { "category": "external", "summary": "RHBZ#1732192", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1732192" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-11247", "url": "https://www.cve.org/CVERecord?id=CVE-2019-11247" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11247", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11247" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-discuss/Vf31dXp0EJc", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-discuss/Vf31dXp0EJc" } ], "release_date": "2019-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-12T06:37:28+00:00", "details": "For OpenShift Container Platform 3.10 see the following documentation,\nwhich will be updated shortly for release 3.10.170, for important\ninstructions on how to upgrade your cluster and fully apply this\nasynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/3.10/release_notes/ocp_3_10_release_notes.html", "product_ids": [ "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.src", "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-redistributable-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-docker-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "7Server-RH7-RHOSE-3.10:atomic-openshift-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2690" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.src", "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-redistributable-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-docker-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "7Server-RH7-RHOSE-3.10:atomic-openshift-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kubernetes: API server allows access to cluster-scoped custom resources as if resources were namespaced" } ] }
RHSA-2019:2661
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the openshift and atomic-enterprise-service-catalog packages is now available for Red Hat OpenShift Container Platform 4.1.\n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Both the openshift and atomic-enterprise-service-catalog packages have been rebuilt with updates versions of golang. The golang packages provide the Go programming language compiler.\n\nSecurity Fix(es):\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:2661", "url": "https://access.redhat.com/errata/RHSA-2019:2661" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2661.json" } ], "title": "Red Hat Security Advisory: Red Hat OpenShift Container Platform 4.1 openshift RPM security update", "tracking": { "current_release_date": "2025-03-15T19:44:13+00:00", "generator": { "date": "2025-03-15T19:44:13+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.1" } }, "id": "RHSA-2019:2661", "initial_release_date": "2019-09-11T05:53:28+00:00", "revision_history": [ { "date": "2019-09-11T05:53:28+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-09-11T05:53:28+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-03-15T19:44:13+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.1", "product": { "name": "Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.1::el7" } } }, { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.1", "product": { "name": "Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.1::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64", "product": { "name": "atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64", "product_id": "atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.1.14-201908290858.git.1.28cc9ff.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "atomic-enterprise-service-catalog-svcat-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64", "product": { "name": "atomic-enterprise-service-catalog-svcat-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64", "product_id": "atomic-enterprise-service-catalog-svcat-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog-svcat@4.1.14-201908290858.git.1.28cc9ff.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "product": { "name": "openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "product_id": "openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "product": { "name": "openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "product_id": "openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.1.14-201908290858.git.0.3bd3467.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "product": { "name": "openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "product_id": "openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "product": { "name": "openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "product_id": "openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "product": { "name": "openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "product_id": "openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.1.14-201908290858.git.0.3bd3467.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "product": { "name": "openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "product_id": "openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.src", "product": { "name": "atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.src", "product_id": "atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.1.14-201908290858.git.1.28cc9ff.el7?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "openshift-0:4.1.14-201908290858.git.0.3bd3467.el7.src", "product": { "name": "openshift-0:4.1.14-201908290858.git.0.3bd3467.el7.src", "product_id": "openshift-0:4.1.14-201908290858.git.0.3bd3467.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "openshift-0:4.1.14-201908290858.git.0.3bd3467.el8.src", "product": { "name": "openshift-0:4.1.14-201908290858.git.0.3bd3467.el8.src", "product_id": "openshift-0:4.1.14-201908290858.git.0.3bd3467.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.src" }, "product_reference": "atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64" }, "product_reference": "atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-svcat-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-svcat-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64" }, "product_reference": "atomic-enterprise-service-catalog-svcat-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-0:4.1.14-201908290858.git.0.3bd3467.el7.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-0:4.1.14-201908290858.git.0.3bd3467.el7.src" }, "product_reference": "openshift-0:4.1.14-201908290858.git.0.3bd3467.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64" }, "product_reference": "openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64" }, "product_reference": "openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64" }, "product_reference": "openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-0:4.1.14-201908290858.git.0.3bd3467.el8.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:openshift-0:4.1.14-201908290858.git.0.3bd3467.el8.src" }, "product_reference": "openshift-0:4.1.14-201908290858.git.0.3bd3467.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64" }, "product_reference": "openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64" }, "product_reference": "openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64" }, "product_reference": "openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.src", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-svcat-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-0:4.1.14-201908290858.git.0.3bd3467.el7.src", "7Server-RH7-RHOSE-4.1:openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "8Base-RHOSE-4.1:openshift-0:4.1.14-201908290858.git.0.3bd3467.el8.src", "8Base-RHOSE-4.1:openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "8Base-RHOSE-4.1:openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "8Base-RHOSE-4.1:openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-11T05:53:28+00:00", "details": "For OpenShift Container Platform 4.1 see the following documentation, which\nwill be updated shortly for release 4.1.14, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.1/updating/updating-cluster-cli.html.", "product_ids": [ "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.src", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-svcat-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-0:4.1.14-201908290858.git.0.3bd3467.el7.src", "7Server-RH7-RHOSE-4.1:openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "8Base-RHOSE-4.1:openshift-0:4.1.14-201908290858.git.0.3bd3467.el8.src", "8Base-RHOSE-4.1:openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "8Base-RHOSE-4.1:openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "8Base-RHOSE-4.1:openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2661" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.src", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-svcat-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-0:4.1.14-201908290858.git.0.3bd3467.el7.src", "7Server-RH7-RHOSE-4.1:openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "8Base-RHOSE-4.1:openshift-0:4.1.14-201908290858.git.0.3bd3467.el8.src", "8Base-RHOSE-4.1:openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "8Base-RHOSE-4.1:openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "8Base-RHOSE-4.1:openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.src", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-svcat-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-0:4.1.14-201908290858.git.0.3bd3467.el7.src", "7Server-RH7-RHOSE-4.1:openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "8Base-RHOSE-4.1:openshift-0:4.1.14-201908290858.git.0.3bd3467.el8.src", "8Base-RHOSE-4.1:openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "8Base-RHOSE-4.1:openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "8Base-RHOSE-4.1:openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-11T05:53:28+00:00", "details": "For OpenShift Container Platform 4.1 see the following documentation, which\nwill be updated shortly for release 4.1.14, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.1/updating/updating-cluster-cli.html.", "product_ids": [ "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.src", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-svcat-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-0:4.1.14-201908290858.git.0.3bd3467.el7.src", "7Server-RH7-RHOSE-4.1:openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "8Base-RHOSE-4.1:openshift-0:4.1.14-201908290858.git.0.3bd3467.el8.src", "8Base-RHOSE-4.1:openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "8Base-RHOSE-4.1:openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "8Base-RHOSE-4.1:openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2661" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.src", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-svcat-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-0:4.1.14-201908290858.git.0.3bd3467.el7.src", "7Server-RH7-RHOSE-4.1:openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "8Base-RHOSE-4.1:openshift-0:4.1.14-201908290858.git.0.3bd3467.el8.src", "8Base-RHOSE-4.1:openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "8Base-RHOSE-4.1:openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "8Base-RHOSE-4.1:openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" } ] }
rhsa-2020:0922
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat AMQ Broker 7.6 is now available from the Red Hat Customer Portal.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "AMQ Broker is a high-performance messaging implementation based on ActiveMQ Artemis. It uses an asynchronous journal for fast message persistence, and supports multiple languages, protocols, and platforms. \n\nThis release of Red Hat AMQ Broker 7.6.0 serves as a replacement for Red Hat AMQ Broker 7.5.0, and includes security and bug fixes, and enhancements. For further information, refer to the release notes linked to in the References section.\n\nSecurity Fix(es):\n\n* netty: HTTP request smuggling (CVE-2019-20444)\n\n* netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header (CVE-2019-20445)\n\n* jetty: HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511)\n\n* jetty: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* jetty: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* jetty: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* jetty: HTTP/2: 0-length headers lead to denial of service (CVE-2019-9516)\n\n* jetty: HTTP/2: request for large response leads to denial of service (CVE-2019-9517)\n\n* jetty: HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)\n\n* jetty: using specially formatted URL against DefaultServlet or ResourceHandler leads to XSS conditions (CVE-2019-10241)\n\n* jetty: error path information disclosure (CVE-2019-10247)\n\n* mqtt-client: activemq: Corrupt MQTT frame can cause broker shutdown (CVE-2019-0222)\n\n* netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers (CVE-2019-16869)\n\n* netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling (CVE-2020-7238)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:0922", "url": "https://access.redhat.com/errata/RHSA-2020:0922" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=jboss.amq.broker\u0026version=7.6.0\u0026productChanged=yes", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=jboss.amq.broker\u0026version=7.6.0\u0026productChanged=yes" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_amq/7.6/", "url": "https://access.redhat.com/documentation/en-us/red_hat_amq/7.6/" }, { "category": "external", "summary": "1696012", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1696012" }, { "category": "external", "summary": "1705924", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705924" }, { "category": "external", "summary": "1705993", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705993" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "external", "summary": "1758619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758619" }, { "category": "external", "summary": "1796225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796225" }, { "category": "external", "summary": "1798509", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798509" }, { "category": "external", "summary": "1798524", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798524" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_0922.json" } ], "title": "Red Hat Security Advisory: Red Hat AMQ Broker 7.6 release and security update", "tracking": { "current_release_date": "2025-04-09T17:53:01+00:00", "generator": { "date": "2025-04-09T17:53:01+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.2" } }, "id": "RHSA-2020:0922", "initial_release_date": "2020-03-23T08:21:33+00:00", "revision_history": [ { "date": "2020-03-23T08:21:33+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-03-23T08:21:33+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-04-09T17:53:01+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat AMQ", "product": { "name": "Red Hat AMQ", "product_id": "Red Hat AMQ", "product_identification_helper": { "cpe": "cpe:/a:redhat:amq_broker:7" } } } ], "category": "product_family", "name": "Red Hat JBoss AMQ" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-0222", "discovery_date": "2019-03-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1696012" } ], "notes": [ { "category": "description", "text": "In Apache ActiveMQ 5.0.0 - 5.15.8, unmarshalling corrupt MQTT frame can lead to broker Out of Memory exception making it unresponsive.", "title": "Vulnerability description" }, { "category": "summary", "text": "activemq: Corrupt MQTT frame can cause broker shutdown", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-0222" }, { "category": "external", "summary": "RHBZ#1696012", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1696012" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0222", "url": "https://www.cve.org/CVERecord?id=CVE-2019-0222" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0222", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0222" } ], "release_date": "2019-03-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "activemq: Corrupt MQTT frame can cause broker shutdown" }, { "cve": "CVE-2019-9511", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741860" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker can request a large amount of data by manipulating window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this queue can consume excess CPU, memory, or both, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: large amount of data requests leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "There are no mitigations available for nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "RHBZ#1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9511", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "Red Hat AMQ" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: large amount of data requests leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "cve": "CVE-2019-9516", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741864" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker, sending a stream of header with a 0-length header name and a 0-length header value, could cause some implementations to allocate memory for these headers and keep the allocations alive until the session dies. The can consume excess memory, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: 0-length headers lead to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9516" }, { "category": "external", "summary": "RHBZ#1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9516", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9516" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://github.com/nghttp2/nghttp2/issues/1382#", "url": "https://github.com/nghttp2/nghttp2/issues/1382#" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "Red Hat AMQ" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: 0-length headers lead to denial of service" }, { "cve": "CVE-2019-9517", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741868" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in HTTP/2. An attacker can open a HTTP/2 window so the peer can send without constraint. The TCP window remains closed so the peer cannot write the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the server\u0027s queue is setup, the responses can consume excess memory, CPU, or both, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: request for large response leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "The package httpd versions as shipped with Red Hat Enterprise Linux 5, 6 and 7 are not affected by this issue as HTTP/2 support is not provided.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9517" }, { "category": "external", "summary": "RHBZ#1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9517", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9517" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" }, { "category": "workaround", "details": "The httpd version shipped with Red Hat Enterprise Linux 8 provides HTTP/2 support through mod_http2 package. While mod_http2 package is not updated, users can disable HTTP/2 support as mitigation action by executing the following steps:\n\n1. Stop httpd service:\n$ systemctl stop httpd\n\n2. Remove http/2 protocol support from configuration files:\n$ sed -i \u0027s/\\(h2\\)\\|\\(h2c\\)//g\u0027 \u003chttpd_config_file\u003e\n\n3. Validate configuration files to make sure all syntax is valid:\n$ apachectl configtest\n\n4. Restart httpd service:\n$ systemctl start httpd", "product_ids": [ "Red Hat AMQ" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: request for large response leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9518", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735749" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using frames with an empty payload, a flood could occur that results in excessive CPU usage and starvation of other clients. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using empty frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9518" }, { "category": "external", "summary": "RHBZ#1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9518", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: flood using empty frames results in excessive resource consumption" }, { "cve": "CVE-2019-10241", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2019-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1705924" } ], "notes": [ { "category": "description", "text": "In Eclipse Jetty version 9.2.26 and older, 9.3.25 and older, and 9.4.15 and older, the server is vulnerable to XSS conditions if a remote client USES a specially formatted URL against the DefaultServlet or ResourceHandler that is configured for showing a Listing of directory contents.", "title": "Vulnerability description" }, { "category": "summary", "text": "jetty: using specially formatted URL against DefaultServlet or ResourceHandler leads to XSS conditions", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of jetty which is embedded in the nutch package as shipped with Red Hat Satellite 5. The jetty server is not exposed, as such exploitation is difficult, Red Hat Product Security has rated this issue as having security impact of Low in the context of Red Hat Satellite 5. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10241" }, { "category": "external", "summary": "RHBZ#1705924", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705924" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10241", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10241" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10241", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10241" } ], "release_date": "2019-04-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jetty: using specially formatted URL against DefaultServlet or ResourceHandler leads to XSS conditions" }, { "cve": "CVE-2019-10247", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1705993" } ], "notes": [ { "category": "description", "text": "In Eclipse Jetty version 7.x, 8.x, 9.2.27 and older, 9.3.26 and older, and 9.4.16 and older, the server running on any OS and Jetty version combination will reveal the configured fully qualified directory base resource location on the output of the 404 error for not finding a Context that matches the requested path. The default server behavior on jetty-distribution and jetty-home will include at the end of the Handler tree a DefaultHandler, which is responsible for reporting this 404 error, it presents the various configured contexts as HTML for users to click through to. This produced HTML includes output that contains the configured fully qualified directory base resource location for each context.", "title": "Vulnerability description" }, { "category": "summary", "text": "jetty: error path information disclosure", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of jetty which is embedded in the nutch package as shipped with Red Hat Satellite 5. The jetty server is not exposed, as such exploitation is difficult, Red Hat Product Security has rated this issue as having security impact of Low in the context of Red Hat Satellite 5. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10247" }, { "category": "external", "summary": "RHBZ#1705993", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705993" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10247", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10247" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10247", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10247" } ], "release_date": "2019-04-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "jetty: error path information disclosure" }, { "cve": "CVE-2019-16869", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2019-09-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1758619" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty, where whitespace before the colon in HTTP headers is mishandled. This flaw allows an attacker to cause HTTP request smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that this vulnerability does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships vulnerable netty version embedded in Candlepin, however, is not directly vulnerable since HTTP requests are handled by Tomcat and not netty.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-16869" }, { "category": "external", "summary": "RHBZ#1758619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758619" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16869", "url": "https://www.cve.org/CVERecord?id=CVE-2019-16869" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16869", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16869" } ], "release_date": "2019-09-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat AMQ" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers" }, { "cve": "CVE-2019-20444", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1798524" } ], "notes": [ { "category": "description", "text": "A HTTP smuggling flaw was found in HttpObjectDecoder.java in Netty in versions prior to version 4.1.44. HTTP headers with an invalid fold, in this case CRLF (carriage return, line feed) without being followed by SP (space) or HTAB (horizontal tab), result in situations where headers can be misread. Data integrity is the highest threat with this vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP request smuggling", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that the previous vulnerability, CVE-2019-16869, does not pose a substantial practical threat to ElasticSearch 6. We agree that these issues would be difficult to exploit on OpenShift Container Platform so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships a vulnerable version of netty embedded in Candlepin. However, the flaw can not be triggered in that context, because HTTP requests are handled by Tomcat, not by netty. A future release may fix this.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20444" }, { "category": "external", "summary": "RHBZ#1798524", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798524" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20444", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20444" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20444", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20444" }, { "category": "external", "summary": "https://github.com/elastic/elasticsearch/issues/49396", "url": "https://github.com/elastic/elasticsearch/issues/49396" } ], "release_date": "2020-01-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat AMQ" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP request smuggling" }, { "cve": "CVE-2019-20445", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1798509" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty before version 4.1.44, where it accepted multiple Content-Length headers and also accepted both Transfer-Encoding, as well as Content-Length headers where it should reject the message under such circumstances. In circumstances where Netty is used in the context of a server, it could result in a viable HTTP smuggling vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that the previous vulnerability, CVE-2019-16869, does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit both these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships a vulnerable version of netty embedded in Candlepin. However, the flaw can not be triggered in that context, because HTTP requests are handled by Tomcat, not by netty. A future release may fix this.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20445" }, { "category": "external", "summary": "RHBZ#1798509", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798509" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20445", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20445" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20445", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20445" } ], "release_date": "2020-01-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat AMQ" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header" }, { "cve": "CVE-2020-7238", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1796225" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty, where it mishandles Transfer-Encoding whitespace. This flaw allows HTTP Request Smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that the previous vulnerability, CVE-2019-16869, does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit both these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships vulnerable netty version embedded in Candlepin, however, is not directly vulnerable since HTTP requests are handled by Tomcat and not netty.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-7238" }, { "category": "external", "summary": "RHBZ#1796225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796225" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-7238", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7238" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7238", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7238" }, { "category": "external", "summary": "https://netty.io/news/2019/12/18/4-1-44-Final.html", "url": "https://netty.io/news/2019/12/18/4-1-44-Final.html" } ], "release_date": "2020-01-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat AMQ" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling" } ] }
RHSA-2019:2690
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for atomic-openshift is now available for Red Hat OpenShift Container Platform 3.10.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nSecurity Fix(es):\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* kubernetes: API server allows access to cluster-scoped custom resources as if resources were namespaced (CVE-2019-11247)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAll OpenShift Container Platform 3.10 users are advised to upgrade to these\nupdated packages and images.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:2690", "url": "https://access.redhat.com/errata/RHSA-2019:2690" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1732192", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1732192" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2690.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 3.10 security update", "tracking": { "current_release_date": "2025-03-15T19:44:18+00:00", "generator": { "date": "2025-03-15T19:44:18+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.1" } }, "id": "RHSA-2019:2690", "initial_release_date": "2019-09-12T06:37:28+00:00", "revision_history": [ { "date": "2019-09-12T06:37:28+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-09-12T06:37:28+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-03-15T19:44:18+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 3.10", "product": { "name": "Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:3.10::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product": { "name": "atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product_id": "atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product": { "name": "atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product_id": "atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product": { "name": "atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product_id": "atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product": { "name": "atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product_id": "atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product": { "name": "atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product_id": "atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product": { "name": "atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product_id": "atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product": { "name": "atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product_id": "atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product": { "name": "atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product_id": "atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product": { "name": "atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product_id": "atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-template-service-broker@3.10.170-1.git.0.8e592d6.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product": { "name": "atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product_id": "atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product": { "name": "atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_id": "atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product": { "name": "atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_id": "atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-clients-redistributable-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product": { "name": "atomic-openshift-clients-redistributable-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_id": "atomic-openshift-clients-redistributable-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-clients-redistributable@3.10.170-1.git.0.8e592d6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product": { "name": "atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_id": "atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product": { "name": "atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_id": "atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product": { "name": "atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_id": "atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product": { "name": "atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_id": "atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product": { "name": "atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_id": "atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product": { "name": "atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_id": "atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product": { "name": "atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_id": "atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-template-service-broker@3.10.170-1.git.0.8e592d6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product": { "name": "atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_id": "atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.src", "product": { "name": "atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.src", "product_id": "atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "atomic-openshift-docker-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "product": { "name": "atomic-openshift-docker-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "product_id": "atomic-openshift-docker-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } }, { "category": "product_version", "name": "atomic-openshift-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "product": { "name": "atomic-openshift-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "product_id": "atomic-openshift-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le" }, "product_reference": "atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.src as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.src" }, "product_reference": "atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.x86_64" }, "product_reference": "atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.ppc64le" }, "product_reference": "atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.x86_64" }, "product_reference": "atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-clients-redistributable-0:3.10.170-1.git.0.8e592d6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-redistributable-0:3.10.170-1.git.0.8e592d6.el7.x86_64" }, "product_reference": "atomic-openshift-clients-redistributable-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-docker-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-docker-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch" }, "product_reference": "atomic-openshift-docker-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch" }, "product_reference": "atomic-openshift-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.ppc64le" }, "product_reference": "atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.x86_64" }, "product_reference": "atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le" }, "product_reference": "atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.x86_64" }, "product_reference": "atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.ppc64le" }, "product_reference": "atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.x86_64" }, "product_reference": "atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.ppc64le" }, "product_reference": "atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.x86_64" }, "product_reference": "atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.ppc64le" }, "product_reference": "atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.x86_64" }, "product_reference": "atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.ppc64le" }, "product_reference": "atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.x86_64" }, "product_reference": "atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.ppc64le" }, "product_reference": "atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.x86_64" }, "product_reference": "atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.ppc64le" }, "product_reference": "atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.x86_64" }, "product_reference": "atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.src", "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-redistributable-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-docker-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "7Server-RH7-RHOSE-3.10:atomic-openshift-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-12T06:37:28+00:00", "details": "For OpenShift Container Platform 3.10 see the following documentation,\nwhich will be updated shortly for release 3.10.170, for important\ninstructions on how to upgrade your cluster and fully apply this\nasynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/3.10/release_notes/ocp_3_10_release_notes.html", "product_ids": [ "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.src", "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-redistributable-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-docker-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "7Server-RH7-RHOSE-3.10:atomic-openshift-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2690" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.src", "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-redistributable-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-docker-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "7Server-RH7-RHOSE-3.10:atomic-openshift-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.src", "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-redistributable-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-docker-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "7Server-RH7-RHOSE-3.10:atomic-openshift-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-12T06:37:28+00:00", "details": "For OpenShift Container Platform 3.10 see the following documentation,\nwhich will be updated shortly for release 3.10.170, for important\ninstructions on how to upgrade your cluster and fully apply this\nasynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/3.10/release_notes/ocp_3_10_release_notes.html", "product_ids": [ "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.src", "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-redistributable-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-docker-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "7Server-RH7-RHOSE-3.10:atomic-openshift-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2690" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.src", "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-redistributable-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-docker-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "7Server-RH7-RHOSE-3.10:atomic-openshift-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Kubernetes Product Security Committee" ] } ], "cve": "CVE-2019-11247", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2019-07-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1732192" } ], "notes": [ { "category": "description", "text": "The Kubernetes kube-apiserver mistakenly allows access to a cluster-scoped custom resource if the request is made as if the resource were namespaced. Authorizations for the resource accessed in this manner are enforced using roles and role bindings within the namespace, meaning that a user with access only to a resource in one namespace could create, view update or delete the cluster-scoped resource (according to their namespace role privileges). Kubernetes affected versions include versions prior to 1.13.9, versions prior to 1.14.5, versions prior to 1.15.2, and versions 1.7, 1.8, 1.9, 1.10, 1.11, 1.12.", "title": "Vulnerability description" }, { "category": "summary", "text": "kubernetes: API server allows access to cluster-scoped custom resources as if resources were namespaced", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.src", "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-redistributable-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-docker-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "7Server-RH7-RHOSE-3.10:atomic-openshift-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-11247" }, { "category": "external", "summary": "RHBZ#1732192", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1732192" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-11247", "url": "https://www.cve.org/CVERecord?id=CVE-2019-11247" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11247", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11247" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-discuss/Vf31dXp0EJc", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-discuss/Vf31dXp0EJc" } ], "release_date": "2019-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-12T06:37:28+00:00", "details": "For OpenShift Container Platform 3.10 see the following documentation,\nwhich will be updated shortly for release 3.10.170, for important\ninstructions on how to upgrade your cluster and fully apply this\nasynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/3.10/release_notes/ocp_3_10_release_notes.html", "product_ids": [ "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.src", "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-redistributable-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-docker-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "7Server-RH7-RHOSE-3.10:atomic-openshift-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2690" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.src", "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-redistributable-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-docker-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "7Server-RH7-RHOSE-3.10:atomic-openshift-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kubernetes: API server allows access to cluster-scoped custom resources as if resources were namespaced" } ] }
rhsa-2019:3265
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat OpenShift Container Platform 4.1.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the ansible-operator, apb, containernetworking-plugins, golang-github-openshift-prometheus-alert-buffer, golang-github-prometheus-promu and openshift-eventrouter RPM packages for Red Hat OpenShift Container Platform 4.1.21. These packages have been rebuilt with an updated version of Go to address the below security issues.\n\nSecurity Fix(es):\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:3265", "url": "https://access.redhat.com/errata/RHSA-2019:3265" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3265.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 4.1 security update", "tracking": { "current_release_date": "2025-03-15T19:43:55+00:00", "generator": { "date": "2025-03-15T19:43:55+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.1" } }, "id": "RHSA-2019:3265", "initial_release_date": "2019-10-30T18:20:03+00:00", "revision_history": [ { "date": "2019-10-30T18:20:03+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-10-30T18:20:03+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-03-15T19:43:55+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.1", "product": { "name": "Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.1::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "apb-0:2.0.3-2.el7.x86_64", "product": { "name": "apb-0:2.0.3-2.el7.x86_64", "product_id": "apb-0:2.0.3-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.8.1-4.el7.x86_64", "product": { "name": "containernetworking-plugins-0:0.8.1-4.el7.x86_64", "product_id": "containernetworking-plugins-0:0.8.1-4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64", "product": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64", "product_id": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "product": { "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "product_id": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-openshift-prometheus-alert-buffer@0-3.gitceca8c1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "product": { "name": "golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "product_id": "golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "product": { "name": "prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "product_id": "prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-eventrouter-0:0.2-3.gited73fb6.el7.x86_64", "product": { "name": "openshift-eventrouter-0:0.2-3.gited73fb6.el7.x86_64", "product_id": "openshift-eventrouter-0:0.2-3.gited73fb6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-eventrouter-debuginfo-0:0.2-3.gited73fb6.el7.x86_64", "product": { "name": "openshift-eventrouter-debuginfo-0:0.2-3.gited73fb6.el7.x86_64", "product_id": "openshift-eventrouter-debuginfo-0:0.2-3.gited73fb6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.x86_64", "product": { "name": "ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.x86_64", "product_id": "ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "apb-0:2.0.3-2.el7.src", "product": { "name": "apb-0:2.0.3-2.el7.src", "product_id": "apb-0:2.0.3-2.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.8.1-4.el7.src", "product": { "name": "containernetworking-plugins-0:0.8.1-4.el7.src", "product_id": "containernetworking-plugins-0:0.8.1-4.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "product": { "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "product_id": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-openshift-prometheus-alert-buffer@0-3.gitceca8c1.el7?arch=src" } } }, { "category": "product_version", "name": "golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "product": { "name": "golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "product_id": "golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "openshift-eventrouter-0:0.2-3.gited73fb6.el7.src", "product": { "name": "openshift-eventrouter-0:0.2-3.gited73fb6.el7.src", "product_id": "openshift-eventrouter-0:0.2-3.gited73fb6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.src", "product": { "name": "ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.src", "product_id": "ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "apb-container-scripts-0:2.0.3-2.el7.noarch", "product": { "name": "apb-container-scripts-0:2.0.3-2.el7.noarch", "product_id": "apb-container-scripts-0:2.0.3-2.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } }, { "category": "product_version", "name": "apb-devel-0:2.0.3-2.el7.noarch", "product": { "name": "apb-devel-0:2.0.3-2.el7.noarch", "product_id": "apb-devel-0:2.0.3-2.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } }, { "category": "product_version", "name": "ansible-operator-container-scripts-0:0.0.1-3.git.59.4beb3d2.el7.noarch", "product": { "name": "ansible-operator-container-scripts-0:0.0.1-3.git.59.4beb3d2.el7.noarch", "product_id": "ansible-operator-container-scripts-0:0.0.1-3.git.59.4beb3d2.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } }, { "category": "product_version", "name": "ansible-operator-devel-0:0.0.1-3.git.59.4beb3d2.el7.noarch", "product": { "name": "ansible-operator-devel-0:0.0.1-3.git.59.4beb3d2.el7.noarch", "product_id": "ansible-operator-devel-0:0.0.1-3.git.59.4beb3d2.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.src" }, "product_reference": "ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.x86_64" }, "product_reference": "ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-operator-container-scripts-0:0.0.1-3.git.59.4beb3d2.el7.noarch as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:ansible-operator-container-scripts-0:0.0.1-3.git.59.4beb3d2.el7.noarch" }, "product_reference": "ansible-operator-container-scripts-0:0.0.1-3.git.59.4beb3d2.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-operator-devel-0:0.0.1-3.git.59.4beb3d2.el7.noarch as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:ansible-operator-devel-0:0.0.1-3.git.59.4beb3d2.el7.noarch" }, "product_reference": "ansible-operator-devel-0:0.0.1-3.git.59.4beb3d2.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "apb-0:2.0.3-2.el7.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:apb-0:2.0.3-2.el7.src" }, "product_reference": "apb-0:2.0.3-2.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "apb-0:2.0.3-2.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:apb-0:2.0.3-2.el7.x86_64" }, "product_reference": "apb-0:2.0.3-2.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "apb-container-scripts-0:2.0.3-2.el7.noarch as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:apb-container-scripts-0:2.0.3-2.el7.noarch" }, "product_reference": "apb-container-scripts-0:2.0.3-2.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "apb-devel-0:2.0.3-2.el7.noarch as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:apb-devel-0:2.0.3-2.el7.noarch" }, "product_reference": "apb-devel-0:2.0.3-2.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.1-4.el7.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:containernetworking-plugins-0:0.8.1-4.el7.src" }, "product_reference": "containernetworking-plugins-0:0.8.1-4.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.1-4.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:containernetworking-plugins-0:0.8.1-4.el7.x86_64" }, "product_reference": "containernetworking-plugins-0:0.8.1-4.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src" }, "product_reference": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64" }, "product_reference": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src" }, "product_reference": "golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64" }, "product_reference": "golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-eventrouter-0:0.2-3.gited73fb6.el7.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-eventrouter-0:0.2-3.gited73fb6.el7.src" }, "product_reference": "openshift-eventrouter-0:0.2-3.gited73fb6.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-eventrouter-0:0.2-3.gited73fb6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-eventrouter-0:0.2-3.gited73fb6.el7.x86_64" }, "product_reference": "openshift-eventrouter-0:0.2-3.gited73fb6.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-eventrouter-debuginfo-0:0.2-3.gited73fb6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-eventrouter-debuginfo-0:0.2-3.gited73fb6.el7.x86_64" }, "product_reference": "openshift-eventrouter-debuginfo-0:0.2-3.gited73fb6.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-promu-0:0-5.git85ceabc.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:prometheus-promu-0:0-5.git85ceabc.el7.x86_64" }, "product_reference": "prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.1:ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.src", "7Server-RH7-RHOSE-4.1:ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.x86_64", "7Server-RH7-RHOSE-4.1:ansible-operator-container-scripts-0:0.0.1-3.git.59.4beb3d2.el7.noarch", "7Server-RH7-RHOSE-4.1:ansible-operator-devel-0:0.0.1-3.git.59.4beb3d2.el7.noarch", "7Server-RH7-RHOSE-4.1:apb-0:2.0.3-2.el7.src", "7Server-RH7-RHOSE-4.1:apb-0:2.0.3-2.el7.x86_64", "7Server-RH7-RHOSE-4.1:apb-container-scripts-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.1:apb-devel-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.1:containernetworking-plugins-0:0.8.1-4.el7.src", "7Server-RH7-RHOSE-4.1:containernetworking-plugins-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-4.1:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-4.1:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "7Server-RH7-RHOSE-4.1:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-eventrouter-0:0.2-3.gited73fb6.el7.src", "7Server-RH7-RHOSE-4.1:openshift-eventrouter-0:0.2-3.gited73fb6.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-eventrouter-debuginfo-0:0.2-3.gited73fb6.el7.x86_64", "7Server-RH7-RHOSE-4.1:prometheus-promu-0:0-5.git85ceabc.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-30T18:20:03+00:00", "details": "For OpenShift Container Platform 4.1 see the following documentation, which\nwill be updated shortly for release 4.1.21, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-release-notes.html", "product_ids": [ "7Server-RH7-RHOSE-4.1:ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.src", "7Server-RH7-RHOSE-4.1:ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.x86_64", "7Server-RH7-RHOSE-4.1:ansible-operator-container-scripts-0:0.0.1-3.git.59.4beb3d2.el7.noarch", "7Server-RH7-RHOSE-4.1:ansible-operator-devel-0:0.0.1-3.git.59.4beb3d2.el7.noarch", "7Server-RH7-RHOSE-4.1:apb-0:2.0.3-2.el7.src", "7Server-RH7-RHOSE-4.1:apb-0:2.0.3-2.el7.x86_64", "7Server-RH7-RHOSE-4.1:apb-container-scripts-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.1:apb-devel-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.1:containernetworking-plugins-0:0.8.1-4.el7.src", "7Server-RH7-RHOSE-4.1:containernetworking-plugins-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-4.1:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-4.1:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "7Server-RH7-RHOSE-4.1:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-eventrouter-0:0.2-3.gited73fb6.el7.src", "7Server-RH7-RHOSE-4.1:openshift-eventrouter-0:0.2-3.gited73fb6.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-eventrouter-debuginfo-0:0.2-3.gited73fb6.el7.x86_64", "7Server-RH7-RHOSE-4.1:prometheus-promu-0:0-5.git85ceabc.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3265" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-4.1:ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.src", "7Server-RH7-RHOSE-4.1:ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.x86_64", "7Server-RH7-RHOSE-4.1:ansible-operator-container-scripts-0:0.0.1-3.git.59.4beb3d2.el7.noarch", "7Server-RH7-RHOSE-4.1:ansible-operator-devel-0:0.0.1-3.git.59.4beb3d2.el7.noarch", "7Server-RH7-RHOSE-4.1:apb-0:2.0.3-2.el7.src", "7Server-RH7-RHOSE-4.1:apb-0:2.0.3-2.el7.x86_64", "7Server-RH7-RHOSE-4.1:apb-container-scripts-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.1:apb-devel-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.1:containernetworking-plugins-0:0.8.1-4.el7.src", "7Server-RH7-RHOSE-4.1:containernetworking-plugins-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-4.1:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-4.1:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "7Server-RH7-RHOSE-4.1:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-eventrouter-0:0.2-3.gited73fb6.el7.src", "7Server-RH7-RHOSE-4.1:openshift-eventrouter-0:0.2-3.gited73fb6.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-eventrouter-debuginfo-0:0.2-3.gited73fb6.el7.x86_64", "7Server-RH7-RHOSE-4.1:prometheus-promu-0:0-5.git85ceabc.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.1:ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.src", "7Server-RH7-RHOSE-4.1:ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.x86_64", "7Server-RH7-RHOSE-4.1:ansible-operator-container-scripts-0:0.0.1-3.git.59.4beb3d2.el7.noarch", "7Server-RH7-RHOSE-4.1:ansible-operator-devel-0:0.0.1-3.git.59.4beb3d2.el7.noarch", "7Server-RH7-RHOSE-4.1:apb-0:2.0.3-2.el7.src", "7Server-RH7-RHOSE-4.1:apb-0:2.0.3-2.el7.x86_64", "7Server-RH7-RHOSE-4.1:apb-container-scripts-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.1:apb-devel-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.1:containernetworking-plugins-0:0.8.1-4.el7.src", "7Server-RH7-RHOSE-4.1:containernetworking-plugins-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-4.1:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-4.1:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "7Server-RH7-RHOSE-4.1:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-eventrouter-0:0.2-3.gited73fb6.el7.src", "7Server-RH7-RHOSE-4.1:openshift-eventrouter-0:0.2-3.gited73fb6.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-eventrouter-debuginfo-0:0.2-3.gited73fb6.el7.x86_64", "7Server-RH7-RHOSE-4.1:prometheus-promu-0:0-5.git85ceabc.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-30T18:20:03+00:00", "details": "For OpenShift Container Platform 4.1 see the following documentation, which\nwill be updated shortly for release 4.1.21, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-release-notes.html", "product_ids": [ "7Server-RH7-RHOSE-4.1:ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.src", "7Server-RH7-RHOSE-4.1:ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.x86_64", "7Server-RH7-RHOSE-4.1:ansible-operator-container-scripts-0:0.0.1-3.git.59.4beb3d2.el7.noarch", "7Server-RH7-RHOSE-4.1:ansible-operator-devel-0:0.0.1-3.git.59.4beb3d2.el7.noarch", "7Server-RH7-RHOSE-4.1:apb-0:2.0.3-2.el7.src", "7Server-RH7-RHOSE-4.1:apb-0:2.0.3-2.el7.x86_64", "7Server-RH7-RHOSE-4.1:apb-container-scripts-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.1:apb-devel-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.1:containernetworking-plugins-0:0.8.1-4.el7.src", "7Server-RH7-RHOSE-4.1:containernetworking-plugins-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-4.1:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-4.1:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "7Server-RH7-RHOSE-4.1:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-eventrouter-0:0.2-3.gited73fb6.el7.src", "7Server-RH7-RHOSE-4.1:openshift-eventrouter-0:0.2-3.gited73fb6.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-eventrouter-debuginfo-0:0.2-3.gited73fb6.el7.x86_64", "7Server-RH7-RHOSE-4.1:prometheus-promu-0:0-5.git85ceabc.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3265" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-4.1:ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.src", "7Server-RH7-RHOSE-4.1:ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.x86_64", "7Server-RH7-RHOSE-4.1:ansible-operator-container-scripts-0:0.0.1-3.git.59.4beb3d2.el7.noarch", "7Server-RH7-RHOSE-4.1:ansible-operator-devel-0:0.0.1-3.git.59.4beb3d2.el7.noarch", "7Server-RH7-RHOSE-4.1:apb-0:2.0.3-2.el7.src", "7Server-RH7-RHOSE-4.1:apb-0:2.0.3-2.el7.x86_64", "7Server-RH7-RHOSE-4.1:apb-container-scripts-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.1:apb-devel-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.1:containernetworking-plugins-0:0.8.1-4.el7.src", "7Server-RH7-RHOSE-4.1:containernetworking-plugins-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-4.1:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-4.1:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "7Server-RH7-RHOSE-4.1:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-eventrouter-0:0.2-3.gited73fb6.el7.src", "7Server-RH7-RHOSE-4.1:openshift-eventrouter-0:0.2-3.gited73fb6.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-eventrouter-debuginfo-0:0.2-3.gited73fb6.el7.x86_64", "7Server-RH7-RHOSE-4.1:prometheus-promu-0:0-5.git85ceabc.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" } ] }
rhsa-2019:4020
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat JBoss Enterprise Application Platform 7.2 for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime.\n\nThis release of Red Hat JBoss Enterprise Application Platform 7.2.5 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.2.4, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.2.5 Release Notes for information about the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* undertow: HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511)\n\n* undertow: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* undertow: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* undertow: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default (CVE-2019-14838)\n\n* wildfly: wildfly-security-manager: security manager authorization bypass (CVE-2019-14843)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:4020", "url": "https://access.redhat.com/errata/RHSA-2019:4020" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/", "url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/html-single/installation_guide/", "url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/html-single/installation_guide/" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "1751227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751227" }, { "category": "external", "summary": "1752980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752980" }, { "category": "external", "summary": "JBEAP-17075", "url": "https://issues.redhat.com/browse/JBEAP-17075" }, { "category": "external", "summary": "JBEAP-17220", "url": "https://issues.redhat.com/browse/JBEAP-17220" }, { "category": "external", "summary": "JBEAP-17365", "url": "https://issues.redhat.com/browse/JBEAP-17365" }, { "category": "external", "summary": "JBEAP-17476", "url": "https://issues.redhat.com/browse/JBEAP-17476" }, { "category": "external", "summary": "JBEAP-17478", "url": "https://issues.redhat.com/browse/JBEAP-17478" }, { "category": "external", "summary": "JBEAP-17483", "url": "https://issues.redhat.com/browse/JBEAP-17483" }, { "category": "external", "summary": "JBEAP-17495", "url": "https://issues.redhat.com/browse/JBEAP-17495" }, { "category": "external", "summary": "JBEAP-17496", "url": "https://issues.redhat.com/browse/JBEAP-17496" }, { "category": "external", "summary": "JBEAP-17513", "url": "https://issues.redhat.com/browse/JBEAP-17513" }, { "category": "external", "summary": "JBEAP-17521", "url": "https://issues.redhat.com/browse/JBEAP-17521" }, { "category": "external", "summary": "JBEAP-17523", "url": "https://issues.redhat.com/browse/JBEAP-17523" }, { "category": "external", "summary": "JBEAP-17547", "url": "https://issues.redhat.com/browse/JBEAP-17547" }, { "category": "external", "summary": "JBEAP-17548", "url": "https://issues.redhat.com/browse/JBEAP-17548" }, { "category": "external", "summary": "JBEAP-17560", "url": "https://issues.redhat.com/browse/JBEAP-17560" }, { "category": "external", "summary": "JBEAP-17579", "url": "https://issues.redhat.com/browse/JBEAP-17579" }, { "category": "external", "summary": "JBEAP-17582", "url": "https://issues.redhat.com/browse/JBEAP-17582" }, { "category": "external", "summary": "JBEAP-17605", "url": "https://issues.redhat.com/browse/JBEAP-17605" }, { "category": "external", "summary": "JBEAP-17631", "url": "https://issues.redhat.com/browse/JBEAP-17631" }, { "category": "external", "summary": "JBEAP-17647", "url": "https://issues.redhat.com/browse/JBEAP-17647" }, { "category": "external", "summary": "JBEAP-17665", "url": "https://issues.redhat.com/browse/JBEAP-17665" }, { "category": "external", "summary": "JBEAP-17722", "url": "https://issues.redhat.com/browse/JBEAP-17722" }, { "category": "external", "summary": "JBEAP-17874", "url": "https://issues.redhat.com/browse/JBEAP-17874" }, { "category": "external", "summary": "JBEAP-17880", "url": "https://issues.redhat.com/browse/JBEAP-17880" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_4020.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 8 security update", "tracking": { "current_release_date": "2025-03-15T19:44:28+00:00", "generator": { "date": "2025-03-15T19:44:28+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.1" } }, "id": "RHSA-2019:4020", "initial_release_date": "2019-11-26T19:57:14+00:00", "revision_history": [ { "date": "2019-11-26T19:57:14+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-11-26T19:57:14+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-03-15T19:44:28+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss EAP 7.2 for RHEL 8", "product": { "name": "Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el8" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" }, { "branches": [ { "category": "product_version", "name": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "product": { "name": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "product_id": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00005.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "product": { "name": "eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "product_id": "eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00005.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "product_id": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "product_id": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "product_id": "eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "product_id": "eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "product_id": "eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "product": { "name": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "product_id": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00003.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "product": { "name": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "product_id": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00002.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product": { "name": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product_id": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product": { "name": "eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product_id": "eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product": { "name": "eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product_id": "eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product": { "name": "eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product_id": "eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product": { "name": "eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product_id": "eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product": { "name": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product_id": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product": { "name": "eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product_id": "eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product": { "name": "eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product_id": "eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product": { "name": "eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product_id": "eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product": { "name": "eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product_id": "eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "product_id": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "product_id": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "product": { "name": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "product_id": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00002.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "product": { "name": "eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "product_id": "eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00002.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "product": { "name": "eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "product_id": "eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00002.1.el8eap?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "product": { "name": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "product_id": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00005.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "product": { "name": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "product_id": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "product": { "name": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "product_id": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "product": { "name": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "product_id": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00003.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "product": { "name": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "product_id": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00002.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "product": { "name": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "product_id": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "product": { "name": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "product_id": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "product": { "name": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "product_id": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "product": { "name": "eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "product_id": "eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "product": { "name": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "product_id": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "product": { "name": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "product_id": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "product": { "name": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "product_id": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "product": { "name": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "product_id": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "product": { "name": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "product_id": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "product": { "name": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "product_id": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "product": { "name": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "product_id": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "product": { "name": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "product_id": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "product": { "name": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "product_id": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src", "product": { "name": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src", "product_id": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "product": { "name": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "product_id": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "product": { "name": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "product_id": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "product": { "name": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "product_id": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00002.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "product": { "name": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "product_id": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "product": { "name": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "product_id": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=x86_64" } } }, { "category": "product_version", "name": "eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "product": { "name": "eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "product_id": "eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src" }, "product_reference": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch" }, "product_reference": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src" }, "product_reference": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch" }, "product_reference": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src" }, "product_reference": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src" }, "product_reference": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src" }, "product_reference": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src" }, "product_reference": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src" }, "product_reference": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src" }, "product_reference": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src" }, "product_reference": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src" }, "product_reference": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src" }, "product_reference": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch" }, "product_reference": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src" }, "product_reference": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch" }, "product_reference": "eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch" }, "product_reference": "eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch" }, "product_reference": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src" }, "product_reference": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch" }, "product_reference": "eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch" }, "product_reference": "eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch" }, "product_reference": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src" }, "product_reference": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch" }, "product_reference": "eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch" }, "product_reference": "eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch" }, "product_reference": "eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch" }, "product_reference": "eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch" }, "product_reference": "eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src" }, "product_reference": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src" }, "product_reference": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch" }, "product_reference": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src" }, "product_reference": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src" }, "product_reference": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src" }, "product_reference": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src" }, "product_reference": "eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch" }, "product_reference": "eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch" }, "product_reference": "eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src" }, "product_reference": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src" }, "product_reference": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64 as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64" }, "product_reference": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64 as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64" }, "product_reference": "eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" }, "product_reference": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-9511", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741860" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker can request a large amount of data by manipulating window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this queue can consume excess CPU, memory, or both, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: large amount of data requests leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "There are no mitigations available for nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "RHBZ#1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9511", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T19:57:14+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied.\n\nFor details about how to apply this update, see:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4020" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: large amount of data requests leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T19:57:14+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied.\n\nFor details about how to apply this update, see:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4020" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T19:57:14+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied.\n\nFor details about how to apply this update, see:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4020" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T19:57:14+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied.\n\nFor details about how to apply this update, see:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4020" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "F\u00e1bio Magalh\u00e3es de Andrade" ], "organization": "Sonda Ativas" }, { "names": [ "Juliano de Castro Santos", "Leonard Lunardi" ], "organization": "UnimedBH" } ], "cve": "CVE-2019-14838", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2019-08-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1751227" } ], "notes": [ { "category": "description", "text": "It was found that Wildfly users had default user permissions set incorrectly. A malicious user could use this flaw to access unauthorized controls for the application server.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14838" }, { "category": "external", "summary": "RHBZ#1751227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751227" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14838", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14838" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14838", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14838" }, { "category": "external", "summary": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14838", "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14838" } ], "release_date": "2019-10-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T19:57:14+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied.\n\nFor details about how to apply this update, see:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4020" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default" }, { "cve": "CVE-2019-14843", "cwe": { "id": "CWE-592", "name": "CWE-592" }, "discovery_date": "2019-09-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1752980" } ], "notes": [ { "category": "description", "text": "A flaw was found in Wildfly Security Manager, running under JDK 11 or 8, that authorized requests for any requester. This flaw could be used by a malicious app deployed on the app server to access unauthorized information and possibly conduct further attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-security-manager: security manager authorization bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14843" }, { "category": "external", "summary": "RHBZ#1752980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752980" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14843", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14843" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14843", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14843" } ], "release_date": "2019-09-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T19:57:14+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied.\n\nFor details about how to apply this update, see:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4020" }, { "category": "workaround", "details": "This flaw only affects the Security Manager running under JDK 11 or 8. To mitigate exposure to this flaw, do not run under those JDK versions.", "product_ids": [ "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "wildfly-security-manager: security manager authorization bypass" } ] }
rhsa-2019:4273
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the container-tools:1.0 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.\n\nSecurity Fix(es):\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:4273", "url": "https://access.redhat.com/errata/RHSA-2019:4273" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_4273.json" } ], "title": "Red Hat Security Advisory: container-tools:1.0 security update", "tracking": { "current_release_date": "2025-03-15T19:44:59+00:00", "generator": { "date": "2025-03-15T19:44:59+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.1" } }, "id": "RHSA-2019:4273", "initial_release_date": "2019-12-17T12:56:46+00:00", "revision_history": [ { "date": "2019-12-17T12:56:46+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-12-17T12:56:46+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-03-15T19:44:59+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "container-tools:1.0:8010020191126173920:c294d161", "product": { "name": "container-tools:1.0:8010020191126173920:c294d161", "product_id": "container-tools:1.0:8010020191126173920:c294d161", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/[email protected]:8010020191126173920:c294d161" } } }, { "category": "product_version", "name": "container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.noarch", "product": { "name": "container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.noarch", "product_id": "container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=noarch\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-docker-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.noarch", "product": { "name": "podman-docker-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.noarch", "product_id": "podman-docker-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.src", "product": { "name": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.src", "product_id": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=src" } } }, { "category": "product_version", "name": "container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.src", "product": { "name": "container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.src", "product_id": "container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=src\u0026epoch=2" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.src", "product": { "name": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.src", "product_id": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=src" } } }, { "category": "product_version", "name": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.src", "product": { "name": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.src", "product_id": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=src" } } }, { "category": "product_version", "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.src", "product": { "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.src", "product_id": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.src", "product": { "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.src", "product_id": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=src\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.src", "product": { "name": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.src", "product_id": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=src" } } }, { "category": "product_version", "name": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.src", "product": { "name": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.src", "product_id": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=src" } } }, { "category": "product_version", "name": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.src", "product": { "name": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.src", "product_id": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4903%2B9bde5d6c?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.src", "product": { "name": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.src", "product_id": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4308%2B9d868e48?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "product": { "name": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "product_id": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=x86_64" } } }, { "category": "product_version", "name": "buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "product": { "name": "buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "product_id": "buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=x86_64" } } }, { "category": "product_version", "name": "buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "product": { "name": "buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "product_id": "buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=x86_64" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "product": { "name": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "product_id": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=x86_64" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "product": { "name": "containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "product_id": "containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=x86_64" } } }, { "category": "product_version", "name": "containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "product": { "name": "containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "product_id": "containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@0.7.4-4.git9ebe139.module%2Bel8.1.0%2B4908%2B72a45cef?arch=x86_64" } } }, { "category": "product_version", "name": "containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "product": { "name": "containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "product_id": "containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4903%2B9bde5d6c?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "product": { "name": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "product_id": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=x86_64" } } }, { "category": "product_version", "name": "fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "product": { "name": "fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "product_id": "fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=x86_64" } } }, { "category": "product_version", "name": "fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "product": { "name": "fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "product_id": "fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=x86_64" } } }, { "category": "product_version", "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "product": { "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "product_id": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "product": { "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "product_id": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "product": { "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "product_id": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "product": { "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "product_id": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "product": { "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "product_id": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "product": { "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "product_id": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "product": { "name": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "product_id": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=x86_64" } } }, { "category": "product_version", "name": "podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "product": { "name": "podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "product_id": "podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=x86_64" } } }, { "category": "product_version", "name": "podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "product": { "name": "podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "product_id": "podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=x86_64" } } }, { "category": "product_version", "name": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "product": { "name": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "product_id": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=x86_64" } } }, { "category": "product_version", "name": "runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "product": { "name": "runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "product_id": "runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=x86_64" } } }, { "category": "product_version", "name": "runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "product": { "name": "runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "product_id": "runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=x86_64" } } }, { "category": "product_version", "name": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "product": { "name": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "product_id": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4903%2B9bde5d6c?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "product": { "name": "skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "product_id": "skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4903%2B9bde5d6c?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "product": { "name": "skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "product_id": "skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4903%2B9bde5d6c?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "product": { "name": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "product_id": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4308%2B9d868e48?arch=x86_64" } } }, { "category": "product_version", "name": "slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "product": { "name": "slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "product_id": "slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4308%2B9d868e48?arch=x86_64" } } }, { "category": "product_version", "name": "slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "product": { "name": "slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "product_id": "slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4308%2B9d868e48?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "product": { "name": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "product_id": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=s390x" } } }, { "category": "product_version", "name": "buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "product": { "name": "buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "product_id": "buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=s390x" } } }, { "category": "product_version", "name": "buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "product": { "name": "buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "product_id": "buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=s390x" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "product": { "name": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "product_id": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=s390x" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "product": { "name": "containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "product_id": "containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=s390x" } } }, { "category": "product_version", "name": "containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "product": { "name": "containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "product_id": "containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@0.7.4-4.git9ebe139.module%2Bel8.1.0%2B4908%2B72a45cef?arch=s390x" } } }, { "category": "product_version", "name": "containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "product": { "name": "containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "product_id": "containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4903%2B9bde5d6c?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "product": { "name": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "product_id": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=s390x" } } }, { "category": "product_version", "name": "fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "product": { "name": "fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "product_id": "fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=s390x" } } }, { "category": "product_version", "name": "fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "product": { "name": "fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "product_id": "fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=s390x" } } }, { "category": "product_version", "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "product": { "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "product_id": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "product": { "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "product_id": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "product": { "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "product_id": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "product": { "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "product_id": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "product": { "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "product_id": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "product": { "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "product_id": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "product": { "name": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "product_id": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=s390x" } } }, { "category": "product_version", "name": "podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "product": { "name": "podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "product_id": "podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=s390x" } } }, { "category": "product_version", "name": "podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "product": { "name": "podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "product_id": "podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=s390x" } } }, { "category": "product_version", "name": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "product": { "name": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "product_id": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=s390x" } } }, { "category": "product_version", "name": "runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "product": { "name": "runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "product_id": "runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=s390x" } } }, { "category": "product_version", "name": "runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "product": { "name": "runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "product_id": "runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=s390x" } } }, { "category": "product_version", "name": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "product": { "name": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "product_id": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4903%2B9bde5d6c?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "product": { "name": "skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "product_id": "skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4903%2B9bde5d6c?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "product": { "name": "skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "product_id": "skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4903%2B9bde5d6c?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "product": { "name": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "product_id": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4308%2B9d868e48?arch=s390x" } } }, { "category": "product_version", "name": "slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "product": { "name": "slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "product_id": "slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4308%2B9d868e48?arch=s390x" } } }, { "category": "product_version", "name": "slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "product": { "name": "slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "product_id": "slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4308%2B9d868e48?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "product": { "name": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "product_id": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=ppc64le" } } }, { "category": "product_version", "name": "buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "product": { "name": "buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "product_id": "buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=ppc64le" } } }, { "category": "product_version", "name": "buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "product": { "name": "buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "product_id": "buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=ppc64le" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "product": { "name": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "product_id": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=ppc64le" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "product": { "name": "containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "product_id": "containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=ppc64le" } } }, { "category": "product_version", "name": "containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "product": { "name": "containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "product_id": "containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@0.7.4-4.git9ebe139.module%2Bel8.1.0%2B4908%2B72a45cef?arch=ppc64le" } } }, { "category": "product_version", "name": "containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "product": { "name": "containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "product_id": "containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4903%2B9bde5d6c?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "product": { "name": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "product_id": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=ppc64le" } } }, { "category": "product_version", "name": "fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "product": { "name": "fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "product_id": "fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=ppc64le" } } }, { "category": "product_version", "name": "fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "product": { "name": "fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "product_id": "fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=ppc64le" } } }, { "category": "product_version", "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "product": { "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "product_id": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "product": { "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "product_id": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "product": { "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "product_id": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "product": { "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "product_id": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "product": { "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "product_id": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "product": { "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "product_id": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "product": { "name": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "product_id": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=ppc64le" } } }, { "category": "product_version", "name": "podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "product": { "name": "podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "product_id": "podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=ppc64le" } } }, { "category": "product_version", "name": "podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "product": { "name": "podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "product_id": "podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=ppc64le" } } }, { "category": "product_version", "name": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "product": { "name": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "product_id": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=ppc64le" } } }, { "category": "product_version", "name": "runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "product": { "name": "runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "product_id": "runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=ppc64le" } } }, { "category": "product_version", "name": "runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "product": { "name": "runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "product_id": "runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=ppc64le" } } }, { "category": "product_version", "name": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "product": { "name": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "product_id": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4903%2B9bde5d6c?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "product": { "name": "skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "product_id": "skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4903%2B9bde5d6c?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "product": { "name": "skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "product_id": "skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4903%2B9bde5d6c?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "product": { "name": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "product_id": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4308%2B9d868e48?arch=ppc64le" } } }, { "category": "product_version", "name": "slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "product": { "name": "slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "product_id": "slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4308%2B9d868e48?arch=ppc64le" } } }, { "category": "product_version", "name": "slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "product": { "name": "slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "product_id": "slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4308%2B9d868e48?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "product": { "name": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "product_id": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=aarch64" } } }, { "category": "product_version", "name": "buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "product": { "name": "buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "product_id": "buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=aarch64" } } }, { "category": "product_version", "name": "buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "product": { "name": "buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "product_id": "buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=aarch64" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "product": { "name": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "product_id": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=aarch64" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "product": { "name": "containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "product_id": "containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=aarch64" } } }, { "category": "product_version", "name": "containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "product": { "name": "containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "product_id": "containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@0.7.4-4.git9ebe139.module%2Bel8.1.0%2B4908%2B72a45cef?arch=aarch64" } } }, { "category": "product_version", "name": "containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "product": { "name": "containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "product_id": "containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4903%2B9bde5d6c?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "product": { "name": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "product_id": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=aarch64" } } }, { "category": "product_version", "name": "fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "product": { "name": "fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "product_id": "fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=aarch64" } } }, { "category": "product_version", "name": "fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "product": { "name": "fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "product_id": "fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=aarch64" } } }, { "category": "product_version", "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "product": { "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "product_id": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "product": { "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "product_id": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "product": { "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "product_id": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "product": { "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "product_id": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "product": { "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "product_id": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "product": { "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "product_id": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "product": { "name": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "product_id": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=aarch64" } } }, { "category": "product_version", "name": "podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "product": { "name": "podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "product_id": "podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=aarch64" } } }, { "category": "product_version", "name": "podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "product": { "name": "podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "product_id": "podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=aarch64" } } }, { "category": "product_version", "name": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "product": { "name": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "product_id": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=aarch64" } } }, { "category": "product_version", "name": "runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "product": { "name": "runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "product_id": "runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=aarch64" } } }, { "category": "product_version", "name": "runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "product": { "name": "runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "product_id": "runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=aarch64" } } }, { "category": "product_version", "name": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "product": { "name": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "product_id": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4903%2B9bde5d6c?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "product": { "name": "skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "product_id": "skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4903%2B9bde5d6c?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "product": { "name": "skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "product_id": "skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4903%2B9bde5d6c?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "product": { "name": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "product_id": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4308%2B9d868e48?arch=aarch64" } } }, { "category": "product_version", "name": "slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "product": { "name": "slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "product_id": "slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4308%2B9d868e48?arch=aarch64" } } }, { "category": "product_version", "name": "slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "product": { "name": "slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "product_id": "slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4308%2B9d868e48?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, "product_reference": "container-tools:1.0:8010020191126173920:c294d161", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64" }, "product_reference": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le" }, "product_reference": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x" }, "product_reference": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.src as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.src" }, "product_reference": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64" }, "product_reference": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64" }, "product_reference": "buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le" }, "product_reference": "buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x" }, "product_reference": "buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64" }, "product_reference": "buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64" }, "product_reference": "buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le" }, "product_reference": "buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x" }, "product_reference": "buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64" }, "product_reference": "buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.noarch as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.noarch" }, "product_reference": "container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.src as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.src" }, "product_reference": "container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64" }, "product_reference": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le" }, "product_reference": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x" }, "product_reference": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.src as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.src" }, "product_reference": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64" }, "product_reference": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64" }, "product_reference": "containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le" }, "product_reference": "containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x" }, "product_reference": "containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64" }, "product_reference": "containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64" }, "product_reference": "containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le" }, "product_reference": "containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x" }, "product_reference": "containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64" }, "product_reference": "containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64" }, "product_reference": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le" }, "product_reference": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x" }, "product_reference": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.src as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.src" }, "product_reference": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64" }, "product_reference": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64" }, "product_reference": "fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le" }, "product_reference": "fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x" }, "product_reference": "fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64" }, "product_reference": "fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64" }, "product_reference": "fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le" }, "product_reference": "fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x" }, "product_reference": "fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64" }, "product_reference": "fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64" }, "product_reference": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le" }, "product_reference": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x" }, "product_reference": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.src as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.src" }, "product_reference": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64" }, "product_reference": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64" }, "product_reference": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le" }, "product_reference": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x" }, "product_reference": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64" }, "product_reference": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64" }, "product_reference": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le" }, "product_reference": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x" }, "product_reference": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64" }, "product_reference": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64" }, "product_reference": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le" }, "product_reference": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x" }, "product_reference": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.src as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.src" }, "product_reference": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64" }, "product_reference": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64" }, "product_reference": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le" }, "product_reference": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x" }, "product_reference": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64" }, "product_reference": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64" }, "product_reference": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le" }, "product_reference": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x" }, "product_reference": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64" }, "product_reference": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64" }, "product_reference": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le" }, "product_reference": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x" }, "product_reference": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.src as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.src" }, "product_reference": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64" }, "product_reference": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64" }, "product_reference": "podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le" }, "product_reference": "podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x" }, "product_reference": "podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64" }, "product_reference": "podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64" }, "product_reference": "podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le" }, "product_reference": "podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x" }, "product_reference": "podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64" }, "product_reference": "podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-docker-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.noarch as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-docker-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.noarch" }, "product_reference": "podman-docker-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64" }, "product_reference": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le" }, "product_reference": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x" }, "product_reference": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.src as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.src" }, "product_reference": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64" }, "product_reference": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64" }, "product_reference": "runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le" }, "product_reference": "runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x" }, "product_reference": "runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64" }, "product_reference": "runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64" }, "product_reference": "runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le" }, "product_reference": "runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x" }, "product_reference": "runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64" }, "product_reference": "runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64" }, "product_reference": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le" }, "product_reference": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x" }, "product_reference": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.src as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.src" }, "product_reference": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64" }, "product_reference": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64" }, "product_reference": "skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le" }, "product_reference": "skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x" }, "product_reference": "skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64" }, "product_reference": "skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64" }, "product_reference": "skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le" }, "product_reference": "skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x" }, "product_reference": "skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64" }, "product_reference": "skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64" }, "product_reference": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le" }, "product_reference": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x" }, "product_reference": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.src as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.src" }, "product_reference": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64" }, "product_reference": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64" }, "product_reference": "slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le" }, "product_reference": "slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x" }, "product_reference": "slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64" }, "product_reference": "slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64" }, "product_reference": "slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le" }, "product_reference": "slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x" }, "product_reference": "slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64" }, "product_reference": "slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-docker-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-17T12:56:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-docker-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4273" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-docker-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-docker-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-17T12:56:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-docker-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4273" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-docker-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" } ] }
RHSA-2024:5856
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "A security update is now available for Red Hat JBoss Enterprise Application Platform 7.1 for Red Hat Enterprise Linux 7.\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 7.1.7 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.1.6, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.1.7 Release Notes for information about the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* undertow: EAP: field-name is not parsed in accordance to RFC7230 [eap-7.1.z] (CVE-2020-1710)\n\n* commons-beanutils: apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default [eap-7.1.z] (CVE-2019-10086)\n\n* log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink [eap-7.1.z] (CVE-2022-23302)\n\n* jackson-databind: default typing mishandling leading to remote code execution [eap-7.1.z] (CVE-2019-14379)\n\n* undertow: HTTP/2: flood using HEADERS frames results in unbounded memory growth [eap-7.1.z] (CVE-2019-9514)\n\n* undertow: AJP File Read/Inclusion Vulnerability [eap-7.1.z] (CVE-2020-1745)\n\n* undertow: HTTP/2: large amount of data requests leads to denial of service [eap-7.1.z] (CVE-2019-9511)\n\n* undertow: servletPath in normalized incorrectly leading to dangerous application mapping which could result in security bypass [eap-7.1.z] (CVE-2020-1757)\n\n* undertow: possible Denial Of Service (DOS) in Undertow HTTP server listening on HTTPS [eap-7.1.z] (CVE-2019-14888)\n\n* log4j: Unsafe deserialization flaw in Chainsaw log viewer [eap-7.1.z] (CVE-2022-23307)\n\n* netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header [eap-7.1.z] (CVE-2019-20445)\n\n* log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender [eap-7.1.z] (CVE-2021-4104)\n\n* undertow: HTTP/2: flood using SETTINGS frames results in unbounded memory growth [eap-7.1.z] (CVE-2019-9515)\n\n* infinispan-core: infinispan: invokeAccessibly method from ReflectionUtil class allows to invoke private methods [eap-7.1.z] (CVE-2019-10174)\n\n* log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender [eap-7.1.z] (CVE-2022-23305)\n\n* jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution [eap-7.1.z] (CVE-2019-12384)\n\n* wildfly-security-manager: security manager authorization bypass (CVE-2019-14843)\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers (CVE-2019-16869)\n\n* jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.* (CVE-2019-17531)\n\n* netty: HTTP request smuggling (CVE-2019-20444)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:5856", "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.1", "url": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.1" }, { "category": "external", "summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.1/html-single/installation_guide/index", "url": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.1/html-single/installation_guide/index" }, { "category": "external", "summary": "1703469", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1703469" }, { "category": "external", "summary": "1725807", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1725807" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1737517", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1737517" }, { "category": "external", "summary": "1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "1752770", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752770" }, { "category": "external", "summary": "1752980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752980" }, { "category": "external", "summary": "1758619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758619" }, { "category": "external", "summary": "1767483", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767483" }, { "category": "external", "summary": "1772464", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772464" }, { "category": "external", "summary": "1775293", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775293" }, { "category": "external", "summary": "1793970", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793970" }, { "category": "external", "summary": "1798509", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798509" }, { "category": "external", "summary": "1798524", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798524" }, { "category": "external", "summary": "1807305", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1807305" }, { "category": "external", "summary": "2031667", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031667" }, { "category": "external", "summary": "2041949", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041949" }, { "category": "external", "summary": "2041959", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041959" }, { "category": "external", "summary": "2041967", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041967" }, { "category": "external", "summary": "JBEAP-24826", "url": "https://issues.redhat.com/browse/JBEAP-24826" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_5856.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.1.7 on RHEL 7 security update", "tracking": { "current_release_date": "2025-04-09T17:34:33+00:00", "generator": { "date": "2025-04-09T17:34:33+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.2" } }, "id": "RHSA-2024:5856", "initial_release_date": "2024-08-26T11:05:47+00:00", "revision_history": [ { "date": "2024-08-26T11:05:47+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-08-26T11:05:47+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-04-09T17:34:33+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product": { "name": "Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform_eus:7.1::el7" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" }, { "branches": [ { "category": "product_version", "name": "eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "product": { "name": "eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "product_id": "eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.ep7.el7?arch=src" } } }, { "category": "product_version", "name": "eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "product": { "name": "eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "product_id": "eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.ep7.el7?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "product": { "name": "eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "product_id": "eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.ep7.el7?arch=src" } } }, { "category": "product_version", "name": "eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "product": { "name": "eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "product_id": "eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00002.1.ep7.el7?arch=src" } } }, { "category": "product_version", "name": "eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "product": { "name": "eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "product_id": "eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.ep7.el7?arch=src" } } }, { "category": "product_version", "name": "eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "product": { "name": "eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "product_id": "eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00001.1.ep7.el7?arch=src" } } }, { "category": "product_version", "name": "eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "product": { "name": "eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "product_id": "eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00002.1.ep7.el7?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "product": { "name": "eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "product_id": "eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00002.1.ep7.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "product": { "name": "eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "product_id": "eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "product": { "name": "eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "product_id": "eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "product": { "name": "eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "product_id": "eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "product": { "name": "eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "product_id": "eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "product": { "name": "eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "product_id": "eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00002.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "product": { "name": "eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "product_id": "eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "product": { "name": "eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "product_id": "eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "product": { "name": "eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "product_id": "eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "product": { "name": "eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "product_id": "eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "product": { "name": "eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "product_id": "eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "product": { "name": "eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "product_id": "eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "product": { "name": "eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "product_id": "eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00001.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "product": { "name": "eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "product_id": "eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00002.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "product": { "name": "eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "product_id": "eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00002.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "product": { "name": "eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "product_id": "eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00002.1.ep7.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch" }, "product_reference": "eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src" }, "product_reference": "eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch" }, "product_reference": "eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src" }, "product_reference": "eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch" }, "product_reference": "eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch" }, "product_reference": "eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch" }, "product_reference": "eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch" }, "product_reference": "eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch" }, "product_reference": "eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch" }, "product_reference": "eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src" }, "product_reference": "eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch" }, "product_reference": "eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src" }, "product_reference": "eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch" }, "product_reference": "eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src" }, "product_reference": "eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch" }, "product_reference": "eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch" }, "product_reference": "eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src" }, "product_reference": "eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" }, "product_reference": "eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src" }, "product_reference": "eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch" }, "product_reference": "eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src" }, "product_reference": "eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" }, "product_reference": "eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-9511", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741860" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker can request a large amount of data by manipulating window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this queue can consume excess CPU, memory, or both, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: large amount of data requests leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "There are no mitigations available for nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "RHBZ#1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9511", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: large amount of data requests leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "cve": "CVE-2019-10086", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-10-31T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1767483" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Apache Commons BeanUtils, where the class property in PropertyUtilsBean is not suppressed by default. This flaw allows an attacker to access the classloader.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src" ], "known_not_affected": [ "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10086" }, { "category": "external", "summary": "RHBZ#1767483", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767483" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10086", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10086" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10086", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10086" }, { "category": "external", "summary": "https://commons.apache.org/proper/commons-beanutils/javadocs/v1.9.4/RELEASE-NOTES.txt", "url": "https://commons.apache.org/proper/commons-beanutils/javadocs/v1.9.4/RELEASE-NOTES.txt" } ], "release_date": "2019-08-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "category": "workaround", "details": "There is no currently known mitigation for this flaw.", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default" }, { "cve": "CVE-2019-10174", "cwe": { "id": "CWE-470", "name": "Use of Externally-Controlled Input to Select Classes or Code (\u0027Unsafe Reflection\u0027)" }, "discovery_date": "2018-10-25T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1703469" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Infinispan such that the invokeAccessibly method from the public class ReflectionUtil allows any application class to invoke private methods in any class with Infinispan\u0027s privileges. The attacker can use reflection to introduce new, malicious behavior into the application.", "title": "Vulnerability description" }, { "category": "summary", "text": "infinispan: invokeAccessibly method from ReflectionUtil class allows to invoke private methods", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform\u0027s OpenDaylight contains the vulnerable library. This library is a requirement of other dependencies (Karaf and Hibernate). Under supported deployments, the vulnerable functionality is not utilized. Based on this, no OpenDaylight versions will not be fixed.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch" ], "known_not_affected": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10174" }, { "category": "external", "summary": "RHBZ#1703469", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1703469" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10174", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10174" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10174", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10174" } ], "release_date": "2019-11-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "category": "workaround", "details": "There is no known mitigation for this issue.", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "infinispan: invokeAccessibly method from ReflectionUtil class allows to invoke private methods" }, { "cve": "CVE-2019-12384", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-06-25T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1725807" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in FasterXML jackson-databind in versions prior to 2.9.9. The vulnerability would permit polymorphic deserialization of malicious objects using the logback-core gadget when used in conjunction with polymorphic type handling methods such as `enableDefaultTyping()` or when @JsonTypeInfo is using `Id.CLASS` or `Id.MINIMAL_CLASS` or in any other way which ObjectMapper.readValue might instantiate objects from unsafe sources. Depending on the classpath content, remote code execution may be possible.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack\u0027s OpenDaylight does not use logback in any supported configuration. Therefore, the prerequisites for this vulnerability are not present and OpenDaylight is not affected.\n\nThis vulnerability relies on logback-core (ch.qos.logback.core) being present in the application\u0027s ClassPath. Logback-core is not packaged as an RPM for Red Hat Enterprise Linux or Red Hat Software Collections. Applications using jackson-databind that do not also use logback-core are not impacted by this vulnerability.\n\nThis issue affects the versions of jackson-databind bundled with candlepin as shipped with Red Hat Satellite 6.x. However the affected code is NOT used at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src" ], "known_not_affected": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-12384" }, { "category": "external", "summary": "RHBZ#1725807", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1725807" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-12384", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12384" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-12384", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12384" } ], "release_date": "2019-06-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution" }, { "cve": "CVE-2019-14379", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-07-29T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1737517" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in FasterXML jackson-databind, where it would permit polymorphic deserialization of malicious objects using the ehcache and logback JNDI gadgets when used in conjunction with polymorphic type handling methods such as `enableDefaultTyping()` or when @JsonTypeInfo is using `Id.CLASS` or `Id.MINIMAL_CLASS` or in any other way which ObjectMapper.readValue might instantiate objects from unsafe sources. An attacker could use this flaw to execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: default typing mishandling leading to remote code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nSimilarly, Satellite 6 does not enable polymorphic unmarshmalling, which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src" ], "known_not_affected": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14379" }, { "category": "external", "summary": "RHBZ#1737517", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1737517" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14379", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14379" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14379", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14379" } ], "release_date": "2019-07-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: default typing mishandling leading to remote code execution" }, { "cve": "CVE-2019-14843", "cwe": { "id": "CWE-592", "name": "CWE-592" }, "discovery_date": "2019-09-17T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1752980" } ], "notes": [ { "category": "description", "text": "A flaw was found in Wildfly Security Manager, running under JDK 11 or 8, that authorized requests for any requester. This flaw could be used by a malicious app deployed on the app server to access unauthorized information and possibly conduct further attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-security-manager: security manager authorization bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ], "known_not_affected": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14843" }, { "category": "external", "summary": "RHBZ#1752980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752980" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14843", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14843" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14843", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14843" } ], "release_date": "2019-09-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "category": "workaround", "details": "This flaw only affects the Security Manager running under JDK 11 or 8. To mitigate exposure to this flaw, do not run under those JDK versions.", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "wildfly-security-manager: security manager authorization bypass" }, { "acknowledgments": [ { "names": [ "Henning Baldersheim", "H\u00e5vard Pettersen" ], "organization": "Verizon Media" } ], "cve": "CVE-2019-14888", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-10-25T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1772464" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the Undertow HTTP server listening on HTTPS. An attacker can target the HTTPS port to carry out a Denial Of Service (DOS) to make the service unavailable on SSL.", "title": "Vulnerability description" }, { "category": "summary", "text": "undertow: possible Denial Of Service (DOS) in Undertow HTTP server listening on HTTPS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src" ], "known_not_affected": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14888" }, { "category": "external", "summary": "RHBZ#1772464", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772464" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14888", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14888" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14888", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14888" } ], "release_date": "2020-01-20T12:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "category": "workaround", "details": "Enable HTTP2 (enable-http2=\"true\") in the undertow\u0027s HTTPS settings.", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "undertow: possible Denial Of Service (DOS) in Undertow HTTP server listening on HTTPS" }, { "cve": "CVE-2019-16869", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2019-09-26T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1758619" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty, where whitespace before the colon in HTTP headers is mishandled. This flaw allows an attacker to cause HTTP request smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that this vulnerability does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships vulnerable netty version embedded in Candlepin, however, is not directly vulnerable since HTTP requests are handled by Tomcat and not netty.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch" ], "known_not_affected": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-16869" }, { "category": "external", "summary": "RHBZ#1758619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758619" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16869", "url": "https://www.cve.org/CVERecord?id=CVE-2019-16869" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16869", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16869" } ], "release_date": "2019-09-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers" }, { "cve": "CVE-2019-17531", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2019-11-21T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1775293" } ], "notes": [ { "category": "description", "text": "A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the apache-log4j-extra (version 1.2.x) jar in the classpath, and an attacker can provide a JNDI service to access, it is possible to make the service execute a malicious payload.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.*", "title": "Vulnerability summary" }, { "category": "other", "text": "Satellite 6 does not enable polymorphic unmarshmalling, which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenShift Container Platform does ship the vulnerable component, but does not enable the unsafe conditions needed to exploit, lowering their vulnerability impact.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src" ], "known_not_affected": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-17531" }, { "category": "external", "summary": "RHBZ#1775293", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775293" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-17531", "url": "https://www.cve.org/CVERecord?id=CVE-2019-17531" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-17531", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17531" } ], "release_date": "2019-10-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.*" }, { "cve": "CVE-2019-20444", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-30T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1798524" } ], "notes": [ { "category": "description", "text": "A HTTP smuggling flaw was found in HttpObjectDecoder.java in Netty in versions prior to version 4.1.44. HTTP headers with an invalid fold, in this case CRLF (carriage return, line feed) without being followed by SP (space) or HTAB (horizontal tab), result in situations where headers can be misread. Data integrity is the highest threat with this vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP request smuggling", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that the previous vulnerability, CVE-2019-16869, does not pose a substantial practical threat to ElasticSearch 6. We agree that these issues would be difficult to exploit on OpenShift Container Platform so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships a vulnerable version of netty embedded in Candlepin. However, the flaw can not be triggered in that context, because HTTP requests are handled by Tomcat, not by netty. A future release may fix this.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch" ], "known_not_affected": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20444" }, { "category": "external", "summary": "RHBZ#1798524", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798524" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20444", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20444" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20444", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20444" }, { "category": "external", "summary": "https://github.com/elastic/elasticsearch/issues/49396", "url": "https://github.com/elastic/elasticsearch/issues/49396" } ], "release_date": "2020-01-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP request smuggling" }, { "cve": "CVE-2019-20445", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-20T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1798509" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty before version 4.1.44, where it accepted multiple Content-Length headers and also accepted both Transfer-Encoding, as well as Content-Length headers where it should reject the message under such circumstances. In circumstances where Netty is used in the context of a server, it could result in a viable HTTP smuggling vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that the previous vulnerability, CVE-2019-16869, does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit both these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships a vulnerable version of netty embedded in Candlepin. However, the flaw can not be triggered in that context, because HTTP requests are handled by Tomcat, not by netty. A future release may fix this.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch" ], "known_not_affected": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20445" }, { "category": "external", "summary": "RHBZ#1798509", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798509" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20445", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20445" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20445", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20445" } ], "release_date": "2020-01-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header" }, { "cve": "CVE-2020-1710", "cwe": { "id": "CWE-113", "name": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)" }, "discovery_date": "2019-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1793970" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in JBoss EAP, where it does not process the header field-name in accordance with RFC7230. Whitespace between the header field-name and colon is processed, resulting in an HTTP response code of 200 instead of a bad request of 400.", "title": "Vulnerability description" }, { "category": "summary", "text": "EAP: field-name is not parsed in accordance to RFC7230", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-1710" }, { "category": "external", "summary": "RHBZ#1793970", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793970" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-1710", "url": "https://www.cve.org/CVERecord?id=CVE-2020-1710" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1710", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1710" } ], "release_date": "2020-08-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "category": "workaround", "details": "There is currently no known mitigation for this issue.", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "EAP: field-name is not parsed in accordance to RFC7230" }, { "acknowledgments": [ { "names": [ "Steve Zapantis", "Robert Roberson", "taktakdb4g" ] } ], "cve": "CVE-2020-1745", "cwe": { "id": "CWE-285", "name": "Improper Authorization" }, "discovery_date": "2020-02-24T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1807305" } ], "notes": [ { "category": "description", "text": "A file inclusion vulnerability was found in the AJP connector enabled with a default AJP configuration port of 8009 in Undertow version 2.0.29.Final and before. A remote, unauthenticated attacker could exploit this vulnerability to read web application files from a vulnerable server. In instances where the vulnerable server allows file uploads, an attacker could upload malicious JavaServer Pages (JSP) code within a variety of file types and trigger this vulnerability to gain remote code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "undertow: AJP File Read/Inclusion Vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "Please refer to the Red Hat knowledgebase article: https://access.redhat.com/solutions/4851251 and CVE page https://access.redhat.com/security/cve/cve-2020-1938", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src" ], "known_not_affected": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-1745" }, { "category": "external", "summary": "RHBZ#1807305", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1807305" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-1745", "url": "https://www.cve.org/CVERecord?id=CVE-2020-1745" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1745", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1745" }, { "category": "external", "summary": "https://meterpreter.org/cve-2020-1938-apache-tomcat-ajp-connector-remote-code-execution-vulnerability-alert/", "url": "https://meterpreter.org/cve-2020-1938-apache-tomcat-ajp-connector-remote-code-execution-vulnerability-alert/" }, { "category": "external", "summary": "https://www.cnvd.org.cn/webinfo/show/5415", "url": "https://www.cnvd.org.cn/webinfo/show/5415" }, { "category": "external", "summary": "https://www.tenable.com/blog/cve-2020-1938-ghostcat-apache-tomcat-ajp-file-readinclusion-vulnerability-cnvd-2020-10487", "url": "https://www.tenable.com/blog/cve-2020-1938-ghostcat-apache-tomcat-ajp-file-readinclusion-vulnerability-cnvd-2020-10487" } ], "release_date": "2020-02-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "category": "workaround", "details": "Please refer to the Red Hat knowledgebase article: https://access.redhat.com/solutions/4851251", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", "version": "3.1" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "undertow: AJP File Read/Inclusion Vulnerability" }, { "acknowledgments": [ { "names": [ "Fedorov Oleksii", "Keitaro Yamazaki", "Shiga Ryota" ], "organization": "LINE Corporation" } ], "cve": "CVE-2020-1757", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-09-09T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1752770" } ], "notes": [ { "category": "description", "text": "A flaw was found in Undertow, where the servlet container causes the servletPath to normalize incorrectly by truncating the path after the semicolon. The flaw may lead to application mapping, resulting in a security bypass.", "title": "Vulnerability description" }, { "category": "summary", "text": "undertow: servletPath is normalized incorrectly leading to dangerous application mapping which could result in security bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src" ], "known_not_affected": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-1757" }, { "category": "external", "summary": "RHBZ#1752770", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752770" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-1757", "url": "https://www.cve.org/CVERecord?id=CVE-2020-1757" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1757", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1757" } ], "release_date": "2018-12-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "category": "workaround", "details": "The issue can be mitigated by configuring UrlPathHelper to ignore the servletPath via setting \"alwaysUseFullPath\".", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "undertow: servletPath is normalized incorrectly leading to dangerous application mapping which could result in security bypass" }, { "cve": "CVE-2021-4104", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-12-13T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2031667" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Java logging library Apache Log4j in version 1.x. JMSAppender in Log4j 1.x is vulnerable to deserialization of untrusted data. This allows a remote attacker to execute code on the server if the deployed application is configured to use JMSAppender and to the attacker\u0027s JNDI LDAP endpoint.", "title": "Vulnerability description" }, { "category": "summary", "text": "log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender", "title": "Vulnerability summary" }, { "category": "other", "text": "Based on the conditions to be exploitable (see details below), the risk is much lower than Log4j 2.x and Red Hat has assessed this to be Moderate severity. This flaw has been filed for Log4j 1.x, and the corresponding flaw information for Log4j 2.x is available at: https://access.redhat.com/security/cve/CVE-2021-44228\n\nNote this flaw ONLY affects applications which are specifically configured to use JMSAppender, which is not the default, or when the attacker has write access to the Log4j configuration for adding JMSAppender to the attacker\u0027s JNDI LDAP endpoint. \n\nIf the Log4j configuration is set TopicBindingName or TopicConnectionFactoryBindingName configurations allowing JMSAppender to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-44228 Log4j 2.x, Log4j 1.x is vulnerable. However, the attack vector is reduced as it depends on having write access, which is not a standard configuration rather than untrusted user input. These are sufficient factors beyond the attacker\u0027s control.\n\nThe tomcat package shipped with Red Hat Enterprise Linux does not include log4j but it does include a default configuration for log4j, log4j.properties, which could be used with tomcat if users choose to install and configure the library. The JMSAppender is not enabled by default, and the permissions of the file can only be modified as root.\n\nRed Hat Virtualization ships log4j12-1.2.17, but it is used and configured in a way which makes this flaw not possible to exploit. Therefore impact is rated Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src" ], "known_not_affected": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-4104" }, { "category": "external", "summary": "RHBZ#2031667", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031667" }, { "category": "external", "summary": "RHSB-2021-009", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-009" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4104", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4104" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4104", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4104" }, { "category": "external", "summary": "https://github.com/apache/logging-log4j2/pull/608#issuecomment-990494126", "url": "https://github.com/apache/logging-log4j2/pull/608#issuecomment-990494126" }, { "category": "external", "summary": "https://github.com/apache/logging-log4j2/pull/608#issuecomment-991723301", "url": "https://github.com/apache/logging-log4j2/pull/608#issuecomment-991723301" }, { "category": "external", "summary": "https://lists.apache.org/thread/0x4zvtq92yggdgvwfgsftqrj4xx5w0nx", "url": "https://lists.apache.org/thread/0x4zvtq92yggdgvwfgsftqrj4xx5w0nx" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2021/12/13/1", "url": "https://www.openwall.com/lists/oss-security/2021/12/13/1" } ], "release_date": "2021-12-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "category": "workaround", "details": "These are the possible mitigations for this flaw for releases version 1.x:\n\n- Comment out or remove JMSAppender in the Log4j configuration if it is used\n- Remove the JMSAppender class from the classpath. For example:\n```\nzip -q -d log4j-*.jar org/apache/log4j/net/JMSAppender.class\n```\n- Restrict access for the OS user on the platform running the application to prevent modifying the Log4j configuration by the attacker.", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender" }, { "cve": "CVE-2022-23302", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2022-01-18T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2041949" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Java logging library Apache Log4j in version 1.x. JMSSink in Log4j 1.x is vulnerable to deserialization of untrusted data. This allows a remote attacker to execute code on the server if JMSSink is deployed and has been configured to perform JNDI requests.", "title": "Vulnerability description" }, { "category": "summary", "text": "log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink", "title": "Vulnerability summary" }, { "category": "other", "text": "Note this flaw ONLY affects applications which are specifically configured to use JMSSink, which is not the default, or when the attacker has write access to the Log4j configuration for adding JMSSink to the attacker\u0027s JNDI LDAP endpoint.\n\nRed Hat Satellite bundles log4j-over-slf4j with Candlepin, however, product is not affected as it uses logback framework for logging.\n\nRed Hat Virtualization and OpenShift Container Platform in the OCP Metering stack (the Hive/Presto/Hadoop components) ship a vulnerable version of the log4j package, however JMSSink is not used. Therefore the impact of this vulnerability for these products is rated Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src" ], "known_not_affected": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-23302" }, { "category": "external", "summary": "RHBZ#2041949", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041949" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23302", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23302" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23302", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23302" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2022/01/18/3", "url": "https://www.openwall.com/lists/oss-security/2022/01/18/3" } ], "release_date": "2022-01-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "category": "workaround", "details": "These are the possible mitigations for this flaw for releases version 1.x:\n\n- Comment out or remove JMSSink in the Log4j configuration if it is used\n- Remove the JMSSink class from the server\u0027s jar files. For example:\n```\nzip -q -d log4j-*.jar org/apache/log4j/net/JMSSink.class\n```\n- Restrict access for the OS user on the platform running the application to prevent modifying the Log4j configuration by the attacker.", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink" }, { "cve": "CVE-2022-23305", "cwe": { "id": "CWE-89", "name": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)" }, "discovery_date": "2022-01-18T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2041959" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Java logging library Apache Log4j in version 1.x. JDBCAppender in Log4j 1.x is vulnerable to SQL injection in untrusted data. This allows a remote attacker to run SQL statements in the database if the deployed application is configured to use JDBCAppender with certain interpolation tokens.", "title": "Vulnerability description" }, { "category": "summary", "text": "log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender", "title": "Vulnerability summary" }, { "category": "other", "text": "Note this issue only affects Log4j 1.x when specifically configured to use the JDBCAppender, which is not the default.\n\nRed Hat Satellite bundles log4j-over-slf4j with Candlepin, however, product is not affected as it uses logback framework for logging.\n\nRed Hat Virtualization and OpenShift Container Platform in the OCP Metering stack (the Hive/Presto/Hadoop components) ship a vulnerable version of the log4j package, however JDBCAppender is not used. Therefore the impact of this vulnerability for these products is rated Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src" ], "known_not_affected": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-23305" }, { "category": "external", "summary": "RHBZ#2041959", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041959" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23305", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23305" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23305", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23305" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2022/01/18/4", "url": "https://www.openwall.com/lists/oss-security/2022/01/18/4" } ], "release_date": "2022-01-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "category": "workaround", "details": "These are the possible mitigations for this flaw for releases version 1.x:\n\n- Comment out or remove JDBCAppender in the Log4j configuration if it is used\n- Remove the JDBCAppender class from the server\u0027s jar files. For example:\n```\nzip -q -d log4j-*.jar org/apache/log4j/jdbc/JDBCAppender.class\n```", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender" }, { "cve": "CVE-2022-23307", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2022-01-18T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2041967" } ], "notes": [ { "category": "description", "text": "A flaw was found in the log4j 1.x chainsaw component, where the contents of certain log entries are deserialized and possibly permit code execution. This flaw allows an attacker to send a malicious request with serialized data to the server to be deserialized when the chainsaw component is run.", "title": "Vulnerability description" }, { "category": "summary", "text": "log4j: Unsafe deserialization flaw in Chainsaw log viewer", "title": "Vulnerability summary" }, { "category": "other", "text": "Chainsaw is a standalone graphical user interface for viewing log entries in log4j. This flaw may be bypassed by using other available means to access log entries.\n\nRed Hat Satellite bundles log4j-over-slf4j with Candlepin, however, product is not affected as it uses logback framework for logging.\n\nRed Hat Virtualization ships a vulnerable version of the log4j package, however chainsaw is not part of typical use cases. An attacker looking to exploit this would need to not only be able to generate a malicious log entry, but also have the necessary access and permissions to start chainsaw on the engine node. Therefore the impact of this vulnerability for Red Hat Virtualization is rated Low.\n\nSimilar to Red Hat Virtualization in OpenShift Container Platform (OCP), the Hive/Presto/Hadoop components that comprise the OCP Metering stack, ship the vulnerable version of log4j package, however vulnerable chainsaw component is not used by default. Therefore the impact to OCP is reduced to Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src" ], "known_not_affected": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-23307" }, { "category": "external", "summary": "RHBZ#2041967", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041967" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23307", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23307" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23307", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23307" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2022/01/18/5", "url": "https://www.openwall.com/lists/oss-security/2022/01/18/5" } ], "release_date": "2022-01-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "category": "workaround", "details": "These are the mitigations available for this flaw for log4j 1.x:\n- Avoid using Chainsaw to view logs, and instead use some other utility, especially if there is a log view available within the product itself.\n- Remove the Chainsaw classes from the log4j jar files. For example:\n```\nzip -q -d log4j-*.jar org/apache/log4j/chainsaw/*\n```\n(log4j jars may be nested in zip archives within product)", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "log4j: Unsafe deserialization flaw in Chainsaw log viewer" } ] }
RHSA-2019:2817
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for cri-o is now available for Red Hat OpenShift Container Platform 3.11.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nSecurity Fix(es):\n\n* containers/image: not enforcing TLS when sending username+password credentials to token servers leading to credential disclosure (CVE-2019-10214)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAll OpenShift Container Platform 3.11 users are advised to upgrade to these\nupdated packages and images.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:2817", "url": "https://access.redhat.com/errata/RHSA-2019:2817" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1732508", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1732508" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2817.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 3.11 security update", "tracking": { "current_release_date": "2025-03-15T19:44:16+00:00", "generator": { "date": "2025-03-15T19:44:16+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.1" } }, "id": "RHSA-2019:2817", "initial_release_date": "2019-09-23T20:37:17+00:00", "revision_history": [ { "date": "2019-09-23T20:37:17+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-09-23T20:37:17+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-03-15T19:44:16+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 3.11", "product": { "name": "Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:3.11::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "product": { "name": "cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "product_id": "cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "product": { "name": "cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "product_id": "cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64", "product": { "name": "cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64", "product_id": "cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64", "product": { "name": "cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64", "product_id": "cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.src", "product": { "name": "cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.src", "product_id": "cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le" }, "product_reference": "cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.src" }, "product_reference": "cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64" }, "product_reference": "cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le" }, "product_reference": "cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64" }, "product_reference": "cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.src", "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-23T20:37:17+00:00", "details": "See the following documentation, which will be updated shortly for release\n3.11.146, for important instructions on how to upgrade your cluster and fully\napply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_release_notes.html", "product_ids": [ "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.src", "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2817" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.src", "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.src", "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-23T20:37:17+00:00", "details": "See the following documentation, which will be updated shortly for release\n3.11.146, for important instructions on how to upgrade your cluster and fully\napply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_release_notes.html", "product_ids": [ "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.src", "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2817" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.src", "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "Miloslav Trma\u010d" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2019-10214", "cwe": { "id": "CWE-522", "name": "Insufficiently Protected Credentials" }, "discovery_date": "2019-07-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1732508" } ], "notes": [ { "category": "description", "text": "The containers/image library used by the container tools Podman, Buildah, and Skopeo in Red Hat Enterprise Linux version 8 and CRI-O in OpenShift Container Platform, does not enforce TLS connections to the container registry authorization service. An attacker could use this vulnerability to launch a MiTM attack and steal login credentials or bearer tokens.", "title": "Vulnerability description" }, { "category": "summary", "text": "containers/image: not enforcing TLS when sending username+password credentials to token servers leading to credential disclosure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.src", "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10214" }, { "category": "external", "summary": "RHBZ#1732508", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1732508" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10214", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10214" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10214", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10214" } ], "release_date": "2019-09-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-23T20:37:17+00:00", "details": "See the following documentation, which will be updated shortly for release\n3.11.146, for important instructions on how to upgrade your cluster and fully\napply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_release_notes.html", "product_ids": [ "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.src", "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2817" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.src", "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "containers/image: not enforcing TLS when sending username+password credentials to token servers leading to credential disclosure" } ] }
rhsa-2019_2817
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for cri-o is now available for Red Hat OpenShift Container Platform 3.11.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nSecurity Fix(es):\n\n* containers/image: not enforcing TLS when sending username+password credentials to token servers leading to credential disclosure (CVE-2019-10214)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAll OpenShift Container Platform 3.11 users are advised to upgrade to these\nupdated packages and images.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:2817", "url": "https://access.redhat.com/errata/RHSA-2019:2817" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1732508", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1732508" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2817.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 3.11 security update", "tracking": { "current_release_date": "2024-11-22T13:23:07+00:00", "generator": { "date": "2024-11-22T13:23:07+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2019:2817", "initial_release_date": "2019-09-23T20:37:17+00:00", "revision_history": [ { "date": "2019-09-23T20:37:17+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-09-23T20:37:17+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T13:23:07+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 3.11", "product": { "name": "Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:3.11::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "product": { "name": "cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "product_id": "cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "product": { "name": "cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "product_id": "cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64", "product": { "name": "cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64", "product_id": "cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64", "product": { "name": "cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64", "product_id": "cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.src", "product": { "name": "cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.src", "product_id": "cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le" }, "product_reference": "cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.src" }, "product_reference": "cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64" }, "product_reference": "cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le" }, "product_reference": "cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64" }, "product_reference": "cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.src", "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-23T20:37:17+00:00", "details": "See the following documentation, which will be updated shortly for release\n3.11.146, for important instructions on how to upgrade your cluster and fully\napply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_release_notes.html", "product_ids": [ "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.src", "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2817" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.src", "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.src", "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-23T20:37:17+00:00", "details": "See the following documentation, which will be updated shortly for release\n3.11.146, for important instructions on how to upgrade your cluster and fully\napply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_release_notes.html", "product_ids": [ "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.src", "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2817" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.src", "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "Miloslav Trma\u010d" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2019-10214", "cwe": { "id": "CWE-522", "name": "Insufficiently Protected Credentials" }, "discovery_date": "2019-07-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1732508" } ], "notes": [ { "category": "description", "text": "The containers/image library used by the container tools Podman, Buildah, and Skopeo in Red Hat Enterprise Linux version 8 and CRI-O in OpenShift Container Platform, does not enforce TLS connections to the container registry authorization service. An attacker could use this vulnerability to launch a MiTM attack and steal login credentials or bearer tokens.", "title": "Vulnerability description" }, { "category": "summary", "text": "containers/image: not enforcing TLS when sending username+password credentials to token servers leading to credential disclosure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.src", "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10214" }, { "category": "external", "summary": "RHBZ#1732508", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1732508" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10214", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10214" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10214", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10214" } ], "release_date": "2019-09-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-23T20:37:17+00:00", "details": "See the following documentation, which will be updated shortly for release\n3.11.146, for important instructions on how to upgrade your cluster and fully\napply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_release_notes.html", "product_ids": [ "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.src", "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2817" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.src", "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "containers/image: not enforcing TLS when sending username+password credentials to token servers leading to credential disclosure" } ] }
rhsa-2019_4045
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "A security update is now available for Red Hat Single Sign-On 7.3 from the Customer Portal.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Single Sign-On 7.3 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications.\n\nThis release of Red Hat Single Sign-On 7.3.5 serves as a replacement for Red Hat Single Sign-On 7.2.6, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* keycloak: Service accounts reset password flow not using placeholder.org domain anymore (CVE-2019-14837)\n\n* undertow: HTTP/2: flood using PING frames results in unbounded memory growth\n(CVE-2019-9512)\n\n* undertow: HTTP/2: flood using HEADERS frames results in unbounded memory\ngrowth (CVE-2019-9514)\n\n* undertow: HTTP/2: flood using SETTINGS frames results in unbounded memory\ngrowth (CVE-2019-9515)\n\n* wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027\nuser by default (CVE-2019-14838)\n\n* wildfly: wildfly-security-manager: security manager authorization bypass\n(CVE-2019-14843)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:4045", "url": "https://access.redhat.com/errata/RHSA-2019:4045" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.rhsso\u0026downloadType=securityPatches\u0026version=7.3", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.rhsso\u0026downloadType=securityPatches\u0026version=7.3" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.3/", "url": "https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.3/" }, { "category": "external", "summary": "1730227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1730227" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1751227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751227" }, { "category": "external", "summary": "1752980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752980" }, { "category": "external", "summary": "KEYCLOAK-11792", "url": "https://issues.redhat.com/browse/KEYCLOAK-11792" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_4045.json" } ], "title": "Red Hat Security Advisory: Red Hat Single Sign-On 7.3.5 security update", "tracking": { "current_release_date": "2024-11-15T04:13:03+00:00", "generator": { "date": "2024-11-15T04:13:03+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2019:4045", "initial_release_date": "2019-12-02T17:21:07+00:00", "revision_history": [ { "date": "2019-12-02T17:21:07+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-12-02T17:21:07+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T04:13:03+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Single Sign-On 7.3", "product": { "name": "Red Hat Single Sign-On 7.3", "product_id": "Red Hat Single Sign-On 7.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_single_sign_on:7.3" } } } ], "category": "product_family", "name": "Red Hat Single Sign-On" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Single Sign-On 7.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:21:07+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Single Sign-On 7.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4045" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Single Sign-On 7.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Single Sign-On 7.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:21:07+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Single Sign-On 7.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4045" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Single Sign-On 7.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Single Sign-On 7.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:21:07+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Single Sign-On 7.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4045" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Single Sign-On 7.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "Vadim Ashikhman" ] } ], "cve": "CVE-2019-14837", "cwe": { "id": "CWE-547", "name": "Use of Hard-coded, Security-relevant Constants" }, "discovery_date": "2019-07-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1730227" } ], "notes": [ { "category": "description", "text": "A flaw was found in Keycloak. The use of an open hard-coded domain can allow an unauthorized login by setting up a mail server and resetting the user credentials, enabling information disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak: keycloak uses hardcoded open dummy domain for new accounts enabling information disclosure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Single Sign-On 7.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14837" }, { "category": "external", "summary": "RHBZ#1730227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1730227" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14837", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14837" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14837", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14837" } ], "release_date": "2019-12-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:21:07+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Single Sign-On 7.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4045" }, { "category": "workaround", "details": "It is not a very straight forward workaround but it is possible to mitigate this by manually editing the default Email ID ([email protected]) to some valid email ID ([email protected]) in the USER_ENTITY table in the RHSSO database used.", "product_ids": [ "Red Hat Single Sign-On 7.3" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "Red Hat Single Sign-On 7.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "keycloak: keycloak uses hardcoded open dummy domain for new accounts enabling information disclosure" }, { "acknowledgments": [ { "names": [ "F\u00e1bio Magalh\u00e3es de Andrade" ], "organization": "Sonda Ativas" }, { "names": [ "Juliano de Castro Santos", "Leonard Lunardi" ], "organization": "UnimedBH" } ], "cve": "CVE-2019-14838", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2019-08-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1751227" } ], "notes": [ { "category": "description", "text": "It was found that Wildfly users had default user permissions set incorrectly. A malicious user could use this flaw to access unauthorized controls for the application server.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Single Sign-On 7.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14838" }, { "category": "external", "summary": "RHBZ#1751227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751227" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14838", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14838" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14838", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14838" }, { "category": "external", "summary": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14838", "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14838" } ], "release_date": "2019-10-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:21:07+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Single Sign-On 7.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4045" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "Red Hat Single Sign-On 7.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default" }, { "cve": "CVE-2019-14843", "cwe": { "id": "CWE-592", "name": "CWE-592" }, "discovery_date": "2019-09-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1752980" } ], "notes": [ { "category": "description", "text": "A flaw was found in Wildfly Security Manager, running under JDK 11 or 8, that authorized requests for any requester. This flaw could be used by a malicious app deployed on the app server to access unauthorized information and possibly conduct further attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-security-manager: security manager authorization bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Single Sign-On 7.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14843" }, { "category": "external", "summary": "RHBZ#1752980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752980" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14843", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14843" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14843", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14843" } ], "release_date": "2019-09-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:21:07+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Single Sign-On 7.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4045" }, { "category": "workaround", "details": "This flaw only affects the Security Manager running under JDK 11 or 8. To mitigate exposure to this flaw, do not run under those JDK versions.", "product_ids": [ "Red Hat Single Sign-On 7.3" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat Single Sign-On 7.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "wildfly-security-manager: security manager authorization bypass" } ] }
RHSA-2019:4352
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat JBoss Fuse 6.3 and Red Hat JBoss A-MQ 6.3.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Fuse provides a small-footprint, flexible, open source enterprise service bus and integration platform. Red Hat A-MQ is a standards compliant messaging system that is tailored for use in mission critical applications.\n\nThis patch is an update to Red Hat Fuse 6.3 and Red Hat A-MQ 6.3. It includes bug fixes, which are documented in the patch notes accompanying the package on the download page. See the download link given in the references section below.\n\nSecurity fix(es):\n\n* zookeeper: Information disclosure in Apache ZooKeeper (CVE-2019-0201)\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515) \n\n* HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)\n\n* xstream: remote code execution due to insecure XML deserialization (CVE-2019-10173)\n\n* jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution (CVE-2019-12384)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:4352", "url": "https://access.redhat.com/errata/RHSA-2019:4352" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=jboss.amq.broker\u0026downloadType=securityPatches\u0026version=6.3.0", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=jboss.amq.broker\u0026downloadType=securityPatches\u0026version=6.3.0" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=jboss.fuse\u0026downloadType=securityPatches\u0026version=6.3", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=jboss.fuse\u0026downloadType=securityPatches\u0026version=6.3" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_fuse/6.3/html/release_notes/index", "url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_fuse/6.3/html/release_notes/index" }, { "category": "external", "summary": "1715197", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1715197" }, { "category": "external", "summary": "1722971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1722971" }, { "category": "external", "summary": "1725807", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1725807" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_4352.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Fuse/A-MQ 6.3 R14 security and bug fix update", "tracking": { "current_release_date": "2025-04-09T17:26:18+00:00", "generator": { "date": "2025-04-09T17:26:18+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.2" } }, "id": "RHSA-2019:4352", "initial_release_date": "2019-12-19T17:37:50+00:00", "revision_history": [ { "date": "2019-12-19T17:37:50+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-12-19T17:37:50+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-04-09T17:26:18+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Fuse 6.3", "product": { "name": "Red Hat Fuse 6.3", "product_id": "Red Hat Fuse 6.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_amq:6.3" } } } ], "category": "product_family", "name": "Red Hat JBoss Fuse" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-0201", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "discovery_date": "2019-05-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1715197" } ], "notes": [ { "category": "description", "text": "A flaw was found in Apache ZooKeeper. A lack of permission checks while retrieving ACLs allows unsalted hash values to be disclosed for unauthenticated or unprivileged users.", "title": "Vulnerability description" }, { "category": "summary", "text": "zookeeper: Information disclosure in Apache ZooKeeper", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 6.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-0201" }, { "category": "external", "summary": "RHBZ#1715197", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1715197" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0201", "url": "https://www.cve.org/CVERecord?id=CVE-2019-0201" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0201", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0201" } ], "release_date": "2019-05-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-19T17:37:50+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are located in the download section of the customer portal.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Fuse 6.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4352" }, { "category": "workaround", "details": "Use an authentication method other than Digest (e.g. Kerberos) or upgrade to zookeeper 3.4.14 or later (3.5.5 or later if on the 3.5 branch). [https://zookeeper.apache.org/security.html#CVE-2019-0201]", "product_ids": [ "Red Hat Fuse 6.3" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 6.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "zookeeper: Information disclosure in Apache ZooKeeper" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 6.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-19T17:37:50+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are located in the download section of the customer portal.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Fuse 6.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4352" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 6.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 6.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-19T17:37:50+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are located in the download section of the customer portal.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Fuse 6.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4352" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 6.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 6.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-19T17:37:50+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are located in the download section of the customer portal.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Fuse 6.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4352" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 6.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9518", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735749" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using frames with an empty payload, a flood could occur that results in excessive CPU usage and starvation of other clients. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using empty frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 6.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9518" }, { "category": "external", "summary": "RHBZ#1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9518", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-19T17:37:50+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are located in the download section of the customer portal.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Fuse 6.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4352" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 6.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using empty frames results in excessive resource consumption" }, { "cve": "CVE-2019-10173", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "discovery_date": "2019-06-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1722971" } ], "notes": [ { "category": "description", "text": "It was found that xstream API version 1.4.10 introduced a regression for a previous deserialization flaw. If the security framework has not been initialized, it may allow a remote attacker to run arbitrary shell commands when unmarshalling XML or any supported format. This a regression of CVE-2013-7285 fixed in 1.4.7 (fixed) as of BPMS 6.0.1, the regression was introduced with xstream-1.4.10 implemented in RHPAM.", "title": "Vulnerability description" }, { "category": "summary", "text": "xstream: remote code execution due to insecure XML deserialization (regression of CVE-2013-7285)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 6.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10173" }, { "category": "external", "summary": "RHBZ#1722971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1722971" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10173", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10173" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10173", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10173" }, { "category": "external", "summary": "http://x-stream.github.io/changes.html#1.4.11", "url": "http://x-stream.github.io/changes.html#1.4.11" } ], "release_date": "2018-10-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-19T17:37:50+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are located in the download section of the customer portal.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Fuse 6.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4352" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat Fuse 6.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xstream: remote code execution due to insecure XML deserialization (regression of CVE-2013-7285)" }, { "cve": "CVE-2019-12384", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-06-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1725807" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in FasterXML jackson-databind in versions prior to 2.9.9. The vulnerability would permit polymorphic deserialization of malicious objects using the logback-core gadget when used in conjunction with polymorphic type handling methods such as `enableDefaultTyping()` or when @JsonTypeInfo is using `Id.CLASS` or `Id.MINIMAL_CLASS` or in any other way which ObjectMapper.readValue might instantiate objects from unsafe sources. Depending on the classpath content, remote code execution may be possible.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack\u0027s OpenDaylight does not use logback in any supported configuration. Therefore, the prerequisites for this vulnerability are not present and OpenDaylight is not affected.\n\nThis vulnerability relies on logback-core (ch.qos.logback.core) being present in the application\u0027s ClassPath. Logback-core is not packaged as an RPM for Red Hat Enterprise Linux or Red Hat Software Collections. Applications using jackson-databind that do not also use logback-core are not impacted by this vulnerability.\n\nThis issue affects the versions of jackson-databind bundled with candlepin as shipped with Red Hat Satellite 6.x. However the affected code is NOT used at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 6.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-12384" }, { "category": "external", "summary": "RHBZ#1725807", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1725807" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-12384", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12384" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-12384", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12384" } ], "release_date": "2019-06-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-19T17:37:50+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are located in the download section of the customer portal.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Fuse 6.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4352" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Fuse 6.3" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 6.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution" } ] }
rhsa-2019_4019
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat JBoss Enterprise Application Platform 7.2 for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime.\n\nThis release of Red Hat JBoss Enterprise Application Platform 7.2.5 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.2.4, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.2.5 Release Notes for information about the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* undertow: HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511)\n\n* undertow: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* undertow: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* undertow: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default (CVE-2019-14838)\n\n* wildfly: wildfly-security-manager: security manager authorization bypass (CVE-2019-14843)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:4019", "url": "https://access.redhat.com/errata/RHSA-2019:4019" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/", "url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/html-single/installation_guide/", "url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/html-single/installation_guide/" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "1751227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751227" }, { "category": "external", "summary": "1752980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752980" }, { "category": "external", "summary": "JBEAP-17075", "url": "https://issues.redhat.com/browse/JBEAP-17075" }, { "category": "external", "summary": "JBEAP-17220", "url": "https://issues.redhat.com/browse/JBEAP-17220" }, { "category": "external", "summary": "JBEAP-17365", "url": "https://issues.redhat.com/browse/JBEAP-17365" }, { "category": "external", "summary": "JBEAP-17476", "url": "https://issues.redhat.com/browse/JBEAP-17476" }, { "category": "external", "summary": "JBEAP-17478", "url": "https://issues.redhat.com/browse/JBEAP-17478" }, { "category": "external", "summary": "JBEAP-17483", "url": "https://issues.redhat.com/browse/JBEAP-17483" }, { "category": "external", "summary": "JBEAP-17495", "url": "https://issues.redhat.com/browse/JBEAP-17495" }, { "category": "external", "summary": "JBEAP-17496", "url": "https://issues.redhat.com/browse/JBEAP-17496" }, { "category": "external", "summary": "JBEAP-17513", "url": "https://issues.redhat.com/browse/JBEAP-17513" }, { "category": "external", "summary": "JBEAP-17521", "url": "https://issues.redhat.com/browse/JBEAP-17521" }, { "category": "external", "summary": "JBEAP-17523", "url": "https://issues.redhat.com/browse/JBEAP-17523" }, { "category": "external", "summary": "JBEAP-17547", "url": "https://issues.redhat.com/browse/JBEAP-17547" }, { "category": "external", "summary": "JBEAP-17548", "url": "https://issues.redhat.com/browse/JBEAP-17548" }, { "category": "external", "summary": "JBEAP-17560", "url": "https://issues.redhat.com/browse/JBEAP-17560" }, { "category": "external", "summary": "JBEAP-17579", "url": "https://issues.redhat.com/browse/JBEAP-17579" }, { "category": "external", "summary": "JBEAP-17582", "url": "https://issues.redhat.com/browse/JBEAP-17582" }, { "category": "external", "summary": "JBEAP-17604", "url": "https://issues.redhat.com/browse/JBEAP-17604" }, { "category": "external", "summary": "JBEAP-17631", "url": "https://issues.redhat.com/browse/JBEAP-17631" }, { "category": "external", "summary": "JBEAP-17647", "url": "https://issues.redhat.com/browse/JBEAP-17647" }, { "category": "external", "summary": "JBEAP-17665", "url": "https://issues.redhat.com/browse/JBEAP-17665" }, { "category": "external", "summary": "JBEAP-17722", "url": "https://issues.redhat.com/browse/JBEAP-17722" }, { "category": "external", "summary": "JBEAP-17874", "url": "https://issues.redhat.com/browse/JBEAP-17874" }, { "category": "external", "summary": "JBEAP-17880", "url": "https://issues.redhat.com/browse/JBEAP-17880" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_4019.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update", "tracking": { "current_release_date": "2024-11-15T04:13:21+00:00", "generator": { "date": "2024-11-15T04:13:21+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2019:4019", "initial_release_date": "2019-11-26T20:01:24+00:00", "revision_history": [ { "date": "2019-11-26T20:01:24+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-11-26T20:01:24+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T04:13:21+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product": { "name": "Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el7" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" }, { "branches": [ { "category": "product_version", "name": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "product": { "name": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "product_id": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00005.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "product": { "name": "eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "product_id": "eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00005.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "product_id": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "product_id": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "product_id": "eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "product_id": "eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "product_id": "eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "product": { "name": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "product_id": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00003.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "product": { "name": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "product_id": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00002.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product": { "name": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product_id": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product": { "name": "eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product_id": "eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product": { "name": "eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product_id": "eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product": { "name": "eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product_id": "eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product": { "name": "eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product_id": "eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product": { "name": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product_id": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product": { "name": "eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product_id": "eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product": { "name": "eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product_id": "eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product": { "name": "eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product_id": "eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product": { "name": "eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product_id": "eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "product_id": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "product_id": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "product": { "name": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "product_id": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00002.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "product": { "name": "eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "product_id": "eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00002.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "product": { "name": "eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "product_id": "eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00002.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "product": { "name": "eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "product_id": "eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00002.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "product": { "name": "eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "product_id": "eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00002.1.el7eap?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "product": { "name": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "product_id": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00005.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "product": { "name": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "product_id": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "product": { "name": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "product_id": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "product": { "name": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "product_id": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00003.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "product": { "name": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "product_id": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00002.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "product": { "name": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "product_id": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "product": { "name": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "product_id": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "product": { "name": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "product_id": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "product": { "name": "eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "product_id": "eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "product": { "name": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "product_id": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "product": { "name": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "product_id": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "product": { "name": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "product_id": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "product": { "name": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "product_id": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "product": { "name": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "product_id": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "product": { "name": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "product_id": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "product": { "name": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "product_id": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "product": { "name": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "product_id": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "product": { "name": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "product_id": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src", "product": { "name": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src", "product_id": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "product": { "name": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "product_id": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "product": { "name": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "product_id": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "product": { "name": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "product_id": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00002.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "product": { "name": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "product_id": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "product": { "name": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "product_id": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=x86_64" } } }, { "category": "product_version", "name": "eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "product": { "name": "eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "product_id": "eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src" }, "product_reference": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch" }, "product_reference": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src" }, "product_reference": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch" }, "product_reference": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src" }, "product_reference": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src" }, "product_reference": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src" }, "product_reference": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src" }, "product_reference": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src" }, "product_reference": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src" }, "product_reference": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src" }, "product_reference": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src" }, "product_reference": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src" }, "product_reference": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch" }, "product_reference": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src" }, "product_reference": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch" }, "product_reference": "eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch" }, "product_reference": "eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch" }, "product_reference": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src" }, "product_reference": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch" }, "product_reference": "eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch" }, "product_reference": "eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch" }, "product_reference": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src" }, "product_reference": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch" }, "product_reference": "eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch" }, "product_reference": "eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch" }, "product_reference": "eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch" }, "product_reference": "eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch" }, "product_reference": "eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src" }, "product_reference": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src" }, "product_reference": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch" }, "product_reference": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src" }, "product_reference": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src" }, "product_reference": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src" }, "product_reference": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src" }, "product_reference": "eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch" }, "product_reference": "eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch" }, "product_reference": "eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch" }, "product_reference": "eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch" }, "product_reference": "eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src" }, "product_reference": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src" }, "product_reference": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64 as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64" }, "product_reference": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64 as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64" }, "product_reference": "eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" }, "product_reference": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-9511", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741860" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker can request a large amount of data by manipulating window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this queue can consume excess CPU, memory, or both, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: large amount of data requests leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "There are no mitigations available for nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "RHBZ#1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9511", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T20:01:24+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4019" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: large amount of data requests leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T20:01:24+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4019" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T20:01:24+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4019" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T20:01:24+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4019" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "F\u00e1bio Magalh\u00e3es de Andrade" ], "organization": "Sonda Ativas" }, { "names": [ "Juliano de Castro Santos", "Leonard Lunardi" ], "organization": "UnimedBH" } ], "cve": "CVE-2019-14838", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2019-08-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1751227" } ], "notes": [ { "category": "description", "text": "It was found that Wildfly users had default user permissions set incorrectly. A malicious user could use this flaw to access unauthorized controls for the application server.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14838" }, { "category": "external", "summary": "RHBZ#1751227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751227" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14838", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14838" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14838", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14838" }, { "category": "external", "summary": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14838", "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14838" } ], "release_date": "2019-10-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T20:01:24+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4019" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default" }, { "cve": "CVE-2019-14843", "cwe": { "id": "CWE-592", "name": "CWE-592" }, "discovery_date": "2019-09-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1752980" } ], "notes": [ { "category": "description", "text": "A flaw was found in Wildfly Security Manager, running under JDK 11 or 8, that authorized requests for any requester. This flaw could be used by a malicious app deployed on the app server to access unauthorized information and possibly conduct further attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-security-manager: security manager authorization bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14843" }, { "category": "external", "summary": "RHBZ#1752980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752980" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14843", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14843" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14843", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14843" } ], "release_date": "2019-09-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T20:01:24+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4019" }, { "category": "workaround", "details": "This flaw only affects the Security Manager running under JDK 11 or 8. To mitigate exposure to this flaw, do not run under those JDK versions.", "product_ids": [ "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "wildfly-security-manager: security manager authorization bypass" } ] }
rhsa-2020:1445
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat AMQ Broker 7.4.3 is now available from the Red Hat Customer Portal.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "AMQ Broker is a high-performance messaging implementation based on ActiveMQ Artemis. It uses an asynchronous journal for fast message persistence, and supports multiple languages, protocols, and platforms. \n\nThis release of Red Hat AMQ Broker 7.4.3 serves as a replacement for Red Hat AMQ Broker 7.4.2, and includes security and bug fixes, and enhancements. For further information, refer to the release notes linked to in the References section.\n\nSecurity Fix(es):\n\n* jetty: HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511)\n\n* jetty: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* jetty: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* jetty: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* jetty: HTTP/2: 0-length headers lead to denial of service (CVE-2019-9516)\n\n* jetty: HTTP/2: request for large response leads to denial of service (CVE-2019-9517)\n\n* jetty: HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)\n\n* netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers (CVE-2019-16869)\n\n* netty: HTTP request smuggling (CVE-2019-20444)\n\n* netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header (CVE-2019-20445)\n\n* netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling (CVE-2020-7238)\n\n* mqtt-client: activemq: Corrupt MQTT frame can cause broker shutdown (CVE-2019-0222)\n\n* jetty: using specially formatted URL against DefaultServlet or ResourceHandler leads to XSS conditions (CVE-2019-10241)\n\n* jetty: error path information disclosure (CVE-2019-10247)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:1445", "url": "https://access.redhat.com/errata/RHSA-2020:1445" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=jboss.amq.broker\u0026version=7.4.3", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=jboss.amq.broker\u0026version=7.4.3" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_amq/7.4/", "url": "https://access.redhat.com/documentation/en-us/red_hat_amq/7.4/" }, { "category": "external", "summary": "1696012", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1696012" }, { "category": "external", "summary": "1705924", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705924" }, { "category": "external", "summary": "1705993", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705993" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "external", "summary": "1758619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758619" }, { "category": "external", "summary": "1796225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796225" }, { "category": "external", "summary": "1798509", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798509" }, { "category": "external", "summary": "1798524", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798524" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_1445.json" } ], "title": "Red Hat Security Advisory: Red Hat AMQ Broker 7.4.3 release and security update", "tracking": { "current_release_date": "2025-04-09T17:52:46+00:00", "generator": { "date": "2025-04-09T17:52:46+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.2" } }, "id": "RHSA-2020:1445", "initial_release_date": "2020-04-14T13:04:37+00:00", "revision_history": [ { "date": "2020-04-14T13:04:37+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-04-14T13:04:37+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-04-09T17:52:46+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat AMQ 7.4.3", "product": { "name": "Red Hat AMQ 7.4.3", "product_id": "Red Hat AMQ 7.4.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:amq_broker:7" } } } ], "category": "product_family", "name": "Red Hat JBoss AMQ" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-0222", "discovery_date": "2019-03-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1696012" } ], "notes": [ { "category": "description", "text": "In Apache ActiveMQ 5.0.0 - 5.15.8, unmarshalling corrupt MQTT frame can lead to broker Out of Memory exception making it unresponsive.", "title": "Vulnerability description" }, { "category": "summary", "text": "activemq: Corrupt MQTT frame can cause broker shutdown", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-0222" }, { "category": "external", "summary": "RHBZ#1696012", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1696012" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0222", "url": "https://www.cve.org/CVERecord?id=CVE-2019-0222" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0222", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0222" } ], "release_date": "2019-03-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "activemq: Corrupt MQTT frame can cause broker shutdown" }, { "cve": "CVE-2019-9511", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741860" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker can request a large amount of data by manipulating window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this queue can consume excess CPU, memory, or both, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: large amount of data requests leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "There are no mitigations available for nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "RHBZ#1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9511", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "Red Hat AMQ 7.4.3" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: large amount of data requests leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "cve": "CVE-2019-9516", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741864" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker, sending a stream of header with a 0-length header name and a 0-length header value, could cause some implementations to allocate memory for these headers and keep the allocations alive until the session dies. The can consume excess memory, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: 0-length headers lead to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9516" }, { "category": "external", "summary": "RHBZ#1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9516", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9516" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://github.com/nghttp2/nghttp2/issues/1382#", "url": "https://github.com/nghttp2/nghttp2/issues/1382#" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "Red Hat AMQ 7.4.3" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: 0-length headers lead to denial of service" }, { "cve": "CVE-2019-9517", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741868" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in HTTP/2. An attacker can open a HTTP/2 window so the peer can send without constraint. The TCP window remains closed so the peer cannot write the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the server\u0027s queue is setup, the responses can consume excess memory, CPU, or both, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: request for large response leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "The package httpd versions as shipped with Red Hat Enterprise Linux 5, 6 and 7 are not affected by this issue as HTTP/2 support is not provided.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9517" }, { "category": "external", "summary": "RHBZ#1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9517", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9517" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" }, { "category": "workaround", "details": "The httpd version shipped with Red Hat Enterprise Linux 8 provides HTTP/2 support through mod_http2 package. While mod_http2 package is not updated, users can disable HTTP/2 support as mitigation action by executing the following steps:\n\n1. Stop httpd service:\n$ systemctl stop httpd\n\n2. Remove http/2 protocol support from configuration files:\n$ sed -i \u0027s/\\(h2\\)\\|\\(h2c\\)//g\u0027 \u003chttpd_config_file\u003e\n\n3. Validate configuration files to make sure all syntax is valid:\n$ apachectl configtest\n\n4. Restart httpd service:\n$ systemctl start httpd", "product_ids": [ "Red Hat AMQ 7.4.3" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: request for large response leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9518", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735749" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using frames with an empty payload, a flood could occur that results in excessive CPU usage and starvation of other clients. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using empty frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9518" }, { "category": "external", "summary": "RHBZ#1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9518", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: flood using empty frames results in excessive resource consumption" }, { "cve": "CVE-2019-10241", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2019-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1705924" } ], "notes": [ { "category": "description", "text": "In Eclipse Jetty version 9.2.26 and older, 9.3.25 and older, and 9.4.15 and older, the server is vulnerable to XSS conditions if a remote client USES a specially formatted URL against the DefaultServlet or ResourceHandler that is configured for showing a Listing of directory contents.", "title": "Vulnerability description" }, { "category": "summary", "text": "jetty: using specially formatted URL against DefaultServlet or ResourceHandler leads to XSS conditions", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of jetty which is embedded in the nutch package as shipped with Red Hat Satellite 5. The jetty server is not exposed, as such exploitation is difficult, Red Hat Product Security has rated this issue as having security impact of Low in the context of Red Hat Satellite 5. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10241" }, { "category": "external", "summary": "RHBZ#1705924", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705924" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10241", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10241" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10241", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10241" } ], "release_date": "2019-04-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jetty: using specially formatted URL against DefaultServlet or ResourceHandler leads to XSS conditions" }, { "cve": "CVE-2019-10247", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1705993" } ], "notes": [ { "category": "description", "text": "In Eclipse Jetty version 7.x, 8.x, 9.2.27 and older, 9.3.26 and older, and 9.4.16 and older, the server running on any OS and Jetty version combination will reveal the configured fully qualified directory base resource location on the output of the 404 error for not finding a Context that matches the requested path. The default server behavior on jetty-distribution and jetty-home will include at the end of the Handler tree a DefaultHandler, which is responsible for reporting this 404 error, it presents the various configured contexts as HTML for users to click through to. This produced HTML includes output that contains the configured fully qualified directory base resource location for each context.", "title": "Vulnerability description" }, { "category": "summary", "text": "jetty: error path information disclosure", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of jetty which is embedded in the nutch package as shipped with Red Hat Satellite 5. The jetty server is not exposed, as such exploitation is difficult, Red Hat Product Security has rated this issue as having security impact of Low in the context of Red Hat Satellite 5. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10247" }, { "category": "external", "summary": "RHBZ#1705993", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705993" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10247", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10247" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10247", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10247" } ], "release_date": "2019-04-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "jetty: error path information disclosure" }, { "cve": "CVE-2019-16869", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2019-09-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1758619" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty, where whitespace before the colon in HTTP headers is mishandled. This flaw allows an attacker to cause HTTP request smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that this vulnerability does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships vulnerable netty version embedded in Candlepin, however, is not directly vulnerable since HTTP requests are handled by Tomcat and not netty.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-16869" }, { "category": "external", "summary": "RHBZ#1758619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758619" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16869", "url": "https://www.cve.org/CVERecord?id=CVE-2019-16869" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16869", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16869" } ], "release_date": "2019-09-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat AMQ 7.4.3" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers" }, { "cve": "CVE-2019-20444", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1798524" } ], "notes": [ { "category": "description", "text": "A HTTP smuggling flaw was found in HttpObjectDecoder.java in Netty in versions prior to version 4.1.44. HTTP headers with an invalid fold, in this case CRLF (carriage return, line feed) without being followed by SP (space) or HTAB (horizontal tab), result in situations where headers can be misread. Data integrity is the highest threat with this vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP request smuggling", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that the previous vulnerability, CVE-2019-16869, does not pose a substantial practical threat to ElasticSearch 6. We agree that these issues would be difficult to exploit on OpenShift Container Platform so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships a vulnerable version of netty embedded in Candlepin. However, the flaw can not be triggered in that context, because HTTP requests are handled by Tomcat, not by netty. A future release may fix this.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20444" }, { "category": "external", "summary": "RHBZ#1798524", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798524" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20444", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20444" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20444", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20444" }, { "category": "external", "summary": "https://github.com/elastic/elasticsearch/issues/49396", "url": "https://github.com/elastic/elasticsearch/issues/49396" } ], "release_date": "2020-01-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat AMQ 7.4.3" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP request smuggling" }, { "cve": "CVE-2019-20445", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1798509" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty before version 4.1.44, where it accepted multiple Content-Length headers and also accepted both Transfer-Encoding, as well as Content-Length headers where it should reject the message under such circumstances. In circumstances where Netty is used in the context of a server, it could result in a viable HTTP smuggling vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that the previous vulnerability, CVE-2019-16869, does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit both these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships a vulnerable version of netty embedded in Candlepin. However, the flaw can not be triggered in that context, because HTTP requests are handled by Tomcat, not by netty. A future release may fix this.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20445" }, { "category": "external", "summary": "RHBZ#1798509", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798509" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20445", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20445" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20445", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20445" } ], "release_date": "2020-01-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat AMQ 7.4.3" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header" }, { "cve": "CVE-2020-7238", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1796225" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty, where it mishandles Transfer-Encoding whitespace. This flaw allows HTTP Request Smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that the previous vulnerability, CVE-2019-16869, does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit both these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships vulnerable netty version embedded in Candlepin, however, is not directly vulnerable since HTTP requests are handled by Tomcat and not netty.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-7238" }, { "category": "external", "summary": "RHBZ#1796225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796225" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-7238", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7238" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7238", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7238" }, { "category": "external", "summary": "https://netty.io/news/2019/12/18/4-1-44-Final.html", "url": "https://netty.io/news/2019/12/18/4-1-44-Final.html" } ], "release_date": "2020-01-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat AMQ 7.4.3" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling" } ] }
rhsa-2019:4018
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat JBoss Enterprise Application Platform 7.2 for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime.\n\nThis release of Red Hat JBoss Enterprise Application Platform 7.2.5 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.2.4, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.2.5 Release Notes for information about the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* undertow: HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511)\n\n* undertow: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* undertow: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* undertow: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default (CVE-2019-14838)\n\n* wildfly: wildfly-security-manager: security manager authorization bypass (CVE-2019-14843)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:4018", "url": "https://access.redhat.com/errata/RHSA-2019:4018" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/", "url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/html-single/installation_guide/", "url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/html-single/installation_guide/" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "1751227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751227" }, { "category": "external", "summary": "1752980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752980" }, { "category": "external", "summary": "JBEAP-17075", "url": "https://issues.redhat.com/browse/JBEAP-17075" }, { "category": "external", "summary": "JBEAP-17220", "url": "https://issues.redhat.com/browse/JBEAP-17220" }, { "category": "external", "summary": "JBEAP-17365", "url": "https://issues.redhat.com/browse/JBEAP-17365" }, { "category": "external", "summary": "JBEAP-17476", "url": "https://issues.redhat.com/browse/JBEAP-17476" }, { "category": "external", "summary": "JBEAP-17478", "url": "https://issues.redhat.com/browse/JBEAP-17478" }, { "category": "external", "summary": "JBEAP-17483", "url": "https://issues.redhat.com/browse/JBEAP-17483" }, { "category": "external", "summary": "JBEAP-17495", "url": "https://issues.redhat.com/browse/JBEAP-17495" }, { "category": "external", "summary": "JBEAP-17496", "url": "https://issues.redhat.com/browse/JBEAP-17496" }, { "category": "external", "summary": "JBEAP-17513", "url": "https://issues.redhat.com/browse/JBEAP-17513" }, { "category": "external", "summary": "JBEAP-17521", "url": "https://issues.redhat.com/browse/JBEAP-17521" }, { "category": "external", "summary": "JBEAP-17523", "url": "https://issues.redhat.com/browse/JBEAP-17523" }, { "category": "external", "summary": "JBEAP-17547", "url": "https://issues.redhat.com/browse/JBEAP-17547" }, { "category": "external", "summary": "JBEAP-17548", "url": "https://issues.redhat.com/browse/JBEAP-17548" }, { "category": "external", "summary": "JBEAP-17560", "url": "https://issues.redhat.com/browse/JBEAP-17560" }, { "category": "external", "summary": "JBEAP-17579", "url": "https://issues.redhat.com/browse/JBEAP-17579" }, { "category": "external", "summary": "JBEAP-17582", "url": "https://issues.redhat.com/browse/JBEAP-17582" }, { "category": "external", "summary": "JBEAP-17603", "url": "https://issues.redhat.com/browse/JBEAP-17603" }, { "category": "external", "summary": "JBEAP-17631", "url": "https://issues.redhat.com/browse/JBEAP-17631" }, { "category": "external", "summary": "JBEAP-17647", "url": "https://issues.redhat.com/browse/JBEAP-17647" }, { "category": "external", "summary": "JBEAP-17665", "url": "https://issues.redhat.com/browse/JBEAP-17665" }, { "category": "external", "summary": "JBEAP-17722", "url": "https://issues.redhat.com/browse/JBEAP-17722" }, { "category": "external", "summary": "JBEAP-17874", "url": "https://issues.redhat.com/browse/JBEAP-17874" }, { "category": "external", "summary": "JBEAP-17880", "url": "https://issues.redhat.com/browse/JBEAP-17880" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_4018.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 6 security update", "tracking": { "current_release_date": "2025-03-19T15:00:39+00:00", "generator": { "date": "2025-03-19T15:00:39+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.1" } }, "id": "RHSA-2019:4018", "initial_release_date": "2019-11-26T19:57:07+00:00", "revision_history": [ { "date": "2019-11-26T19:57:07+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-11-26T19:57:07+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-03-19T15:00:39+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product": { "name": "Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el6" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" }, { "branches": [ { "category": "product_version", "name": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "product_id": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "product_id": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "product_id": "eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "product_id": "eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "product_id": "eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "product": { "name": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "product_id": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00003.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "product": { "name": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "product_id": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00002.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "product": { "name": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "product_id": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00005.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "product": { "name": "eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "product_id": "eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00005.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product": { "name": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product_id": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product": { "name": "eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product_id": "eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product": { "name": "eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product_id": "eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product": { "name": "eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product_id": "eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product": { "name": "eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product_id": "eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product": { "name": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product_id": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product": { "name": "eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product_id": "eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product": { "name": "eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product_id": "eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product": { "name": "eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product_id": "eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product": { "name": "eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product_id": "eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "product_id": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "product_id": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "product": { "name": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "product_id": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00002.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "product": { "name": "eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "product_id": "eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00002.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "product": { "name": "eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "product_id": "eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00002.1.el6eap?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "product": { "name": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "product_id": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "product": { "name": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "product_id": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00001.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "product": { "name": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "product_id": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00003.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "product": { "name": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "product_id": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00002.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "product": { "name": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "product_id": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "product": { "name": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "product_id": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "product": { "name": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "product_id": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "product": { "name": "eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "product_id": "eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "product": { "name": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "product_id": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "product": { "name": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "product_id": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "product": { "name": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "product_id": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "product": { "name": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "product_id": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00005.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "product": { "name": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "product_id": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "product": { "name": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "product_id": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "product": { "name": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "product_id": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "product": { "name": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "product_id": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "product": { "name": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "product_id": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "product": { "name": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "product_id": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src", "product": { "name": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src", "product_id": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00001.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "product": { "name": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "product_id": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "product": { "name": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "product_id": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "product": { "name": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "product_id": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00002.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "product": { "name": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "product_id": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "product": { "name": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "product_id": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=x86_64" } } }, { "category": "product_version", "name": "eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "product": { "name": "eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "product_id": "eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src" }, "product_reference": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch" }, "product_reference": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src" }, "product_reference": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch" }, "product_reference": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src" }, "product_reference": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src" }, "product_reference": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src" }, "product_reference": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src" }, "product_reference": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src" }, "product_reference": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src" }, "product_reference": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src" }, "product_reference": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src" }, "product_reference": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src" }, "product_reference": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch" }, "product_reference": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src" }, "product_reference": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch" }, "product_reference": "eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch" }, "product_reference": "eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch" }, "product_reference": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src" }, "product_reference": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch" }, "product_reference": "eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch" }, "product_reference": "eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch" }, "product_reference": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src" }, "product_reference": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch" }, "product_reference": "eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch" }, "product_reference": "eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch" }, "product_reference": "eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch" }, "product_reference": "eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch" }, "product_reference": "eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src" }, "product_reference": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src" }, "product_reference": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch" }, "product_reference": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src" }, "product_reference": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src" }, "product_reference": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src" }, "product_reference": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src" }, "product_reference": "eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch" }, "product_reference": "eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch" }, "product_reference": "eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src" }, "product_reference": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src" }, "product_reference": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64 as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64" }, "product_reference": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64 as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64" }, "product_reference": "eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" }, "product_reference": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-9511", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741860" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker can request a large amount of data by manipulating window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this queue can consume excess CPU, memory, or both, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: large amount of data requests leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "There are no mitigations available for nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "RHBZ#1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9511", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T19:57:07+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details about how to apply this update, which includes the changes described in this advisory, see:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4018" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: large amount of data requests leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T19:57:07+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details about how to apply this update, which includes the changes described in this advisory, see:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4018" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T19:57:07+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details about how to apply this update, which includes the changes described in this advisory, see:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4018" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T19:57:07+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details about how to apply this update, which includes the changes described in this advisory, see:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4018" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "F\u00e1bio Magalh\u00e3es de Andrade" ], "organization": "Sonda Ativas" }, { "names": [ "Juliano de Castro Santos", "Leonard Lunardi" ], "organization": "UnimedBH" } ], "cve": "CVE-2019-14838", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2019-08-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1751227" } ], "notes": [ { "category": "description", "text": "It was found that Wildfly users had default user permissions set incorrectly. A malicious user could use this flaw to access unauthorized controls for the application server.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14838" }, { "category": "external", "summary": "RHBZ#1751227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751227" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14838", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14838" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14838", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14838" }, { "category": "external", "summary": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14838", "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14838" } ], "release_date": "2019-10-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T19:57:07+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details about how to apply this update, which includes the changes described in this advisory, see:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4018" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default" }, { "cve": "CVE-2019-14843", "cwe": { "id": "CWE-592", "name": "CWE-592" }, "discovery_date": "2019-09-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1752980" } ], "notes": [ { "category": "description", "text": "A flaw was found in Wildfly Security Manager, running under JDK 11 or 8, that authorized requests for any requester. This flaw could be used by a malicious app deployed on the app server to access unauthorized information and possibly conduct further attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-security-manager: security manager authorization bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14843" }, { "category": "external", "summary": "RHBZ#1752980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752980" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14843", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14843" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14843", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14843" } ], "release_date": "2019-09-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T19:57:07+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details about how to apply this update, which includes the changes described in this advisory, see:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4018" }, { "category": "workaround", "details": "This flaw only affects the Security Manager running under JDK 11 or 8. To mitigate exposure to this flaw, do not run under those JDK versions.", "product_ids": [ "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "wildfly-security-manager: security manager authorization bypass" } ] }
RHSA-2020:1445
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat AMQ Broker 7.4.3 is now available from the Red Hat Customer Portal.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "AMQ Broker is a high-performance messaging implementation based on ActiveMQ Artemis. It uses an asynchronous journal for fast message persistence, and supports multiple languages, protocols, and platforms. \n\nThis release of Red Hat AMQ Broker 7.4.3 serves as a replacement for Red Hat AMQ Broker 7.4.2, and includes security and bug fixes, and enhancements. For further information, refer to the release notes linked to in the References section.\n\nSecurity Fix(es):\n\n* jetty: HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511)\n\n* jetty: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* jetty: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* jetty: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* jetty: HTTP/2: 0-length headers lead to denial of service (CVE-2019-9516)\n\n* jetty: HTTP/2: request for large response leads to denial of service (CVE-2019-9517)\n\n* jetty: HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)\n\n* netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers (CVE-2019-16869)\n\n* netty: HTTP request smuggling (CVE-2019-20444)\n\n* netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header (CVE-2019-20445)\n\n* netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling (CVE-2020-7238)\n\n* mqtt-client: activemq: Corrupt MQTT frame can cause broker shutdown (CVE-2019-0222)\n\n* jetty: using specially formatted URL against DefaultServlet or ResourceHandler leads to XSS conditions (CVE-2019-10241)\n\n* jetty: error path information disclosure (CVE-2019-10247)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:1445", "url": "https://access.redhat.com/errata/RHSA-2020:1445" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=jboss.amq.broker\u0026version=7.4.3", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=jboss.amq.broker\u0026version=7.4.3" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_amq/7.4/", "url": "https://access.redhat.com/documentation/en-us/red_hat_amq/7.4/" }, { "category": "external", "summary": "1696012", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1696012" }, { "category": "external", "summary": "1705924", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705924" }, { "category": "external", "summary": "1705993", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705993" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "external", "summary": "1758619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758619" }, { "category": "external", "summary": "1796225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796225" }, { "category": "external", "summary": "1798509", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798509" }, { "category": "external", "summary": "1798524", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798524" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_1445.json" } ], "title": "Red Hat Security Advisory: Red Hat AMQ Broker 7.4.3 release and security update", "tracking": { "current_release_date": "2025-04-09T17:52:46+00:00", "generator": { "date": "2025-04-09T17:52:46+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.2" } }, "id": "RHSA-2020:1445", "initial_release_date": "2020-04-14T13:04:37+00:00", "revision_history": [ { "date": "2020-04-14T13:04:37+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-04-14T13:04:37+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-04-09T17:52:46+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat AMQ 7.4.3", "product": { "name": "Red Hat AMQ 7.4.3", "product_id": "Red Hat AMQ 7.4.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:amq_broker:7" } } } ], "category": "product_family", "name": "Red Hat JBoss AMQ" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-0222", "discovery_date": "2019-03-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1696012" } ], "notes": [ { "category": "description", "text": "In Apache ActiveMQ 5.0.0 - 5.15.8, unmarshalling corrupt MQTT frame can lead to broker Out of Memory exception making it unresponsive.", "title": "Vulnerability description" }, { "category": "summary", "text": "activemq: Corrupt MQTT frame can cause broker shutdown", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-0222" }, { "category": "external", "summary": "RHBZ#1696012", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1696012" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0222", "url": "https://www.cve.org/CVERecord?id=CVE-2019-0222" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0222", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0222" } ], "release_date": "2019-03-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "activemq: Corrupt MQTT frame can cause broker shutdown" }, { "cve": "CVE-2019-9511", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741860" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker can request a large amount of data by manipulating window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this queue can consume excess CPU, memory, or both, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: large amount of data requests leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "There are no mitigations available for nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "RHBZ#1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9511", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "Red Hat AMQ 7.4.3" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: large amount of data requests leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "cve": "CVE-2019-9516", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741864" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker, sending a stream of header with a 0-length header name and a 0-length header value, could cause some implementations to allocate memory for these headers and keep the allocations alive until the session dies. The can consume excess memory, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: 0-length headers lead to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9516" }, { "category": "external", "summary": "RHBZ#1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9516", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9516" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://github.com/nghttp2/nghttp2/issues/1382#", "url": "https://github.com/nghttp2/nghttp2/issues/1382#" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "Red Hat AMQ 7.4.3" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: 0-length headers lead to denial of service" }, { "cve": "CVE-2019-9517", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741868" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in HTTP/2. An attacker can open a HTTP/2 window so the peer can send without constraint. The TCP window remains closed so the peer cannot write the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the server\u0027s queue is setup, the responses can consume excess memory, CPU, or both, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: request for large response leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "The package httpd versions as shipped with Red Hat Enterprise Linux 5, 6 and 7 are not affected by this issue as HTTP/2 support is not provided.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9517" }, { "category": "external", "summary": "RHBZ#1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9517", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9517" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" }, { "category": "workaround", "details": "The httpd version shipped with Red Hat Enterprise Linux 8 provides HTTP/2 support through mod_http2 package. While mod_http2 package is not updated, users can disable HTTP/2 support as mitigation action by executing the following steps:\n\n1. Stop httpd service:\n$ systemctl stop httpd\n\n2. Remove http/2 protocol support from configuration files:\n$ sed -i \u0027s/\\(h2\\)\\|\\(h2c\\)//g\u0027 \u003chttpd_config_file\u003e\n\n3. Validate configuration files to make sure all syntax is valid:\n$ apachectl configtest\n\n4. Restart httpd service:\n$ systemctl start httpd", "product_ids": [ "Red Hat AMQ 7.4.3" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: request for large response leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9518", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735749" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using frames with an empty payload, a flood could occur that results in excessive CPU usage and starvation of other clients. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using empty frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9518" }, { "category": "external", "summary": "RHBZ#1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9518", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: flood using empty frames results in excessive resource consumption" }, { "cve": "CVE-2019-10241", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2019-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1705924" } ], "notes": [ { "category": "description", "text": "In Eclipse Jetty version 9.2.26 and older, 9.3.25 and older, and 9.4.15 and older, the server is vulnerable to XSS conditions if a remote client USES a specially formatted URL against the DefaultServlet or ResourceHandler that is configured for showing a Listing of directory contents.", "title": "Vulnerability description" }, { "category": "summary", "text": "jetty: using specially formatted URL against DefaultServlet or ResourceHandler leads to XSS conditions", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of jetty which is embedded in the nutch package as shipped with Red Hat Satellite 5. The jetty server is not exposed, as such exploitation is difficult, Red Hat Product Security has rated this issue as having security impact of Low in the context of Red Hat Satellite 5. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10241" }, { "category": "external", "summary": "RHBZ#1705924", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705924" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10241", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10241" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10241", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10241" } ], "release_date": "2019-04-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jetty: using specially formatted URL against DefaultServlet or ResourceHandler leads to XSS conditions" }, { "cve": "CVE-2019-10247", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1705993" } ], "notes": [ { "category": "description", "text": "In Eclipse Jetty version 7.x, 8.x, 9.2.27 and older, 9.3.26 and older, and 9.4.16 and older, the server running on any OS and Jetty version combination will reveal the configured fully qualified directory base resource location on the output of the 404 error for not finding a Context that matches the requested path. The default server behavior on jetty-distribution and jetty-home will include at the end of the Handler tree a DefaultHandler, which is responsible for reporting this 404 error, it presents the various configured contexts as HTML for users to click through to. This produced HTML includes output that contains the configured fully qualified directory base resource location for each context.", "title": "Vulnerability description" }, { "category": "summary", "text": "jetty: error path information disclosure", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of jetty which is embedded in the nutch package as shipped with Red Hat Satellite 5. The jetty server is not exposed, as such exploitation is difficult, Red Hat Product Security has rated this issue as having security impact of Low in the context of Red Hat Satellite 5. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10247" }, { "category": "external", "summary": "RHBZ#1705993", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705993" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10247", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10247" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10247", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10247" } ], "release_date": "2019-04-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "jetty: error path information disclosure" }, { "cve": "CVE-2019-16869", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2019-09-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1758619" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty, where whitespace before the colon in HTTP headers is mishandled. This flaw allows an attacker to cause HTTP request smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that this vulnerability does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships vulnerable netty version embedded in Candlepin, however, is not directly vulnerable since HTTP requests are handled by Tomcat and not netty.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-16869" }, { "category": "external", "summary": "RHBZ#1758619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758619" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16869", "url": "https://www.cve.org/CVERecord?id=CVE-2019-16869" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16869", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16869" } ], "release_date": "2019-09-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat AMQ 7.4.3" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers" }, { "cve": "CVE-2019-20444", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1798524" } ], "notes": [ { "category": "description", "text": "A HTTP smuggling flaw was found in HttpObjectDecoder.java in Netty in versions prior to version 4.1.44. HTTP headers with an invalid fold, in this case CRLF (carriage return, line feed) without being followed by SP (space) or HTAB (horizontal tab), result in situations where headers can be misread. Data integrity is the highest threat with this vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP request smuggling", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that the previous vulnerability, CVE-2019-16869, does not pose a substantial practical threat to ElasticSearch 6. We agree that these issues would be difficult to exploit on OpenShift Container Platform so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships a vulnerable version of netty embedded in Candlepin. However, the flaw can not be triggered in that context, because HTTP requests are handled by Tomcat, not by netty. A future release may fix this.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20444" }, { "category": "external", "summary": "RHBZ#1798524", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798524" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20444", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20444" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20444", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20444" }, { "category": "external", "summary": "https://github.com/elastic/elasticsearch/issues/49396", "url": "https://github.com/elastic/elasticsearch/issues/49396" } ], "release_date": "2020-01-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat AMQ 7.4.3" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP request smuggling" }, { "cve": "CVE-2019-20445", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1798509" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty before version 4.1.44, where it accepted multiple Content-Length headers and also accepted both Transfer-Encoding, as well as Content-Length headers where it should reject the message under such circumstances. In circumstances where Netty is used in the context of a server, it could result in a viable HTTP smuggling vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that the previous vulnerability, CVE-2019-16869, does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit both these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships a vulnerable version of netty embedded in Candlepin. However, the flaw can not be triggered in that context, because HTTP requests are handled by Tomcat, not by netty. A future release may fix this.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20445" }, { "category": "external", "summary": "RHBZ#1798509", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798509" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20445", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20445" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20445", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20445" } ], "release_date": "2020-01-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat AMQ 7.4.3" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header" }, { "cve": "CVE-2020-7238", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1796225" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty, where it mishandles Transfer-Encoding whitespace. This flaw allows HTTP Request Smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that the previous vulnerability, CVE-2019-16869, does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit both these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships vulnerable netty version embedded in Candlepin, however, is not directly vulnerable since HTTP requests are handled by Tomcat and not netty.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-7238" }, { "category": "external", "summary": "RHBZ#1796225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796225" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-7238", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7238" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7238", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7238" }, { "category": "external", "summary": "https://netty.io/news/2019/12/18/4-1-44-Final.html", "url": "https://netty.io/news/2019/12/18/4-1-44-Final.html" } ], "release_date": "2020-01-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat AMQ 7.4.3" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling" } ] }
rhsa-2019_2796
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for skydive is now available for Red Hat OpenStack Platform 14.0 (Rocky).\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Skydive is an open source real-time network topology and protocols analyzer.\n\nSecurity Fix(es):\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:2796", "url": "https://access.redhat.com/errata/RHSA-2019:2796" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2796.json" } ], "title": "Red Hat Security Advisory: skydive security update", "tracking": { "current_release_date": "2024-11-13T22:09:39+00:00", "generator": { "date": "2024-11-13T22:09:39+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2019:2796", "initial_release_date": "2019-09-19T02:32:15+00:00", "revision_history": [ { "date": "2019-09-19T02:32:15+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-09-19T02:32:15+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-13T22:09:39+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenStack Platform 14.0", "product": { "name": "Red Hat OpenStack Platform 14.0", "product_id": "7Server-RH7-RHOS-14.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:14::el7" } } } ], "category": "product_family", "name": "Red Hat OpenStack Platform" }, { "branches": [ { "category": "product_version", "name": "skydive-0:0.20.5-2.el7ost.ppc64le", "product": { "name": "skydive-0:0.20.5-2.el7ost.ppc64le", "product_id": "skydive-0:0.20.5-2.el7ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "skydive-agent-0:0.20.5-2.el7ost.ppc64le", "product": { "name": "skydive-agent-0:0.20.5-2.el7ost.ppc64le", "product_id": "skydive-agent-0:0.20.5-2.el7ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "skydive-analyzer-0:0.20.5-2.el7ost.ppc64le", "product": { "name": "skydive-analyzer-0:0.20.5-2.el7ost.ppc64le", "product_id": "skydive-analyzer-0:0.20.5-2.el7ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "skydive-ansible-0:0.20.5-2.el7ost.ppc64le", "product": { "name": "skydive-ansible-0:0.20.5-2.el7ost.ppc64le", "product_id": "skydive-ansible-0:0.20.5-2.el7ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "skydive-debuginfo-0:0.20.5-2.el7ost.ppc64le", "product": { "name": "skydive-debuginfo-0:0.20.5-2.el7ost.ppc64le", "product_id": "skydive-debuginfo-0:0.20.5-2.el7ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "skydive-0:0.20.5-2.el7ost.x86_64", "product": { "name": "skydive-0:0.20.5-2.el7ost.x86_64", "product_id": "skydive-0:0.20.5-2.el7ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "skydive-agent-0:0.20.5-2.el7ost.x86_64", "product": { "name": "skydive-agent-0:0.20.5-2.el7ost.x86_64", "product_id": "skydive-agent-0:0.20.5-2.el7ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "skydive-analyzer-0:0.20.5-2.el7ost.x86_64", "product": { "name": "skydive-analyzer-0:0.20.5-2.el7ost.x86_64", "product_id": "skydive-analyzer-0:0.20.5-2.el7ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "skydive-ansible-0:0.20.5-2.el7ost.x86_64", "product": { "name": "skydive-ansible-0:0.20.5-2.el7ost.x86_64", "product_id": "skydive-ansible-0:0.20.5-2.el7ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "skydive-debuginfo-0:0.20.5-2.el7ost.x86_64", "product": { "name": "skydive-debuginfo-0:0.20.5-2.el7ost.x86_64", "product_id": "skydive-debuginfo-0:0.20.5-2.el7ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "skydive-0:0.20.5-2.el7ost.src", "product": { "name": "skydive-0:0.20.5-2.el7ost.src", "product_id": "skydive-0:0.20.5-2.el7ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "skydive-selinux-0:0.20.5-2.el7ost.noarch", "product": { "name": "skydive-selinux-0:0.20.5-2.el7ost.noarch", "product_id": "skydive-selinux-0:0.20.5-2.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "skydive-0:0.20.5-2.el7ost.ppc64le as a component of Red Hat OpenStack Platform 14.0", "product_id": "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.ppc64le" }, "product_reference": "skydive-0:0.20.5-2.el7ost.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOS-14.0" }, { "category": "default_component_of", "full_product_name": { "name": "skydive-0:0.20.5-2.el7ost.src as a component of Red Hat OpenStack Platform 14.0", "product_id": "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.src" }, "product_reference": "skydive-0:0.20.5-2.el7ost.src", "relates_to_product_reference": "7Server-RH7-RHOS-14.0" }, { "category": "default_component_of", "full_product_name": { "name": "skydive-0:0.20.5-2.el7ost.x86_64 as a component of Red Hat OpenStack Platform 14.0", "product_id": "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.x86_64" }, "product_reference": "skydive-0:0.20.5-2.el7ost.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-14.0" }, { "category": "default_component_of", "full_product_name": { "name": "skydive-agent-0:0.20.5-2.el7ost.ppc64le as a component of Red Hat OpenStack Platform 14.0", "product_id": "7Server-RH7-RHOS-14.0:skydive-agent-0:0.20.5-2.el7ost.ppc64le" }, "product_reference": "skydive-agent-0:0.20.5-2.el7ost.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOS-14.0" }, { "category": "default_component_of", "full_product_name": { "name": "skydive-agent-0:0.20.5-2.el7ost.x86_64 as a component of Red Hat OpenStack Platform 14.0", "product_id": "7Server-RH7-RHOS-14.0:skydive-agent-0:0.20.5-2.el7ost.x86_64" }, "product_reference": "skydive-agent-0:0.20.5-2.el7ost.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-14.0" }, { "category": "default_component_of", "full_product_name": { "name": "skydive-analyzer-0:0.20.5-2.el7ost.ppc64le as a component of Red Hat OpenStack Platform 14.0", "product_id": "7Server-RH7-RHOS-14.0:skydive-analyzer-0:0.20.5-2.el7ost.ppc64le" }, "product_reference": "skydive-analyzer-0:0.20.5-2.el7ost.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOS-14.0" }, { "category": "default_component_of", "full_product_name": { "name": "skydive-analyzer-0:0.20.5-2.el7ost.x86_64 as a component of Red Hat OpenStack Platform 14.0", "product_id": "7Server-RH7-RHOS-14.0:skydive-analyzer-0:0.20.5-2.el7ost.x86_64" }, "product_reference": "skydive-analyzer-0:0.20.5-2.el7ost.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-14.0" }, { "category": "default_component_of", "full_product_name": { "name": "skydive-ansible-0:0.20.5-2.el7ost.ppc64le as a component of Red Hat OpenStack Platform 14.0", "product_id": "7Server-RH7-RHOS-14.0:skydive-ansible-0:0.20.5-2.el7ost.ppc64le" }, "product_reference": "skydive-ansible-0:0.20.5-2.el7ost.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOS-14.0" }, { "category": "default_component_of", "full_product_name": { "name": "skydive-ansible-0:0.20.5-2.el7ost.x86_64 as a component of Red Hat OpenStack Platform 14.0", "product_id": "7Server-RH7-RHOS-14.0:skydive-ansible-0:0.20.5-2.el7ost.x86_64" }, "product_reference": "skydive-ansible-0:0.20.5-2.el7ost.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-14.0" }, { "category": "default_component_of", "full_product_name": { "name": "skydive-debuginfo-0:0.20.5-2.el7ost.ppc64le as a component of Red Hat OpenStack Platform 14.0", "product_id": "7Server-RH7-RHOS-14.0:skydive-debuginfo-0:0.20.5-2.el7ost.ppc64le" }, "product_reference": "skydive-debuginfo-0:0.20.5-2.el7ost.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOS-14.0" }, { "category": "default_component_of", "full_product_name": { "name": "skydive-debuginfo-0:0.20.5-2.el7ost.x86_64 as a component of Red Hat OpenStack Platform 14.0", "product_id": "7Server-RH7-RHOS-14.0:skydive-debuginfo-0:0.20.5-2.el7ost.x86_64" }, "product_reference": "skydive-debuginfo-0:0.20.5-2.el7ost.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-14.0" }, { "category": "default_component_of", "full_product_name": { "name": "skydive-selinux-0:0.20.5-2.el7ost.noarch as a component of Red Hat OpenStack Platform 14.0", "product_id": "7Server-RH7-RHOS-14.0:skydive-selinux-0:0.20.5-2.el7ost.noarch" }, "product_reference": "skydive-selinux-0:0.20.5-2.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-14.0" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.src", "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-agent-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-agent-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-analyzer-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-analyzer-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-ansible-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-ansible-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-debuginfo-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-debuginfo-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-selinux-0:0.20.5-2.el7ost.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-19T02:32:15+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.src", "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-agent-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-agent-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-analyzer-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-analyzer-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-ansible-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-ansible-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-debuginfo-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-debuginfo-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-selinux-0:0.20.5-2.el7ost.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2796" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.src", "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-agent-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-agent-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-analyzer-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-analyzer-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-ansible-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-ansible-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-debuginfo-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-debuginfo-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-selinux-0:0.20.5-2.el7ost.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.src", "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-agent-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-agent-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-analyzer-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-analyzer-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-ansible-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-ansible-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-debuginfo-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-debuginfo-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-selinux-0:0.20.5-2.el7ost.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-19T02:32:15+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.src", "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-agent-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-agent-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-analyzer-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-analyzer-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-ansible-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-ansible-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-debuginfo-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-debuginfo-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-selinux-0:0.20.5-2.el7ost.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2796" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.src", "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-agent-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-agent-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-analyzer-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-analyzer-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-ansible-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-ansible-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-debuginfo-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-debuginfo-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-selinux-0:0.20.5-2.el7ost.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.src", "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-agent-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-agent-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-analyzer-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-analyzer-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-ansible-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-ansible-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-debuginfo-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-debuginfo-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-selinux-0:0.20.5-2.el7ost.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-19T02:32:15+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.src", "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-agent-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-agent-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-analyzer-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-analyzer-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-ansible-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-ansible-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-debuginfo-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-debuginfo-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-selinux-0:0.20.5-2.el7ost.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2796" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.src", "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-agent-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-agent-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-analyzer-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-analyzer-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-ansible-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-ansible-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-debuginfo-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-debuginfo-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-selinux-0:0.20.5-2.el7ost.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" } ] }
rhsa-2020:2565
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "This is a security update for JBoss EAP Continuous Delivery 18.0.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Enterprise Application Platform CD18 is a platform for Java applications based on the WildFly application runtime.\n\nThis release of Red Hat JBoss Enterprise Application Platform CD18 includes bug fixes and enhancements. \n\nSecurity Fix(es):\n\n* jackson-databind: Serialization gadgets in org.springframework:spring-aop (CVE-2020-11619)\n* jackson-databind: Serialization gadgets in commons-jelly:commons-jelly (CVE-2020-11620)\n* wildfly: Race condition on PID file allows for termination of arbitrary processes by local users (CVE-2019-3805)\n* undertow: HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511)\n* undertow: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n* undertow: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n* undertow: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n* wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default (CVE-2019-14838)\n* undertow: Memory Leak in Undertow HttpOpenListener due to holding remoting connections indefinitely (CVE-2019-19343)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:2565", "url": "https://access.redhat.com/errata/RHSA-2020:2565" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1660263", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1660263" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "1751227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751227" }, { "category": "external", "summary": "1780445", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1780445" }, { "category": "external", "summary": "1826798", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1826798" }, { "category": "external", "summary": "1826805", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1826805" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_2565.json" } ], "title": "Red Hat Security Advisory: EAP Continuous Delivery Technical Preview Release 18 security update", "tracking": { "current_release_date": "2025-04-09T17:28:47+00:00", "generator": { "date": "2025-04-09T17:28:47+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.2" } }, "id": "RHSA-2020:2565", "initial_release_date": "2020-06-15T16:17:24+00:00", "revision_history": [ { "date": "2020-06-15T16:17:24+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-06-15T16:17:24+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-04-09T17:28:47+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform Continuous Delivery", "product": { "name": "Red Hat JBoss Enterprise Application Platform Continuous Delivery", "product_id": "Red Hat JBoss Enterprise Application Platform Continuous Delivery", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform_cd:18" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Daniel Le Gall" ], "organization": "SCRT Information Security" } ], "cve": "CVE-2019-3805", "cwe": { "id": "CWE-364", "name": "Signal Handler Race Condition" }, "discovery_date": "2018-11-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1660263" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in wildfly that would allow local users, who are able to execute init.d script, to terminate arbitrary processes on the system. An attacker could exploit this by modifying the PID file in /var/run/jboss-eap/ allowing the init.d script to terminate any process as root.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly: Race condition on PID file allows for termination of arbitrary processes by local users", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-3805" }, { "category": "external", "summary": "RHBZ#1660263", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1660263" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-3805", "url": "https://www.cve.org/CVERecord?id=CVE-2019-3805" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3805", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3805" } ], "release_date": "2019-04-30T17:12:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-15T16:17:24+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nYou must restart the JBoss server process for the update to take effect.\n\nThe References section of this erratum contains a download link (you must log in to download the update)", "product_ids": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2565" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wildfly: Race condition on PID file allows for termination of arbitrary processes by local users" }, { "cve": "CVE-2019-9511", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741860" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker can request a large amount of data by manipulating window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this queue can consume excess CPU, memory, or both, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: large amount of data requests leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "There are no mitigations available for nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "RHBZ#1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9511", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-15T16:17:24+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nYou must restart the JBoss server process for the update to take effect.\n\nThe References section of this erratum contains a download link (you must log in to download the update)", "product_ids": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2565" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: large amount of data requests leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-15T16:17:24+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nYou must restart the JBoss server process for the update to take effect.\n\nThe References section of this erratum contains a download link (you must log in to download the update)", "product_ids": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2565" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-15T16:17:24+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nYou must restart the JBoss server process for the update to take effect.\n\nThe References section of this erratum contains a download link (you must log in to download the update)", "product_ids": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2565" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-15T16:17:24+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nYou must restart the JBoss server process for the update to take effect.\n\nThe References section of this erratum contains a download link (you must log in to download the update)", "product_ids": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2565" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "F\u00e1bio Magalh\u00e3es de Andrade" ], "organization": "Sonda Ativas" }, { "names": [ "Juliano de Castro Santos", "Leonard Lunardi" ], "organization": "UnimedBH" } ], "cve": "CVE-2019-14838", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2019-08-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1751227" } ], "notes": [ { "category": "description", "text": "It was found that Wildfly users had default user permissions set incorrectly. A malicious user could use this flaw to access unauthorized controls for the application server.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14838" }, { "category": "external", "summary": "RHBZ#1751227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751227" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14838", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14838" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14838", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14838" }, { "category": "external", "summary": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14838", "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14838" } ], "release_date": "2019-10-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-15T16:17:24+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nYou must restart the JBoss server process for the update to take effect.\n\nThe References section of this erratum contains a download link (you must log in to download the update)", "product_ids": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2565" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default" }, { "cve": "CVE-2019-19343", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-12-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1780445" } ], "notes": [ { "category": "description", "text": "A flaw was found in Undertow when using Remoting as shipped in Red Hat Jboss EAP before version 7.2.4. A memory leak in HttpOpenListener due to holding remote connections indefinitely may lead to denial of service. Versions before undertow 2.0.25.SP1 and jboss-remoting 5.0.14.SP1 are believed to be vulnerable.", "title": "Vulnerability description" }, { "category": "summary", "text": "Undertow: Memory Leak in Undertow HttpOpenListener due to holding remoting connections indefinitely", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19343" }, { "category": "external", "summary": "RHBZ#1780445", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1780445" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19343", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19343" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19343", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19343" } ], "release_date": "2019-12-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-15T16:17:24+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nYou must restart the JBoss server process for the update to take effect.\n\nThe References section of this erratum contains a download link (you must log in to download the update)", "product_ids": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2565" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Undertow: Memory Leak in Undertow HttpOpenListener due to holding remoting connections indefinitely" }, { "cve": "CVE-2020-11619", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-04-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1826805" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.springframework:spring-aop", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11619" }, { "category": "external", "summary": "RHBZ#1826805", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1826805" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11619", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11619" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11619", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11619" } ], "release_date": "2020-04-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-15T16:17:24+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nYou must restart the JBoss server process for the update to take effect.\n\nThe References section of this erratum contains a download link (you must log in to download the update)", "product_ids": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2565" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in org.springframework:spring-aop" }, { "cve": "CVE-2020-11620", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-04-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1826798" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in commons-jelly:commons-jelly", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11620" }, { "category": "external", "summary": "RHBZ#1826798", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1826798" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11620", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11620" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11620", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11620" } ], "release_date": "2020-04-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-15T16:17:24+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nYou must restart the JBoss server process for the update to take effect.\n\nThe References section of this erratum contains a download link (you must log in to download the update)", "product_ids": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2565" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in commons-jelly:commons-jelly" } ] }
rhsa-2019:4041
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "New Red Hat Single Sign-On 7.3.5 packages are now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Single Sign-On 7.3 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications.\n\nThis release of Red Hat Single Sign-On 7.3.5 on RHEL 7 serves as a replacement for Red Hat Single Sign-On 7.3.4, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* keycloak: Service accounts reset password flow not using placeholder.org domain anymore (CVE-2019-14837)\n\n* undertow: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* undertow: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* undertow: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default (CVE-2019-14838)\n\n* wildfly: wildfly-security-manager: security manager authorization bypass (CVE-2019-14843)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:4041", "url": "https://access.redhat.com/errata/RHSA-2019:4041" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.3/", "url": "https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.3/" }, { "category": "external", "summary": "1730227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1730227" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1751227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751227" }, { "category": "external", "summary": "1752980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752980" }, { "category": "external", "summary": "KEYCLOAK-11816", "url": "https://issues.redhat.com/browse/KEYCLOAK-11816" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_4041.json" } ], "title": "Red Hat Security Advisory: Red Hat Single Sign-On 7.3.5 security update on RHEL 7", "tracking": { "current_release_date": "2025-03-15T19:44:45+00:00", "generator": { "date": "2025-03-15T19:44:45+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.1" } }, "id": "RHSA-2019:4041", "initial_release_date": "2019-12-02T17:04:03+00:00", "revision_history": [ { "date": "2019-12-02T17:04:03+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-12-02T17:04:03+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-03-15T19:44:45+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Single Sign-On 7.3 for RHEL 7 Server", "product": { "name": "Red Hat Single Sign-On 7.3 for RHEL 7 Server", "product_id": "7Server-RHSSO-7.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:red_hat_single_sign_on:7::el7" } } } ], "category": "product_family", "name": "Red Hat Single Sign-On" }, { "branches": [ { "category": "product_version", "name": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "product": { "name": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "product_id": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7sso?arch=noarch" } } }, { "category": "product_version", "name": "rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "product": { "name": "rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "product_id": "rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7sso?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "product": { "name": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "product_id": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7sso?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch as a component of Red Hat Single Sign-On 7.3 for RHEL 7 Server", "product_id": "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" }, "product_reference": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "relates_to_product_reference": "7Server-RHSSO-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src as a component of Red Hat Single Sign-On 7.3 for RHEL 7 Server", "product_id": "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src" }, "product_reference": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "relates_to_product_reference": "7Server-RHSSO-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch as a component of Red Hat Single Sign-On 7.3 for RHEL 7 Server", "product_id": "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" }, "product_reference": "rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "relates_to_product_reference": "7Server-RHSSO-7.3" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:04:03+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4041" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:04:03+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4041" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:04:03+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4041" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "Vadim Ashikhman" ] } ], "cve": "CVE-2019-14837", "cwe": { "id": "CWE-547", "name": "Use of Hard-coded, Security-relevant Constants" }, "discovery_date": "2019-07-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1730227" } ], "notes": [ { "category": "description", "text": "A flaw was found in Keycloak. The use of an open hard-coded domain can allow an unauthorized login by setting up a mail server and resetting the user credentials, enabling information disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak: keycloak uses hardcoded open dummy domain for new accounts enabling information disclosure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14837" }, { "category": "external", "summary": "RHBZ#1730227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1730227" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14837", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14837" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14837", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14837" } ], "release_date": "2019-12-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:04:03+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4041" }, { "category": "workaround", "details": "It is not a very straight forward workaround but it is possible to mitigate this by manually editing the default Email ID ([email protected]) to some valid email ID ([email protected]) in the USER_ENTITY table in the RHSSO database used.", "product_ids": [ "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "keycloak: keycloak uses hardcoded open dummy domain for new accounts enabling information disclosure" }, { "acknowledgments": [ { "names": [ "F\u00e1bio Magalh\u00e3es de Andrade" ], "organization": "Sonda Ativas" }, { "names": [ "Juliano de Castro Santos", "Leonard Lunardi" ], "organization": "UnimedBH" } ], "cve": "CVE-2019-14838", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2019-08-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1751227" } ], "notes": [ { "category": "description", "text": "It was found that Wildfly users had default user permissions set incorrectly. A malicious user could use this flaw to access unauthorized controls for the application server.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14838" }, { "category": "external", "summary": "RHBZ#1751227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751227" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14838", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14838" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14838", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14838" }, { "category": "external", "summary": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14838", "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14838" } ], "release_date": "2019-10-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:04:03+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4041" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default" }, { "cve": "CVE-2019-14843", "cwe": { "id": "CWE-592", "name": "CWE-592" }, "discovery_date": "2019-09-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1752980" } ], "notes": [ { "category": "description", "text": "A flaw was found in Wildfly Security Manager, running under JDK 11 or 8, that authorized requests for any requester. This flaw could be used by a malicious app deployed on the app server to access unauthorized information and possibly conduct further attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-security-manager: security manager authorization bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14843" }, { "category": "external", "summary": "RHBZ#1752980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752980" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14843", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14843" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14843", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14843" } ], "release_date": "2019-09-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:04:03+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4041" }, { "category": "workaround", "details": "This flaw only affects the Security Manager running under JDK 11 or 8. To mitigate exposure to this flaw, do not run under those JDK versions.", "product_ids": [ "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "wildfly-security-manager: security manager authorization bypass" } ] }
RHSA-2019:2955
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for rh-nodejs8-nodejs is now available for Red Hat Software Collections.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.\n\nThe following packages have been upgraded to a later upstream version: rh-nodejs8-nodejs (8.16.1).\n\nSecurity Fix(es):\n\n* HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511)\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using PRIORITY frames results in excessive resource consumption (CVE-2019-9513)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* HTTP/2: 0-length headers lead to denial of service (CVE-2019-9516)\n\n* HTTP/2: request for large response leads to denial of service (CVE-2019-9517)\n\n* HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:2955", "url": "https://access.redhat.com/errata/RHSA-2019:2955" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735741" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2955.json" } ], "title": "Red Hat Security Advisory: rh-nodejs8-nodejs security update", "tracking": { "current_release_date": "2025-03-15T19:44:23+00:00", "generator": { "date": "2025-03-15T19:44:23+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.1" } }, "id": "RHSA-2019:2955", "initial_release_date": "2019-10-02T14:29:13+00:00", "revision_history": [ { "date": "2019-10-02T14:29:13+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-10-02T14:29:13+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-03-15T19:44:23+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } } ], "category": "product_family", "name": "Red Hat Software Collections" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs8-0:3.0-5.el7.ppc64le", "product": { "name": "rh-nodejs8-0:3.0-5.el7.ppc64le", "product_id": "rh-nodejs8-0:3.0-5.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "product": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "product_id": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "product": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "product_id": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "product": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "product_id": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "product": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "product_id": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "product": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "product_id": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "product": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "product_id": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs8-0:3.0-5.el7.s390x", "product": { "name": "rh-nodejs8-0:3.0-5.el7.s390x", "product_id": "rh-nodejs8-0:3.0-5.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs8-runtime-0:3.0-5.el7.s390x", "product": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.s390x", "product_id": "rh-nodejs8-runtime-0:3.0-5.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "product": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "product_id": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "product": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "product_id": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "product": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "product_id": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "product": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "product_id": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "product": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "product_id": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs8-0:3.0-5.el7.aarch64", "product": { "name": "rh-nodejs8-0:3.0-5.el7.aarch64", "product_id": "rh-nodejs8-0:3.0-5.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=aarch64" } } }, { "category": "product_version", "name": "rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "product": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "product_id": "rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=aarch64" } } }, { "category": "product_version", "name": "rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "product": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "product_id": "rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=aarch64" } } }, { "category": "product_version", "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "product": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "product_id": "rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=aarch64" } } }, { "category": "product_version", "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "product": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "product_id": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=aarch64" } } }, { "category": "product_version", "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "product": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "product_id": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=aarch64" } } }, { "category": "product_version", "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "product": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "product_id": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs8-0:3.0-5.el7.src", "product": { "name": "rh-nodejs8-0:3.0-5.el7.src", "product_id": "rh-nodejs8-0:3.0-5.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "product": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "product_id": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs8-0:3.0-5.el7.x86_64", "product": { "name": "rh-nodejs8-0:3.0-5.el7.x86_64", "product_id": "rh-nodejs8-0:3.0-5.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "product": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "product_id": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "product": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "product_id": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "product": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "product_id": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "product": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "product_id": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "product": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "product_id": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "product": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "product_id": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "product": { "name": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "product_id": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.src", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch" }, "product_reference": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch" }, "product_reference": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch" }, "product_reference": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch" }, "product_reference": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch" }, "product_reference": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.src", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch" }, "product_reference": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-9511", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741860" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker can request a large amount of data by manipulating window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this queue can consume excess CPU, memory, or both, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: large amount of data requests leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "There are no mitigations available for nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "RHBZ#1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9511", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-02T14:29:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2955" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: large amount of data requests leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-02T14:29:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2955" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9513", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735741" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker, using PRIORITY frames to flood the system, could cause excessive CPU usage and starvation of other clients. The largest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PRIORITY frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for packages nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9513" }, { "category": "external", "summary": "RHBZ#1735741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735741" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9513", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9513" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9513", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9513" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nghttp2.org/blog/2019/08/19/nghttp2-v1-39-2/", "url": "https://nghttp2.org/blog/2019/08/19/nghttp2-v1-39-2/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-02T14:29:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2955" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PRIORITY frames results in excessive resource consumption" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-02T14:29:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2955" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-02T14:29:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2955" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "cve": "CVE-2019-9516", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741864" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker, sending a stream of header with a 0-length header name and a 0-length header value, could cause some implementations to allocate memory for these headers and keep the allocations alive until the session dies. The can consume excess memory, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: 0-length headers lead to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9516" }, { "category": "external", "summary": "RHBZ#1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9516", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9516" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://github.com/nghttp2/nghttp2/issues/1382#", "url": "https://github.com/nghttp2/nghttp2/issues/1382#" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-02T14:29:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2955" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: 0-length headers lead to denial of service" }, { "cve": "CVE-2019-9517", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741868" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in HTTP/2. An attacker can open a HTTP/2 window so the peer can send without constraint. The TCP window remains closed so the peer cannot write the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the server\u0027s queue is setup, the responses can consume excess memory, CPU, or both, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: request for large response leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "The package httpd versions as shipped with Red Hat Enterprise Linux 5, 6 and 7 are not affected by this issue as HTTP/2 support is not provided.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9517" }, { "category": "external", "summary": "RHBZ#1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9517", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9517" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-02T14:29:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2955" }, { "category": "workaround", "details": "The httpd version shipped with Red Hat Enterprise Linux 8 provides HTTP/2 support through mod_http2 package. While mod_http2 package is not updated, users can disable HTTP/2 support as mitigation action by executing the following steps:\n\n1. Stop httpd service:\n$ systemctl stop httpd\n\n2. Remove http/2 protocol support from configuration files:\n$ sed -i \u0027s/\\(h2\\)\\|\\(h2c\\)//g\u0027 \u003chttpd_config_file\u003e\n\n3. Validate configuration files to make sure all syntax is valid:\n$ apachectl configtest\n\n4. Restart httpd service:\n$ systemctl start httpd", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: request for large response leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9518", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735749" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using frames with an empty payload, a flood could occur that results in excessive CPU usage and starvation of other clients. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using empty frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9518" }, { "category": "external", "summary": "RHBZ#1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9518", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-02T14:29:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2955" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using empty frames results in excessive resource consumption" } ] }
rhsa-2019:4269
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the container-tools:rhel8 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.\n\nSecurity Fix(es):\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* runc: AppArmor/SELinux bypass with malicious image that specifies a volume at /proc (CVE-2019-16884)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* avc: podman run --security-opt label=type:svirt_qemu_net_t (BZ#1764318)\n\n* backport json-file logging support to 1.4.2 (BZ#1770176)\n\n* Selinux won\u0027t allow SCTP inter pod communication (BZ#1774382)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:4269", "url": "https://access.redhat.com/errata/RHSA-2019:4269" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1757214", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1757214" }, { "category": "external", "summary": "1764318", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764318" }, { "category": "external", "summary": "1770176", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770176" }, { "category": "external", "summary": "1774382", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774382" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_4269.json" } ], "title": "Red Hat Security Advisory: container-tools:rhel8 security and bug fix update", "tracking": { "current_release_date": "2025-03-15T19:44:52+00:00", "generator": { "date": "2025-03-15T19:44:52+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.1" } }, "id": "RHSA-2019:4269", "initial_release_date": "2019-12-17T12:56:53+00:00", "revision_history": [ { "date": "2019-12-17T12:56:53+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-12-17T12:56:53+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-03-15T19:44:52+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "container-tools:rhel8:8010020191126140055:c294d161", "product": { "name": "container-tools:rhel8:8010020191126140055:c294d161", "product_id": "container-tools:rhel8:8010020191126140055:c294d161", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/container-tools@rhel8:8010020191126140055:c294d161" } } }, { "category": "product_version", "name": "cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.noarch", "product": { "name": "cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.noarch", "product_id": "cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=noarch" } } }, { "category": "product_version", "name": "container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.noarch", "product": { "name": "container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.noarch", "product_id": "container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4900%2B9d7326b8?arch=noarch\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-docker-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "product": { "name": "podman-docker-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "product_id": "podman-docker-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4830%2Bf49150d7?arch=noarch" } } }, { "category": "product_version", "name": "podman-manpages-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "product": { "name": "podman-manpages-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "product_id": "podman-manpages-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4830%2Bf49150d7?arch=noarch" } } }, { "category": "product_version", "name": "python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.noarch", "product": { "name": "python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.noarch", "product_id": "python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.src", "product": { "name": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.src", "product_id": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4240%2B893c1ab8?arch=src" } } }, { "category": "product_version", "name": "cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.src", "product": { "name": "cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.src", "product_id": "cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=src" } } }, { "category": "product_version", "name": "container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.src", "product": { "name": "container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.src", "product_id": "container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4900%2B9d7326b8?arch=src\u0026epoch=2" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.src", "product": { "name": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.src", "product_id": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4881%2B045289ee?arch=src" } } }, { "category": "product_version", "name": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.src", "product": { "name": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.src", "product_id": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=src" } } }, { "category": "product_version", "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.src", "product": { "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.src", "product_id": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.src", "product": { "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.src", "product_id": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=src\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.src", "product": { "name": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.src", "product_id": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4830%2Bf49150d7?arch=src" } } }, { "category": "product_version", "name": "python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.src", "product": { "name": "python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.src", "product_id": "python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=src" } } }, { "category": "product_version", "name": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.src", "product": { "name": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.src", "product_id": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4873%2B4a24e241?arch=src" } } }, { "category": "product_version", "name": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.src", "product": { "name": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.src", "product_id": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4876%2Be678a192?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.src", "product": { "name": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.src", "product_id": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4306%2B1d917805?arch=src" } } }, { "category": "product_version", "name": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.src", "product": { "name": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.src", "product_id": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "product": { "name": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "product_id": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4240%2B893c1ab8?arch=x86_64" } } }, { "category": "product_version", "name": "buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "product": { "name": "buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "product_id": "buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4240%2B893c1ab8?arch=x86_64" } } }, { "category": "product_version", "name": "buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "product": { "name": "buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "product_id": "buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4240%2B893c1ab8?arch=x86_64" } } }, { "category": "product_version", "name": "buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "product": { "name": "buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "product_id": "buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4240%2B893c1ab8?arch=x86_64" } } }, { "category": "product_version", "name": "buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "product": { "name": "buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "product_id": "buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4240%2B893c1ab8?arch=x86_64" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "product": { "name": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "product_id": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4881%2B045289ee?arch=x86_64" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "product": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "product_id": "containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4881%2B045289ee?arch=x86_64" } } }, { "category": "product_version", "name": "containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "product": { "name": "containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "product_id": "containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4881%2B045289ee?arch=x86_64" } } }, { "category": "product_version", "name": "containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "product": { "name": "containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "product_id": "containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4876%2Be678a192?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "product": { "name": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "product_id": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=x86_64" } } }, { "category": "product_version", "name": "fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "product": { "name": "fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "product_id": "fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=x86_64" } } }, { "category": "product_version", "name": "fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "product": { "name": "fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "product_id": "fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=x86_64" } } }, { "category": "product_version", "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "product": { "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "product_id": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "product": { "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "product_id": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "product": { "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "product_id": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "product": { "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "product_id": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "product": { "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "product_id": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "product": { "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "product_id": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "product": { "name": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "product_id": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4830%2Bf49150d7?arch=x86_64" } } }, { "category": "product_version", "name": "podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "product": { "name": "podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "product_id": "podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4830%2Bf49150d7?arch=x86_64" } } }, { "category": "product_version", "name": "podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "product": { "name": "podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "product_id": "podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4830%2Bf49150d7?arch=x86_64" } } }, { "category": "product_version", "name": "podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "product": { "name": "podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "product_id": "podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4830%2Bf49150d7?arch=x86_64" } } }, { "category": "product_version", "name": "podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "product": { "name": "podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "product_id": "podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4830%2Bf49150d7?arch=x86_64" } } }, { "category": "product_version", "name": "podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "product": { "name": "podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "product_id": "podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4830%2Bf49150d7?arch=x86_64" } } }, { "category": "product_version", "name": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "product": { "name": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "product_id": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4873%2B4a24e241?arch=x86_64" } } }, { "category": "product_version", "name": "runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "product": { "name": "runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "product_id": "runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4873%2B4a24e241?arch=x86_64" } } }, { "category": "product_version", "name": "runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "product": { "name": "runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "product_id": "runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4873%2B4a24e241?arch=x86_64" } } }, { "category": "product_version", "name": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "product": { "name": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "product_id": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4876%2Be678a192?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "product": { "name": "skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "product_id": "skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4876%2Be678a192?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "product": { "name": "skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "product_id": "skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4876%2Be678a192?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "product": { "name": "skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "product_id": "skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4876%2Be678a192?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "product": { "name": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "product_id": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4306%2B1d917805?arch=x86_64" } } }, { "category": "product_version", "name": "slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "product": { "name": "slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "product_id": "slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4306%2B1d917805?arch=x86_64" } } }, { "category": "product_version", "name": "slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "product": { "name": "slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "product_id": "slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4306%2B1d917805?arch=x86_64" } } }, { "category": "product_version", "name": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.x86_64", "product": { "name": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.x86_64", "product_id": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "product": { "name": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "product_id": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4240%2B893c1ab8?arch=s390x" } } }, { "category": "product_version", "name": "buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "product": { "name": "buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "product_id": "buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4240%2B893c1ab8?arch=s390x" } } }, { "category": "product_version", "name": "buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "product": { "name": "buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "product_id": "buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4240%2B893c1ab8?arch=s390x" } } }, { "category": "product_version", "name": "buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "product": { "name": "buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "product_id": "buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4240%2B893c1ab8?arch=s390x" } } }, { "category": "product_version", "name": "buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "product": { "name": "buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "product_id": "buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4240%2B893c1ab8?arch=s390x" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "product": { "name": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "product_id": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4881%2B045289ee?arch=s390x" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "product": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "product_id": "containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4881%2B045289ee?arch=s390x" } } }, { "category": "product_version", "name": "containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "product": { "name": "containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "product_id": "containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4881%2B045289ee?arch=s390x" } } }, { "category": "product_version", "name": "containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "product": { "name": "containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "product_id": "containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4876%2Be678a192?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "product": { "name": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "product_id": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=s390x" } } }, { "category": "product_version", "name": "fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "product": { "name": "fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "product_id": "fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=s390x" } } }, { "category": "product_version", "name": "fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "product": { "name": "fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "product_id": "fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=s390x" } } }, { "category": "product_version", "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "product": { "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "product_id": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "product": { "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "product_id": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "product": { "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "product_id": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "product": { "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "product_id": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "product": { "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "product_id": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "product": { "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "product_id": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "product": { "name": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "product_id": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4830%2Bf49150d7?arch=s390x" } } }, { "category": "product_version", "name": "podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "product": { "name": "podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "product_id": "podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4830%2Bf49150d7?arch=s390x" } } }, { "category": "product_version", "name": "podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "product": { "name": "podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "product_id": "podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4830%2Bf49150d7?arch=s390x" } } }, { "category": "product_version", "name": "podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "product": { "name": "podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "product_id": "podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4830%2Bf49150d7?arch=s390x" } } }, { "category": "product_version", "name": "podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "product": { "name": "podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "product_id": "podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4830%2Bf49150d7?arch=s390x" } } }, { "category": "product_version", "name": "podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "product": { "name": "podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "product_id": "podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4830%2Bf49150d7?arch=s390x" } } }, { "category": "product_version", "name": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "product": { "name": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "product_id": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4873%2B4a24e241?arch=s390x" } } }, { "category": "product_version", "name": "runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "product": { "name": "runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "product_id": "runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4873%2B4a24e241?arch=s390x" } } }, { "category": "product_version", "name": "runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "product": { "name": "runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "product_id": "runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4873%2B4a24e241?arch=s390x" } } }, { "category": "product_version", "name": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "product": { "name": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "product_id": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4876%2Be678a192?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "product": { "name": "skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "product_id": "skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4876%2Be678a192?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "product": { "name": "skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "product_id": "skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4876%2Be678a192?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "product": { "name": "skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "product_id": "skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4876%2Be678a192?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "product": { "name": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "product_id": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4306%2B1d917805?arch=s390x" } } }, { "category": "product_version", "name": "slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "product": { "name": "slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "product_id": "slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4306%2B1d917805?arch=s390x" } } }, { "category": "product_version", "name": "slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "product": { "name": "slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "product_id": "slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4306%2B1d917805?arch=s390x" } } }, { "category": "product_version", "name": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.s390x", "product": { "name": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.s390x", "product_id": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "product": { "name": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "product_id": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4240%2B893c1ab8?arch=ppc64le" } } }, { "category": "product_version", "name": "buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "product": { "name": "buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "product_id": "buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4240%2B893c1ab8?arch=ppc64le" } } }, { "category": "product_version", "name": "buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "product": { "name": "buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "product_id": "buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4240%2B893c1ab8?arch=ppc64le" } } }, { "category": "product_version", "name": "buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "product": { "name": "buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "product_id": "buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4240%2B893c1ab8?arch=ppc64le" } } }, { "category": "product_version", "name": "buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "product": { "name": "buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "product_id": "buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4240%2B893c1ab8?arch=ppc64le" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "product": { "name": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "product_id": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4881%2B045289ee?arch=ppc64le" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "product": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "product_id": "containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4881%2B045289ee?arch=ppc64le" } } }, { "category": "product_version", "name": "containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "product": { "name": "containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "product_id": "containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4881%2B045289ee?arch=ppc64le" } } }, { "category": "product_version", "name": "containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "product": { "name": "containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "product_id": "containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4876%2Be678a192?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "product": { "name": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "product_id": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=ppc64le" } } }, { "category": "product_version", "name": "fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "product": { "name": "fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "product_id": "fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=ppc64le" } } }, { "category": "product_version", "name": "fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "product": { "name": "fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "product_id": "fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=ppc64le" } } }, { "category": "product_version", "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "product": { "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "product_id": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "product": { "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "product_id": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "product": { "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "product_id": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "product": { "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "product_id": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "product": { "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "product_id": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "product": { "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "product_id": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "product": { "name": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "product_id": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4830%2Bf49150d7?arch=ppc64le" } } }, { "category": "product_version", "name": "podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "product": { "name": "podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "product_id": "podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4830%2Bf49150d7?arch=ppc64le" } } }, { "category": "product_version", "name": "podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "product": { "name": "podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "product_id": "podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4830%2Bf49150d7?arch=ppc64le" } } }, { "category": "product_version", "name": "podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "product": { "name": "podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "product_id": "podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4830%2Bf49150d7?arch=ppc64le" } } }, { "category": "product_version", "name": "podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "product": { "name": "podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "product_id": "podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4830%2Bf49150d7?arch=ppc64le" } } }, { "category": "product_version", "name": "podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "product": { "name": "podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "product_id": "podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4830%2Bf49150d7?arch=ppc64le" } } }, { "category": "product_version", "name": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "product": { "name": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "product_id": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4873%2B4a24e241?arch=ppc64le" } } }, { "category": "product_version", "name": "runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "product": { "name": "runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "product_id": "runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4873%2B4a24e241?arch=ppc64le" } } }, { "category": "product_version", "name": "runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "product": { "name": "runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "product_id": "runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4873%2B4a24e241?arch=ppc64le" } } }, { "category": "product_version", "name": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "product": { "name": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "product_id": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4876%2Be678a192?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "product": { "name": "skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "product_id": "skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4876%2Be678a192?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "product": { "name": "skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "product_id": "skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4876%2Be678a192?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "product": { "name": "skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "product_id": "skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4876%2Be678a192?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "product": { "name": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "product_id": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4306%2B1d917805?arch=ppc64le" } } }, { "category": "product_version", "name": "slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "product": { "name": "slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "product_id": "slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4306%2B1d917805?arch=ppc64le" } } }, { "category": "product_version", "name": "slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "product": { "name": "slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "product_id": "slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4306%2B1d917805?arch=ppc64le" } } }, { "category": "product_version", "name": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.ppc64le", "product": { "name": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.ppc64le", "product_id": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "product": { "name": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "product_id": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4240%2B893c1ab8?arch=aarch64" } } }, { "category": "product_version", "name": "buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "product": { "name": "buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "product_id": "buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4240%2B893c1ab8?arch=aarch64" } } }, { "category": "product_version", "name": "buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "product": { "name": "buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "product_id": "buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4240%2B893c1ab8?arch=aarch64" } } }, { "category": "product_version", "name": "buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "product": { "name": "buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "product_id": "buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4240%2B893c1ab8?arch=aarch64" } } }, { "category": "product_version", "name": "buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "product": { "name": "buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "product_id": "buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4240%2B893c1ab8?arch=aarch64" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "product": { "name": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "product_id": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4881%2B045289ee?arch=aarch64" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "product": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "product_id": "containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4881%2B045289ee?arch=aarch64" } } }, { "category": "product_version", "name": "containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "product": { "name": "containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "product_id": "containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4881%2B045289ee?arch=aarch64" } } }, { "category": "product_version", "name": "containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "product": { "name": "containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "product_id": "containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4876%2Be678a192?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "product": { "name": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "product_id": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=aarch64" } } }, { "category": "product_version", "name": "fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "product": { "name": "fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "product_id": "fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=aarch64" } } }, { "category": "product_version", "name": "fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "product": { "name": "fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "product_id": "fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=aarch64" } } }, { "category": "product_version", "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "product": { "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "product_id": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "product": { "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "product_id": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "product": { "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "product_id": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "product": { "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "product_id": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "product": { "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "product_id": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "product": { "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "product_id": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "product": { "name": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "product_id": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4830%2Bf49150d7?arch=aarch64" } } }, { "category": "product_version", "name": "podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "product": { "name": "podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "product_id": "podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4830%2Bf49150d7?arch=aarch64" } } }, { "category": "product_version", "name": "podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "product": { "name": "podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "product_id": "podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4830%2Bf49150d7?arch=aarch64" } } }, { "category": "product_version", "name": "podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "product": { "name": "podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "product_id": "podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4830%2Bf49150d7?arch=aarch64" } } }, { "category": "product_version", "name": "podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "product": { "name": "podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "product_id": "podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4830%2Bf49150d7?arch=aarch64" } } }, { "category": "product_version", "name": "podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "product": { "name": "podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "product_id": "podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4830%2Bf49150d7?arch=aarch64" } } }, { "category": "product_version", "name": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "product": { "name": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "product_id": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4873%2B4a24e241?arch=aarch64" } } }, { "category": "product_version", "name": "runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "product": { "name": "runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "product_id": "runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4873%2B4a24e241?arch=aarch64" } } }, { "category": "product_version", "name": "runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "product": { "name": "runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "product_id": "runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4873%2B4a24e241?arch=aarch64" } } }, { "category": "product_version", "name": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "product": { "name": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "product_id": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4876%2Be678a192?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "product": { "name": "skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "product_id": "skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4876%2Be678a192?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "product": { "name": "skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "product_id": "skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4876%2Be678a192?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "product": { "name": "skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "product_id": "skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4876%2Be678a192?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "product": { "name": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "product_id": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4306%2B1d917805?arch=aarch64" } } }, { "category": "product_version", "name": "slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "product": { "name": "slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "product_id": "slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4306%2B1d917805?arch=aarch64" } } }, { "category": "product_version", "name": "slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "product": { "name": "slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "product_id": "slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4306%2B1d917805?arch=aarch64" } } }, { "category": "product_version", "name": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.aarch64", "product": { "name": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.aarch64", "product_id": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, "product_reference": "container-tools:rhel8:8010020191126140055:c294d161", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64" }, "product_reference": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le" }, "product_reference": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x" }, "product_reference": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.src as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.src" }, "product_reference": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64" }, "product_reference": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64" }, "product_reference": "buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le" }, "product_reference": "buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x" }, "product_reference": "buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64" }, "product_reference": "buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64" }, "product_reference": "buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le" }, "product_reference": "buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x" }, "product_reference": "buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64" }, "product_reference": "buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64" }, "product_reference": "buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le" }, "product_reference": "buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x" }, "product_reference": "buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64" }, "product_reference": "buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64" }, "product_reference": "buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le" }, "product_reference": "buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x" }, "product_reference": "buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64" }, "product_reference": "buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.noarch as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.noarch" }, "product_reference": "cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.src as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.src" }, "product_reference": "cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.noarch as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.noarch" }, "product_reference": "container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.src as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.src" }, "product_reference": "container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64" }, "product_reference": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le" }, "product_reference": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x" }, "product_reference": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.src as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.src" }, "product_reference": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64" }, "product_reference": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64" }, "product_reference": "containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le" }, "product_reference": "containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x" }, "product_reference": "containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64" }, "product_reference": "containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64" }, "product_reference": "containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le" }, "product_reference": "containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x" }, "product_reference": "containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64" }, "product_reference": "containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64" }, "product_reference": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le" }, "product_reference": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x" }, "product_reference": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.src as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.src" }, "product_reference": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64" }, "product_reference": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64" }, "product_reference": "fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le" }, "product_reference": "fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x" }, "product_reference": "fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64" }, "product_reference": "fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64" }, "product_reference": "fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le" }, "product_reference": "fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x" }, "product_reference": "fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64" }, "product_reference": "fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64" }, "product_reference": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le" }, "product_reference": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x" }, "product_reference": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.src as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.src" }, "product_reference": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64" }, "product_reference": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64" }, "product_reference": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le" }, "product_reference": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x" }, "product_reference": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64" }, "product_reference": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64" }, "product_reference": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le" }, "product_reference": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x" }, "product_reference": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64" }, "product_reference": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64" }, "product_reference": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le" }, "product_reference": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x" }, "product_reference": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.src as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.src" }, "product_reference": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64" }, "product_reference": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64" }, "product_reference": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le" }, "product_reference": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x" }, "product_reference": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64" }, "product_reference": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64" }, "product_reference": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le" }, "product_reference": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x" }, "product_reference": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64" }, "product_reference": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64" }, "product_reference": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le" }, "product_reference": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x" }, "product_reference": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.src as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.src" }, "product_reference": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64" }, "product_reference": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64" }, "product_reference": "podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le" }, "product_reference": "podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x" }, "product_reference": "podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64" }, "product_reference": "podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64" }, "product_reference": "podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le" }, "product_reference": "podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x" }, "product_reference": "podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64" }, "product_reference": "podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-docker-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-docker-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch" }, "product_reference": "podman-docker-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-manpages-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-manpages-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch" }, "product_reference": "podman-manpages-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64" }, "product_reference": "podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le" }, "product_reference": "podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x" }, "product_reference": "podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64" }, "product_reference": "podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64" }, "product_reference": "podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le" }, "product_reference": "podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x" }, "product_reference": "podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64" }, "product_reference": "podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64" }, "product_reference": "podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le" }, "product_reference": "podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x" }, "product_reference": "podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64" }, "product_reference": "podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.noarch as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.noarch" }, "product_reference": "python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.src as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.src" }, "product_reference": "python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64" }, "product_reference": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le" }, "product_reference": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x" }, "product_reference": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.src as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.src" }, "product_reference": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64" }, "product_reference": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64" }, "product_reference": "runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le" }, "product_reference": "runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x" }, "product_reference": "runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64" }, "product_reference": "runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64" }, "product_reference": "runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le" }, "product_reference": "runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x" }, "product_reference": "runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64" }, "product_reference": "runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64" }, "product_reference": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le" }, "product_reference": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x" }, "product_reference": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.src as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.src" }, "product_reference": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64" }, "product_reference": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64" }, "product_reference": "skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le" }, "product_reference": "skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x" }, "product_reference": "skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64" }, "product_reference": "skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64" }, "product_reference": "skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le" }, "product_reference": "skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x" }, "product_reference": "skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64" }, "product_reference": "skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64" }, "product_reference": "skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le" }, "product_reference": "skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x" }, "product_reference": "skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64" }, "product_reference": "skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64" }, "product_reference": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le" }, "product_reference": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x" }, "product_reference": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.src as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.src" }, "product_reference": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64" }, "product_reference": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64" }, "product_reference": "slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le" }, "product_reference": "slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x" }, "product_reference": "slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64" }, "product_reference": "slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64" }, "product_reference": "slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le" }, "product_reference": "slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x" }, "product_reference": "slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64" }, "product_reference": "slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.aarch64" }, "product_reference": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.ppc64le" }, "product_reference": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.s390x" }, "product_reference": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.src as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.src" }, "product_reference": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.x86_64" }, "product_reference": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-docker-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-manpages-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-17T12:56:53+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-docker-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-manpages-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4269" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-docker-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-manpages-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-docker-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-manpages-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-17T12:56:53+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-docker-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-manpages-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4269" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-docker-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-manpages-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "cve": "CVE-2019-16884", "cwe": { "id": "CWE-41", "name": "Improper Resolution of Path Equivalence" }, "discovery_date": "2019-09-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1757214" } ], "notes": [ { "category": "description", "text": "runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other products, allows AppArmor restriction bypass because libcontainer/rootfs_linux.go incorrectly checks mount targets, and thus a malicious Docker image can mount over a /proc directory.", "title": "Vulnerability description" }, { "category": "summary", "text": "runc: AppArmor/SELinux bypass with malicious image that specifies a volume at /proc", "title": "Vulnerability summary" }, { "category": "other", "text": "The AppArmor security module is not supported by Red Hat, on the other hand the flaw also affects SELinux based distributions like Red Hat Enterprise Linux.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-docker-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-manpages-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-16884" }, { "category": "external", "summary": "RHBZ#1757214", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1757214" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16884", "url": "https://www.cve.org/CVERecord?id=CVE-2019-16884" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16884", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16884" } ], "release_date": "2019-09-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-17T12:56:53+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-docker-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-manpages-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4269" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N", "version": "3.0" }, "products": [ "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-docker-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-manpages-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "runc: AppArmor/SELinux bypass with malicious image that specifies a volume at /proc" }, { "cve": "CVE-2019-18466", "cwe": { "id": "CWE-59", "name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)" }, "discovery_date": "2019-08-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1744588" } ], "notes": [ { "category": "description", "text": "It was discovered that podman resolves a symlink in the host context during a copy operation from the container to the host. An attacker could create a container image containing particular symlinks that, when copied by a victim user to the host filesystem, may overwrite existing files with others from the host.", "title": "Vulnerability description" }, { "category": "summary", "text": "podman: resolving symlink in host filesystem leads to unexpected results of copy operation", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of podman as shipped with Red Hat Enterprise Linux 8 as they did not include support for the copy function.\n\nThis issue did not affect the versions of podman as shipped in OpenShift Container Platform 3.11 and 4.1 as they did not include support for the copy function.\n\nThe version of podman shipped in OpenShift Container Platform 4.2 was superseded by the version delivered Red Hat Enterprise Linux 8.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-docker-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-manpages-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-18466" }, { "category": "external", "summary": "RHBZ#1744588", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1744588" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-18466", "url": "https://www.cve.org/CVERecord?id=CVE-2019-18466" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-18466", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-18466" } ], "release_date": "2019-08-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-17T12:56:53+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-docker-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-manpages-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4269" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-docker-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-manpages-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "podman: resolving symlink in host filesystem leads to unexpected results of copy operation" } ] }
RHSA-2020:2067
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat build of Thorntail.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability. For more information, see the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "This release of Red Hat build of Thorntail 2.5.1 includes security updates, bug fixes, and enhancements. For more information, see the release notes page listed in the References section.\n\nSecurity Fix(es):\n\n* apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default (CVE-2019-10086)\n\n* cxf: does not restrict the number of message attachments (CVE-2019-12406)\n\n* cxf: OpenId Connect token service does not properly validate the clientId (CVE-2019-12419)\n\n* hibernate-validator: safeHTML validator allows XSS (CVE-2019-10219)\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511)\n\n* jackson-databind: Multiple serialization gadgets (CVE-2019-17531, CVE-2019-16943, CVE-2019-16942, CVE-2019-17267, CVE-2019-14540, CVE-2019-16335, CVE-2019-14893, CVE-2019-14892, CVE-2020-9546, CVE-2020-9547, CVE-2020-9548, CVE-2020-10969, CVE-2020-10968, CVE-2020-11111, CVE-2020-11112, CVE-2020-11113, CVE-2020-11619, CVE-2020-11620, CVE-2019-20330, CVE-2020-8840)\n\n* jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command \nexecution (CVE-2020-10672, CVE-2020-10673)\n\n* keycloak: adapter endpoints are exposed via arbitrary URLs (CVE-2019-14820)\n\n* keycloak: missing signatures validation on CRL used to verify client certificates (CVE-2019-3875)\n\n* keycloak: SAML broker does not check existence of signature on document allowing any user impersonation (CVE-2019-10201)\n\n* keycloak: CSRF check missing in My Resources functionality in the Account Console (CVE-2019-10199)\n\n* keycloak: cross-realm user access auth bypass (CVE-2019-14832)\n\n* netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling (CVE-2020-7238)\n\n* SmallRye: SecuritySupport class is incorrectly public and contains a static method to access the current threads context class loader (CVE-2020-1729)\n\n* thrift: Out-of-bounds read related to TJSONProtocol or TSimpleJSONProtocol (CVE-2019-0210)\n\n* thrift: Endless loop when feed with specific input data (CVE-2019-0205)\n\n* undertow: possible Denial Of Service (DOS) in Undertow HTTP server listening on HTTPS (CVE-2019-14888)\n\n* wildfly: The \u0027enabled-protocols\u0027 value in legacy security is not respected if OpenSSL security provider is in use (CVE-2019-14887)\n\n* wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default (CVE-2019-14838)\n\n* xml-security: Apache Santuario potentially loads XML parsing code from an untrusted source (CVE-2019-12400)\n\nFor more details about the security issues and their impact, the CVSS score, acknowledgements, and other related information, see the CVE pages listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:2067", "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=catRhoar.thorntail\u0026version=2.5.1", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=catRhoar.thorntail\u0026version=2.5.1" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_build_of_thorntail/2.5/html/release_notes_for_thorntail_2.5/", "url": "https://access.redhat.com/documentation/en-us/red_hat_build_of_thorntail/2.5/html/release_notes_for_thorntail_2.5/" }, { "category": "external", "summary": "1649870", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1649870" }, { "category": "external", "summary": "1690628", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1690628" }, { "category": "external", "summary": "1728609", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1728609" }, { "category": "external", "summary": "1729261", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1729261" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1738673", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1738673" }, { "category": "external", "summary": "1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "1749487", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1749487" }, { "category": "external", "summary": "1751227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751227" }, { "category": "external", "summary": "1755831", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755831" }, { "category": "external", "summary": "1755849", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755849" }, { "category": "external", "summary": "1758167", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758167" }, { "category": "external", "summary": "1758171", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758171" }, { "category": "external", "summary": "1758182", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758182" }, { "category": "external", "summary": "1758187", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758187" }, { "category": "external", "summary": "1758191", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758191" }, { "category": "external", "summary": "1764607", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764607" }, { "category": "external", "summary": "1764612", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764612" }, { "category": "external", "summary": "1764658", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764658" }, { "category": "external", "summary": "1767483", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767483" }, { "category": "external", "summary": "1772008", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772008" }, { "category": "external", "summary": "1772464", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772464" }, { "category": "external", "summary": "1775293", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775293" }, { "category": "external", "summary": "1793154", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793154" }, { "category": "external", "summary": "1796225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796225" }, { "category": "external", "summary": "1802444", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802444" }, { "category": "external", "summary": "1815470", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1815470" }, { "category": "external", "summary": "1815495", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1815495" }, { "category": "external", "summary": "1816170", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816170" }, { "category": "external", "summary": "1816175", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816175" }, { "category": "external", "summary": "1816330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816330" }, { "category": "external", "summary": "1816332", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816332" }, { "category": "external", "summary": "1816337", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816337" }, { "category": "external", "summary": "1816340", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816340" }, { "category": "external", "summary": "1819208", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819208" }, { "category": "external", "summary": "1819212", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819212" }, { "category": "external", "summary": "1821304", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821304" }, { "category": "external", "summary": "1821311", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821311" }, { "category": "external", "summary": "1821315", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821315" }, { "category": "external", "summary": "1826798", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1826798" }, { "category": "external", "summary": "1826805", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1826805" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_2067.json" } ], "title": "Red Hat Security Advisory: Red Hat build of Thorntail 2.5.1 security and bug fix update", "tracking": { "current_release_date": "2025-04-09T17:53:03+00:00", "generator": { "date": "2025-04-09T17:53:03+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.2" } }, "id": "RHSA-2020:2067", "initial_release_date": "2020-05-18T10:24:57+00:00", "revision_history": [ { "date": "2020-05-18T10:24:57+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-05-18T10:24:57+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-04-09T17:53:03+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Text-Only RHOAR", "product": { "name": "Text-Only RHOAR", "product_id": "Text-Only RHOAR", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift_application_runtimes:1.0" } } } ], "category": "product_family", "name": "Red Hat OpenShift Application Runtimes" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-0205", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-10-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1764612" } ], "notes": [ { "category": "description", "text": "In Apache Thrift all versions up to and including 0.12.0, a server or client may run into an endless loop when feed with specific input data. Because the issue had already been partially fixed in version 0.11.0, depending on the installed version it affects only certain language bindings.", "title": "Vulnerability description" }, { "category": "summary", "text": "thrift: Endless loop when feed with specific input data", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains a vulnerable version of libthrift. However, OpenDaylight does not expose libthrift in a vulnerable way, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe thrift package in OpenShift Container Platform is installed only in Curator images in the Logging stack. The affected code is included in this package, it\u0027s functionality is not used. This vulnerability is therefore rated Low for OpenShift Container Platform.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-0205" }, { "category": "external", "summary": "RHBZ#1764612", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764612" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0205", "url": "https://www.cve.org/CVERecord?id=CVE-2019-0205" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0205", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0205" } ], "release_date": "2019-10-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "thrift: Endless loop when feed with specific input data" }, { "cve": "CVE-2019-0210", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2019-10-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1764607" } ], "notes": [ { "category": "description", "text": "In Apache Thrift 0.9.3 to 0.12.0, a server implemented in Go using TJSONProtocol or TSimpleJSONProtocol may panic when feed with invalid input data.", "title": "Vulnerability description" }, { "category": "summary", "text": "thrift: Out-of-bounds read related to TJSONProtocol or TSimpleJSONProtocol", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains a vulnerable version of libthrift. However, OpenDaylight is not affected as this is a Golang specific problem, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe version of thrift delivered in OpenShift Container Platform is not affected by this vulnerability as it does not contain the affected code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-0210" }, { "category": "external", "summary": "RHBZ#1764607", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764607" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0210", "url": "https://www.cve.org/CVERecord?id=CVE-2019-0210" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0210", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0210" } ], "release_date": "2019-10-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "thrift: Out-of-bounds read related to TJSONProtocol or TSimpleJSONProtocol" }, { "acknowledgments": [ { "names": [ "Marek Posolda" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2019-3875", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "discovery_date": "2019-03-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1690628" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in keycloak before 6.0.2. The X.509 authenticator supports the verification of client certificates through the CRL, where the CRL list can be obtained from the URL provided in the certificate itself (CDP) or through the separately configured path. The CRL are often available over the network through unsecured protocols (\u0027http\u0027 or \u0027ldap\u0027) and hence the caller should verify the signature and possibly the certification path. Keycloak currently doesn\u0027t validate signatures on CRL, which can result in a possibility of various attacks like man-in-the-middle.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak: missing signatures validation on CRL used to verify client certificates", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-3875" }, { "category": "external", "summary": "RHBZ#1690628", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1690628" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-3875", "url": "https://www.cve.org/CVERecord?id=CVE-2019-3875" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3875", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3875" } ], "release_date": "2019-06-11T14:22:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "keycloak: missing signatures validation on CRL used to verify client certificates" }, { "cve": "CVE-2019-9511", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741860" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker can request a large amount of data by manipulating window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this queue can consume excess CPU, memory, or both, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: large amount of data requests leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "There are no mitigations available for nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "RHBZ#1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9511", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: large amount of data requests leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "cve": "CVE-2019-10086", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-10-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1767483" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Apache Commons BeanUtils, where the class property in PropertyUtilsBean is not suppressed by default. This flaw allows an attacker to access the classloader.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10086" }, { "category": "external", "summary": "RHBZ#1767483", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767483" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10086", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10086" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10086", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10086" }, { "category": "external", "summary": "https://commons.apache.org/proper/commons-beanutils/javadocs/v1.9.4/RELEASE-NOTES.txt", "url": "https://commons.apache.org/proper/commons-beanutils/javadocs/v1.9.4/RELEASE-NOTES.txt" } ], "release_date": "2019-08-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "There is no currently known mitigation for this flaw.", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default" }, { "cve": "CVE-2019-10199", "cwe": { "id": "CWE-352", "name": "Cross-Site Request Forgery (CSRF)" }, "discovery_date": "2019-07-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1729261" } ], "notes": [ { "category": "description", "text": "It was found that Keycloak\u0027s account console did not perform adequate header checks in some requests. An attacker could use this flaw to trick an authenticated user into performing operations via request from an untrusted domain.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak: CSRF check missing in My Resources functionality in the Account Console", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10199" }, { "category": "external", "summary": "RHBZ#1729261", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1729261" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10199", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10199" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10199", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10199" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "keycloak: CSRF check missing in My Resources functionality in the Account Console" }, { "cve": "CVE-2019-10201", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2019-07-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1728609" } ], "notes": [ { "category": "description", "text": "It was found that Keycloak\u0027s SAML broker did not verify missing message signatures. If an attacker modifies the SAML Response and removes the \u003cSignature\u003e sections, the message is still accepted, and the message can be modified. An attacker could use this flaw to impersonate other users and gain access to sensitive information.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak: SAML broker does not check existence of signature on document allowing any user impersonation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10201" }, { "category": "external", "summary": "RHBZ#1728609", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1728609" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10201", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10201" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10201", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10201" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "Administrator can prevent this issue for POST binding by requiring signed assertions.", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "keycloak: SAML broker does not check existence of signature on document allowing any user impersonation" }, { "acknowledgments": [ { "names": [ "Dominik Mizyn" ], "organization": "Samsung R\u0026D Institute Poland" } ], "cve": "CVE-2019-10219", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2019-05-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1738673" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Hibernate-Validator. The SafeHtml validator annotation fails to properly sanitize payloads consisting of potentially malicious code in HTML comments and instructions. This vulnerability can result in an XSS attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "hibernate-validator: safeHTML validator allows XSS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform\u0027s OpenDaylight will not be updated for this flaw because it is being deprecated and is only receiving security fixes for Important and Critical flaws.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10219" }, { "category": "external", "summary": "RHBZ#1738673", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1738673" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10219", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10219" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10219", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10219" } ], "release_date": "2019-08-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hibernate-validator: safeHTML validator allows XSS" }, { "cve": "CVE-2019-12400", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2019-08-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1764658" } ], "notes": [ { "category": "description", "text": "In version 2.0.3 Apache Santuario XML Security for Java, a caching mechanism was introduced to speed up creating new XML documents using a static pool of DocumentBuilders. However, if some untrusted code can register a malicious implementation with the thread context class loader first, then this implementation might be cached and re-used by Apache Santuario - XML Security for Java, leading to potential security flaws when validating signed documents, etc. The vulnerability affects Apache Santuario - XML Security for Java 2.0.x releases from 2.0.3 and all 2.1.x releases before 2.1.4.", "title": "Vulnerability description" }, { "category": "summary", "text": "xml-security: Apache Santuario potentially loads XML parsing code from an untrusted source", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-12400" }, { "category": "external", "summary": "RHBZ#1764658", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764658" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-12400", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12400" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-12400", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12400" } ], "release_date": "2019-08-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xml-security: Apache Santuario potentially loads XML parsing code from an untrusted source" }, { "cve": "CVE-2019-12406", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-03-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816170" } ], "notes": [ { "category": "description", "text": "Apache CXF before 3.3.4 and 3.2.11 does not restrict the number of message attachments present in a given message. This leaves open the possibility of a denial of service type attack, where a malicious user crafts a message containing a very large number of message attachments. From the 3.3.4 and 3.2.11 releases, a default limit of 50 message attachments is enforced. This is configurable via the message property \"attachment-max-count\".", "title": "Vulnerability description" }, { "category": "summary", "text": "cxf: does not restrict the number of message attachments", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-12406" }, { "category": "external", "summary": "RHBZ#1816170", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816170" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-12406", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12406" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-12406", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12406" } ], "release_date": "2019-11-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "cxf: does not restrict the number of message attachments" }, { "cve": "CVE-2019-12419", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2020-03-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816175" } ], "notes": [ { "category": "description", "text": "A flaw was found in cxf in versions prior to 3.2.11 and 3.3.4. The access token services do not properly validate that an authenticated principal is equal to that of the supplied clientId parameter allowing a malicious client to use an authorization code that has been issued to a different client as their own. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "cxf: OpenId Connect token service does not properly validate the clientId", "title": "Vulnerability summary" }, { "category": "other", "text": "In OpenShift Logging the openshift-logging/elasticsearch6-rhel8 container bundles the vulnerable version of apache-cxf, but the vulnerable class is not shipped, hence this component is not affected by this vulnerability.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-12419" }, { "category": "external", "summary": "RHBZ#1816175", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816175" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-12419", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12419" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-12419", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12419" } ], "release_date": "2019-11-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "cxf: OpenId Connect token service does not properly validate the clientId" }, { "cve": "CVE-2019-14540", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1755849" } ], "notes": [ { "category": "description", "text": "A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to com.zaxxer.hikari.HikariConfig.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nSatellite 6 does not enable polymorphic unmarshmalling, which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14540" }, { "category": "external", "summary": "RHBZ#1755849", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755849" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14540", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14540" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14540", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14540" } ], "release_date": "2019-09-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "This vulnerability relies on com.zaxxer.hikari.HikariConfig being present in the application\u0027s ClassPath. Hikari is not packaged as an RPM for Red Hat Enterprise Linux or Red Hat Software Collections. Applications using jackson-databind that do not also use com.zaxxer.hikari are not impacted by this vulnerability.\n\nA mitigation to this class of problem in jackson-databind is to not trigger polymorphic desrialization globally by using: objectMapper.enableDefaultTyping() and rather use @JsonTypeInfo on the class property to explicitly define the type information. For more information on this issue please refer to https://www.github.com/mbechler/marshalsec/blob/master/marshalsec.pdf?raw=true", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig" }, { "cve": "CVE-2019-14820", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-11-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1649870" } ], "notes": [ { "category": "description", "text": "It was found that keycloak exposes internal adapter endpoints in org.keycloak.constants.AdapterConstants, which can be invoked via a specially-crafted URL. This vulnerability could allow an attacker to access unauthorized information.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak: adapter endpoints are exposed via arbitrary URLs", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14820" }, { "category": "external", "summary": "RHBZ#1649870", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1649870" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14820", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14820" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14820", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14820" } ], "release_date": "2019-10-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "keycloak: adapter endpoints are exposed via arbitrary URLs" }, { "cve": "CVE-2019-14832", "cwe": { "id": "CWE-863", "name": "Incorrect Authorization" }, "discovery_date": "2019-07-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1749487" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Keycloak REST API where it would permit user access from a realm the user was not configured. An authenticated attacker with knowledge of a user id could use this flaw to access unauthorized information or to carry out further attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak: cross-realm user access auth bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14832" }, { "category": "external", "summary": "RHBZ#1749487", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1749487" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14832", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14832" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14832", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14832" } ], "release_date": "2019-10-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "keycloak: cross-realm user access auth bypass" }, { "acknowledgments": [ { "names": [ "F\u00e1bio Magalh\u00e3es de Andrade" ], "organization": "Sonda Ativas" }, { "names": [ "Juliano de Castro Santos", "Leonard Lunardi" ], "organization": "UnimedBH" } ], "cve": "CVE-2019-14838", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2019-08-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1751227" } ], "notes": [ { "category": "description", "text": "It was found that Wildfly users had default user permissions set incorrectly. A malicious user could use this flaw to access unauthorized controls for the application server.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14838" }, { "category": "external", "summary": "RHBZ#1751227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751227" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14838", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14838" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14838", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14838" }, { "category": "external", "summary": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14838", "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14838" } ], "release_date": "2019-10-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default" }, { "cve": "CVE-2019-14887", "cwe": { "id": "CWE-757", "name": "Selection of Less-Secure Algorithm During Negotiation (\u0027Algorithm Downgrade\u0027)" }, "discovery_date": "2019-11-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1772008" } ], "notes": [ { "category": "description", "text": "A flaw was found when an OpenSSL security provider is used with Wildfly, the \u0027enabled-protocols\u0027 value in the Wildfly configuration isn\u0027t honored. An attacker could target the traffic sent from Wildfly and downgrade the connection to a weaker version of TLS, potentially breaking the encryption. This could lead to a leak of the data being passed over the network.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly: The \u0027enabled-protocols\u0027 value in legacy security is not respected if OpenSSL security provider is in use", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14887" }, { "category": "external", "summary": "RHBZ#1772008", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772008" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14887", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14887" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14887", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14887" } ], "release_date": "2020-03-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "Avoid using an OpenSSL security provider and instead use the default configuration or regular JSSE provider with \u0027TLS\u0027.", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wildfly: The \u0027enabled-protocols\u0027 value in legacy security is not respected if OpenSSL security provider is in use" }, { "acknowledgments": [ { "names": [ "Henning Baldersheim", "H\u00e5vard Pettersen" ], "organization": "Verizon Media" } ], "cve": "CVE-2019-14888", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-10-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1772464" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the Undertow HTTP server listening on HTTPS. An attacker can target the HTTPS port to carry out a Denial Of Service (DOS) to make the service unavailable on SSL.", "title": "Vulnerability description" }, { "category": "summary", "text": "undertow: possible Denial Of Service (DOS) in Undertow HTTP server listening on HTTPS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14888" }, { "category": "external", "summary": "RHBZ#1772464", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772464" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14888", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14888" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14888", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14888" } ], "release_date": "2020-01-20T12:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "Enable HTTP2 (enable-http2=\"true\") in the undertow\u0027s HTTPS settings.", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "undertow: possible Denial Of Service (DOS) in Undertow HTTP server listening on HTTPS" }, { "cve": "CVE-2019-14892", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-09-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1758171" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in jackson-databind in versions before 2.9.10, 2.8.11.5 and 2.6.7.3, where it would permit polymorphic deserialization of a malicious object using commons-configuration 1 and 2 JNDI classes. An attacker could use this flaw to execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in classes of the commons-configuration package", "title": "Vulnerability summary" }, { "category": "other", "text": "Satellite 6 does not enable polymorphic unmarshmalling, which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14892" }, { "category": "external", "summary": "RHBZ#1758171", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758171" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14892", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14892" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14892", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14892" } ], "release_date": "2019-09-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in classes of the commons-configuration package" }, { "cve": "CVE-2019-14893", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-09-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1758182" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in FasterXML jackson-databind in all versions before 2.9.10 and 2.10.0, where it would permit polymorphic deserialization of malicious objects using the xalan JNDI gadget when used in conjunction with polymorphic type handling methods such as `enableDefaultTyping()` or when @JsonTypeInfo is using `Id.CLASS` or `Id.MINIMAL_CLASS` or in any other way which ObjectMapper.readValue might instantiate objects from unsafe sources. An attacker could use this flaw to execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in classes of the xalan package", "title": "Vulnerability summary" }, { "category": "other", "text": "Satellite 6 does not enable polymorphic unmarshmalling, which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14893" }, { "category": "external", "summary": "RHBZ#1758182", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758182" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14893", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14893" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14893", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14893" } ], "release_date": "2019-09-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in classes of the xalan package" }, { "cve": "CVE-2019-16335", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1755831" } ], "notes": [ { "category": "description", "text": "A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to com.zaxxer.hikari.HikariDataSource. This is a different vulnerability than CVE-2019-14540.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nSatellite 6 does not enable polymorphic unmarshmalling, which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-16335" }, { "category": "external", "summary": "RHBZ#1755831", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755831" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16335", "url": "https://www.cve.org/CVERecord?id=CVE-2019-16335" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16335", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16335" } ], "release_date": "2019-09-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "This vulnerability relies on com.zaxxer.hikari.HikariDataSource being present in the application\u0027s ClassPath. Hikari is not packaged as an RPM for Red Hat Enterprise Linux or Red Hat Software Collections. Applications using jackson-databind that do not also use com.zaxxer.hikari are not impacted by this vulnerability.\n\nA mitigation to this class of problem in jackson-databind is to not trigger polymorphic desrialization globally by using: objectMapper.enableDefaultTyping() and rather use @JsonTypeInfo on the class property to explicitly define the type information. For more information on this issue please refer to https://www.github.com/mbechler/marshalsec/blob/master/marshalsec.pdf?raw=true", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource" }, { "cve": "CVE-2019-16942", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-09-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1758187" } ], "notes": [ { "category": "description", "text": "A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the commons-dbcp (1.4) jar in the classpath, and an attacker can find an RMI service endpoint to access, it is possible to make the service execute a malicious payload. This issue exists because of org.apache.commons.dbcp.datasources.SharedPoolDataSource and org.apache.commons.dbcp.datasources.PerUserPoolDataSource mishandling.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.*", "title": "Vulnerability summary" }, { "category": "other", "text": "Satellite 6 does not enable polymorphic unmarshmalling, which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-16942" }, { "category": "external", "summary": "RHBZ#1758187", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758187" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16942", "url": "https://www.cve.org/CVERecord?id=CVE-2019-16942" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16942", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16942" } ], "release_date": "2019-09-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.*" }, { "cve": "CVE-2019-16943", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-09-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1758191" } ], "notes": [ { "category": "description", "text": "A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the p6spy (3.8.6) jar in the classpath, and an attacker can find an RMI service endpoint to access, it is possible to make the service execute a malicious payload. This issue exists because of com.p6spy.engine.spy.P6DataSource mishandling.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource", "title": "Vulnerability summary" }, { "category": "other", "text": "Satellite 6 does not enable polymorphic unmarshmalling, which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-16943" }, { "category": "external", "summary": "RHBZ#1758191", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758191" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16943", "url": "https://www.cve.org/CVERecord?id=CVE-2019-16943" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16943", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16943" } ], "release_date": "2019-09-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource" }, { "cve": "CVE-2019-17267", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-09-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1758167" } ], "notes": [ { "category": "description", "text": "A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to net.sf.ehcache.hibernate.EhcacheJtaTransactionManagerLookup.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in classes of the ehcache package", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nRed Hat OpenShift Container Platform does ship the vulnerable component, but does not enable the unsafe conditions needed to exploit, lowering their vulnerability impact.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-17267" }, { "category": "external", "summary": "RHBZ#1758167", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758167" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-17267", "url": "https://www.cve.org/CVERecord?id=CVE-2019-17267" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-17267", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17267" } ], "release_date": "2019-09-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in classes of the ehcache package" }, { "cve": "CVE-2019-17531", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2019-11-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1775293" } ], "notes": [ { "category": "description", "text": "A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the apache-log4j-extra (version 1.2.x) jar in the classpath, and an attacker can provide a JNDI service to access, it is possible to make the service execute a malicious payload.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.*", "title": "Vulnerability summary" }, { "category": "other", "text": "Satellite 6 does not enable polymorphic unmarshmalling, which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenShift Container Platform does ship the vulnerable component, but does not enable the unsafe conditions needed to exploit, lowering their vulnerability impact.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-17531" }, { "category": "external", "summary": "RHBZ#1775293", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775293" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-17531", "url": "https://www.cve.org/CVERecord?id=CVE-2019-17531" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-17531", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17531" } ], "release_date": "2019-10-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.*" }, { "cve": "CVE-2019-20330", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-01-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1793154" } ], "notes": [ { "category": "description", "text": "FasterXML jackson-databind 2.x before 2.9.10.2 lacks certain net.sf.ehcache blocking.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: lacks certain net.sf.ehcache blocking", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20330" }, { "category": "external", "summary": "RHBZ#1793154", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793154" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20330", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20330" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20330", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20330" } ], "release_date": "2020-01-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: lacks certain net.sf.ehcache blocking" }, { "acknowledgments": [ { "names": [ "Darran Lofthouse" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2020-1729", "cwe": { "id": "CWE-863", "name": "Incorrect Authorization" }, "discovery_date": "2019-09-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1802444" } ], "notes": [ { "category": "description", "text": "A flaw was found in SmallRye\u0027s API through version 1.6.1. The API can allow other code running within the application server to potentially obtain the ClassLoader, bypassing any permissions checks that should have been applied. The largest threat from this vulnerability is a threat to data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "SmallRye: SecuritySupport class is incorrectly public and contains a static method to access the current threads context class loader", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-1729" }, { "category": "external", "summary": "RHBZ#1802444", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802444" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-1729", "url": "https://www.cve.org/CVERecord?id=CVE-2020-1729" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1729", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1729" } ], "release_date": "2020-02-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "SmallRye: SecuritySupport class is incorrectly public and contains a static method to access the current threads context class loader" }, { "cve": "CVE-2020-7238", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1796225" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty, where it mishandles Transfer-Encoding whitespace. This flaw allows HTTP Request Smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that the previous vulnerability, CVE-2019-16869, does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit both these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships vulnerable netty version embedded in Candlepin, however, is not directly vulnerable since HTTP requests are handled by Tomcat and not netty.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-7238" }, { "category": "external", "summary": "RHBZ#1796225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796225" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-7238", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7238" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7238", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7238" }, { "category": "external", "summary": "https://netty.io/news/2019/12/18/4-1-44-Final.html", "url": "https://netty.io/news/2019/12/18/4-1-44-Final.html" } ], "release_date": "2020-01-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling" }, { "cve": "CVE-2020-8840", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816330" } ], "notes": [ { "category": "description", "text": "A flaw was found in FasterXML jackson-databind in versions 2.0.0 through 2.9.10.2. A \"gadget\" exploit is possible due to a lack of a Java object being blocking from being deserialized. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Lacks certain xbean-reflect/JNDI blocking", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8840" }, { "category": "external", "summary": "RHBZ#1816330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816330" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8840", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8840" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8840", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8840" } ], "release_date": "2020-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: Lacks certain xbean-reflect/JNDI blocking" }, { "cve": "CVE-2020-9546", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816332" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in shaded-hikari-config", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9546" }, { "category": "external", "summary": "RHBZ#1816332", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816332" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9546", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9546" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9546", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9546" } ], "release_date": "2020-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: Serialization gadgets in shaded-hikari-config" }, { "cve": "CVE-2020-9547", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816337" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in ibatis-sqlmap", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9547" }, { "category": "external", "summary": "RHBZ#1816337", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816337" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9547", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9547" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9547", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9547" } ], "release_date": "2020-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: Serialization gadgets in ibatis-sqlmap" }, { "cve": "CVE-2020-9548", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816340" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in anteros-core", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9548" }, { "category": "external", "summary": "RHBZ#1816340", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816340" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9548", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9548" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9548", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9548" } ], "release_date": "2020-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: Serialization gadgets in anteros-core" }, { "cve": "CVE-2020-10672", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2020-03-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1815495" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10672" }, { "category": "external", "summary": "RHBZ#1815495", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1815495" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10672", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10672" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10672", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10672" } ], "release_date": "2020-03-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution" }, { "cve": "CVE-2020-10673", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2020-03-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1815470" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time. Additionally, the gadget is not available within Red Hat Openstack Platform\u0027s OpenDaylight.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10673" }, { "category": "external", "summary": "RHBZ#1815470", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1815470" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10673", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10673" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10673", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10673" } ], "release_date": "2020-03-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution" }, { "cve": "CVE-2020-10968", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1819208" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x prior to version 2.9.10.4. The interaction between serialization gadgets and typing is mishandled in the bus-proxy. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10968" }, { "category": "external", "summary": "RHBZ#1819208", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819208" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10968", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10968" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10968", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10968" } ], "release_date": "2020-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider" }, { "cve": "CVE-2020-10969", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1819212" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in javax.swing.JEditorPane", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10969" }, { "category": "external", "summary": "RHBZ#1819212", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819212" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10969", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10969" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10969", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10969" } ], "release_date": "2020-03-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: Serialization gadgets in javax.swing.JEditorPane" }, { "cve": "CVE-2020-11111", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2020-03-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1821304" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.apache.activemq.jms.pool.XaPooledConnectionFactory", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11111" }, { "category": "external", "summary": "RHBZ#1821304", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821304" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11111", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11111" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11111", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11111" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/2664", "url": "https://github.com/FasterXML/jackson-databind/issues/2664" } ], "release_date": "2020-03-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: Serialization gadgets in org.apache.activemq.jms.pool.XaPooledConnectionFactory" }, { "cve": "CVE-2020-11112", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2020-03-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1821311" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.apache.commons.proxy.provider.remoting.RmiProvider", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11112" }, { "category": "external", "summary": "RHBZ#1821311", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821311" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11112", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11112" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11112", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11112" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/2666", "url": "https://github.com/FasterXML/jackson-databind/issues/2666" } ], "release_date": "2020-03-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: Serialization gadgets in org.apache.commons.proxy.provider.remoting.RmiProvider" }, { "cve": "CVE-2020-11113", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2020-03-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1821315" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11113" }, { "category": "external", "summary": "RHBZ#1821315", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821315" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11113", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11113" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11113", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11113" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/2670", "url": "https://github.com/FasterXML/jackson-databind/issues/2670" } ], "release_date": "2020-03-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime" }, { "cve": "CVE-2020-11619", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-04-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1826805" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.springframework:spring-aop", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11619" }, { "category": "external", "summary": "RHBZ#1826805", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1826805" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11619", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11619" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11619", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11619" } ], "release_date": "2020-04-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: Serialization gadgets in org.springframework:spring-aop" }, { "cve": "CVE-2020-11620", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-04-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1826798" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in commons-jelly:commons-jelly", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11620" }, { "category": "external", "summary": "RHBZ#1826798", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1826798" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11620", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11620" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11620", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11620" } ], "release_date": "2020-04-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: Serialization gadgets in commons-jelly:commons-jelly" } ] }
RHSA-2020:0727
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for Red Hat Data Grid is now available.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Data Grid is a distributed, in-memory, NoSQL datastore based on the Infinispan project.\n\nThis release of Red Hat Data Grid 7.3.3 serves as a replacement for Red Hat Data Grid 7.3.2 and includes bug fixes and enhancements, which are described in the Release Notes, linked to in the References section of this erratum.\n\nSecurity Fix(es):\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)\n\n* xstream: remote code execution due to insecure XML deserialization (regression of CVE-2013-7285) (CVE-2019-10173)\n\n* infinispan: invokeAccessibly method from ReflectionUtil class allows to invoke private methods (CVE-2019-10174)\n\n* jackson-databind: default typing mishandling leading to remote code execution (CVE-2019-14379)\n\n* h2: Information Exposure due to insecure handling of permissions in the backup (CVE-2018-14335)\n\n* wildfly: Race condition on PID file allows for termination of arbitrary processes by local users (CVE-2019-3805)\n\n* undertow: leak credentials to log files UndertowLogger.REQUEST_LOGGER.undertowRequestFailed (CVE-2019-3888)\n\n* undertow: DEBUG log for io.undertow.request.security if enabled leaks credentials to log files (CVE-2019-10212)\n\n* undertow: Information leak in requests for directories without trailing slashes (CVE-2019-10184)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:0727", "url": "https://access.redhat.com/errata/RHSA-2020:0727" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=data.grid\u0026downloadType=patches\u0026version=7.3", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=data.grid\u0026downloadType=patches\u0026version=7.3" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_data_grid/7.3/html-single/red_hat_data_grid_7.3_release_notes/index", "url": "https://access.redhat.com/documentation/en-us/red_hat_data_grid/7.3/html-single/red_hat_data_grid_7.3_release_notes/index" }, { "category": "external", "summary": "1610877", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1610877" }, { "category": "external", "summary": "1660263", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1660263" }, { "category": "external", "summary": "1693777", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1693777" }, { "category": "external", "summary": "1703469", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1703469" }, { "category": "external", "summary": "1713068", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1713068" }, { "category": "external", "summary": "1722971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1722971" }, { "category": "external", "summary": "1731984", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1731984" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "1737517", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1737517" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_0727.json" } ], "title": "Red Hat Security Advisory: Red Hat Data Grid 7.3.3 security update", "tracking": { "current_release_date": "2025-04-09T17:27:23+00:00", "generator": { "date": "2025-04-09T17:27:23+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.2" } }, "id": "RHSA-2020:0727", "initial_release_date": "2020-03-05T12:53:27+00:00", "revision_history": [ { "date": "2020-03-05T12:53:27+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-03-05T12:53:27+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-04-09T17:27:23+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Data Grid 7.3.3", "product": { "name": "Red Hat Data Grid 7.3.3", "product_id": "Red Hat Data Grid 7.3.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_data_grid:7.3" } } } ], "category": "product_family", "name": "Red Hat JBoss Data Grid" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-14335", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1610877" } ], "notes": [ { "category": "description", "text": "An issue was discovered in H2 1.4.197. Insecure handling of permissions in the backup function allows attackers to read sensitive files (outside of their permissions) via a symlink to a fake database file.", "title": "Vulnerability description" }, { "category": "summary", "text": "h2: Information Exposure due to insecure handling of permissions in the backup", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Data Grid 7.3.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-14335" }, { "category": "external", "summary": "RHBZ#1610877", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1610877" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-14335", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14335" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14335", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14335" } ], "release_date": "2018-07-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-05T12:53:27+00:00", "details": "To install this update, do the following:\n\n1. Download the Data Grid 7.3.3 server patch from the customer portal.\n2. Back up your existing Data Grid installation. You should back up databases, configuration files, and so on.\n3. Install the Data Grid 7.3.3 server patch. Refer to the 7.3 Release Notes for patching instructions.\n4. Restart Data Grid to ensure the changes take effect.", "product_ids": [ "Red Hat Data Grid 7.3.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0727" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat Data Grid 7.3.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "h2: Information Exposure due to insecure handling of permissions in the backup" }, { "acknowledgments": [ { "names": [ "Daniel Le Gall" ], "organization": "SCRT Information Security" } ], "cve": "CVE-2019-3805", "cwe": { "id": "CWE-364", "name": "Signal Handler Race Condition" }, "discovery_date": "2018-11-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1660263" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in wildfly that would allow local users, who are able to execute init.d script, to terminate arbitrary processes on the system. An attacker could exploit this by modifying the PID file in /var/run/jboss-eap/ allowing the init.d script to terminate any process as root.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly: Race condition on PID file allows for termination of arbitrary processes by local users", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Data Grid 7.3.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-3805" }, { "category": "external", "summary": "RHBZ#1660263", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1660263" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-3805", "url": "https://www.cve.org/CVERecord?id=CVE-2019-3805" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3805", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3805" } ], "release_date": "2019-04-30T17:12:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-05T12:53:27+00:00", "details": "To install this update, do the following:\n\n1. Download the Data Grid 7.3.3 server patch from the customer portal.\n2. Back up your existing Data Grid installation. You should back up databases, configuration files, and so on.\n3. Install the Data Grid 7.3.3 server patch. Refer to the 7.3 Release Notes for patching instructions.\n4. Restart Data Grid to ensure the changes take effect.", "product_ids": [ "Red Hat Data Grid 7.3.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0727" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Data Grid 7.3.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wildfly: Race condition on PID file allows for termination of arbitrary processes by local users" }, { "acknowledgments": [ { "names": [ "Carter Kozak" ] } ], "cve": "CVE-2019-3888", "cwe": { "id": "CWE-532", "name": "Insertion of Sensitive Information into Log File" }, "discovery_date": "2019-03-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1693777" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Undertow web server before 2.0.21. An information exposure of plain text credentials through log files because Connectors.executeRootHandler:402 logs the HttpServerExchange object at ERROR level using UndertowLogger.REQUEST_LOGGER.undertowRequestFailed(t, exchange)", "title": "Vulnerability description" }, { "category": "summary", "text": "undertow: leak credentials to log files UndertowLogger.REQUEST_LOGGER.undertowRequestFailed", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Data Grid 7.3.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-3888" }, { "category": "external", "summary": "RHBZ#1693777", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1693777" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-3888", "url": "https://www.cve.org/CVERecord?id=CVE-2019-3888" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3888", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3888" } ], "release_date": "2019-06-10T15:13:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-05T12:53:27+00:00", "details": "To install this update, do the following:\n\n1. Download the Data Grid 7.3.3 server patch from the customer portal.\n2. Back up your existing Data Grid installation. You should back up databases, configuration files, and so on.\n3. Install the Data Grid 7.3.3 server patch. Refer to the 7.3 Release Notes for patching instructions.\n4. Restart Data Grid to ensure the changes take effect.", "product_ids": [ "Red Hat Data Grid 7.3.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0727" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat Data Grid 7.3.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "undertow: leak credentials to log files UndertowLogger.REQUEST_LOGGER.undertowRequestFailed" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Data Grid 7.3.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-05T12:53:27+00:00", "details": "To install this update, do the following:\n\n1. Download the Data Grid 7.3.3 server patch from the customer portal.\n2. Back up your existing Data Grid installation. You should back up databases, configuration files, and so on.\n3. Install the Data Grid 7.3.3 server patch. Refer to the 7.3 Release Notes for patching instructions.\n4. Restart Data Grid to ensure the changes take effect.", "product_ids": [ "Red Hat Data Grid 7.3.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0727" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Data Grid 7.3.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Data Grid 7.3.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-05T12:53:27+00:00", "details": "To install this update, do the following:\n\n1. Download the Data Grid 7.3.3 server patch from the customer portal.\n2. Back up your existing Data Grid installation. You should back up databases, configuration files, and so on.\n3. Install the Data Grid 7.3.3 server patch. Refer to the 7.3 Release Notes for patching instructions.\n4. Restart Data Grid to ensure the changes take effect.", "product_ids": [ "Red Hat Data Grid 7.3.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0727" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Data Grid 7.3.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Data Grid 7.3.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-05T12:53:27+00:00", "details": "To install this update, do the following:\n\n1. Download the Data Grid 7.3.3 server patch from the customer portal.\n2. Back up your existing Data Grid installation. You should back up databases, configuration files, and so on.\n3. Install the Data Grid 7.3.3 server patch. Refer to the 7.3 Release Notes for patching instructions.\n4. Restart Data Grid to ensure the changes take effect.", "product_ids": [ "Red Hat Data Grid 7.3.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0727" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Data Grid 7.3.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9518", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735749" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using frames with an empty payload, a flood could occur that results in excessive CPU usage and starvation of other clients. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using empty frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Data Grid 7.3.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9518" }, { "category": "external", "summary": "RHBZ#1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9518", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-05T12:53:27+00:00", "details": "To install this update, do the following:\n\n1. Download the Data Grid 7.3.3 server patch from the customer portal.\n2. Back up your existing Data Grid installation. You should back up databases, configuration files, and so on.\n3. Install the Data Grid 7.3.3 server patch. Refer to the 7.3 Release Notes for patching instructions.\n4. Restart Data Grid to ensure the changes take effect.", "product_ids": [ "Red Hat Data Grid 7.3.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0727" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Data Grid 7.3.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using empty frames results in excessive resource consumption" }, { "cve": "CVE-2019-10173", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "discovery_date": "2019-06-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1722971" } ], "notes": [ { "category": "description", "text": "It was found that xstream API version 1.4.10 introduced a regression for a previous deserialization flaw. If the security framework has not been initialized, it may allow a remote attacker to run arbitrary shell commands when unmarshalling XML or any supported format. This a regression of CVE-2013-7285 fixed in 1.4.7 (fixed) as of BPMS 6.0.1, the regression was introduced with xstream-1.4.10 implemented in RHPAM.", "title": "Vulnerability description" }, { "category": "summary", "text": "xstream: remote code execution due to insecure XML deserialization (regression of CVE-2013-7285)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Data Grid 7.3.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10173" }, { "category": "external", "summary": "RHBZ#1722971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1722971" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10173", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10173" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10173", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10173" }, { "category": "external", "summary": "http://x-stream.github.io/changes.html#1.4.11", "url": "http://x-stream.github.io/changes.html#1.4.11" } ], "release_date": "2018-10-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-05T12:53:27+00:00", "details": "To install this update, do the following:\n\n1. Download the Data Grid 7.3.3 server patch from the customer portal.\n2. Back up your existing Data Grid installation. You should back up databases, configuration files, and so on.\n3. Install the Data Grid 7.3.3 server patch. Refer to the 7.3 Release Notes for patching instructions.\n4. Restart Data Grid to ensure the changes take effect.", "product_ids": [ "Red Hat Data Grid 7.3.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0727" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat Data Grid 7.3.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xstream: remote code execution due to insecure XML deserialization (regression of CVE-2013-7285)" }, { "cve": "CVE-2019-10174", "cwe": { "id": "CWE-470", "name": "Use of Externally-Controlled Input to Select Classes or Code (\u0027Unsafe Reflection\u0027)" }, "discovery_date": "2018-10-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1703469" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Infinispan such that the invokeAccessibly method from the public class ReflectionUtil allows any application class to invoke private methods in any class with Infinispan\u0027s privileges. The attacker can use reflection to introduce new, malicious behavior into the application.", "title": "Vulnerability description" }, { "category": "summary", "text": "infinispan: invokeAccessibly method from ReflectionUtil class allows to invoke private methods", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform\u0027s OpenDaylight contains the vulnerable library. This library is a requirement of other dependencies (Karaf and Hibernate). Under supported deployments, the vulnerable functionality is not utilized. Based on this, no OpenDaylight versions will not be fixed.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Data Grid 7.3.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10174" }, { "category": "external", "summary": "RHBZ#1703469", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1703469" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10174", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10174" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10174", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10174" } ], "release_date": "2019-11-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-05T12:53:27+00:00", "details": "To install this update, do the following:\n\n1. Download the Data Grid 7.3.3 server patch from the customer portal.\n2. Back up your existing Data Grid installation. You should back up databases, configuration files, and so on.\n3. Install the Data Grid 7.3.3 server patch. Refer to the 7.3 Release Notes for patching instructions.\n4. Restart Data Grid to ensure the changes take effect.", "product_ids": [ "Red Hat Data Grid 7.3.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0727" }, { "category": "workaround", "details": "There is no known mitigation for this issue.", "product_ids": [ "Red Hat Data Grid 7.3.3" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat Data Grid 7.3.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "infinispan: invokeAccessibly method from ReflectionUtil class allows to invoke private methods" }, { "acknowledgments": [ { "names": [ "Christian Schl\u00fcter" ], "organization": "Viada" } ], "cve": "CVE-2019-10184", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "discovery_date": "2019-03-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1713068" } ], "notes": [ { "category": "description", "text": "undertow before version 2.0.23.Final is vulnerable to an information leak issue. Web apps may have their directory structures predicted through requests without trailing slashes via the api.", "title": "Vulnerability description" }, { "category": "summary", "text": "undertow: Information leak in requests for directories without trailing slashes", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Data Grid 7.3.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10184" }, { "category": "external", "summary": "RHBZ#1713068", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1713068" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10184", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10184" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10184", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10184" } ], "release_date": "2019-07-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-05T12:53:27+00:00", "details": "To install this update, do the following:\n\n1. Download the Data Grid 7.3.3 server patch from the customer portal.\n2. Back up your existing Data Grid installation. You should back up databases, configuration files, and so on.\n3. Install the Data Grid 7.3.3 server patch. Refer to the 7.3 Release Notes for patching instructions.\n4. Restart Data Grid to ensure the changes take effect.", "product_ids": [ "Red Hat Data Grid 7.3.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0727" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat Data Grid 7.3.3" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "undertow: Information leak in requests for directories without trailing slashes" }, { "cve": "CVE-2019-10212", "cwe": { "id": "CWE-532", "name": "Insertion of Sensitive Information into Log File" }, "discovery_date": "2019-07-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1731984" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Undertow DEBUG log for io.undertow.request.security. If enabled, an attacker could abuse this flaw to obtain the user\u2019s credentials from the log files.", "title": "Vulnerability description" }, { "category": "summary", "text": "undertow: DEBUG log for io.undertow.request.security if enabled leaks credentials to log files", "title": "Vulnerability summary" }, { "category": "other", "text": "All the Red Hat products using the undertow-core jar version 2.0.20 or before are affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Data Grid 7.3.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10212" }, { "category": "external", "summary": "RHBZ#1731984", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1731984" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10212", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10212" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10212", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10212" } ], "release_date": "2019-09-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-05T12:53:27+00:00", "details": "To install this update, do the following:\n\n1. Download the Data Grid 7.3.3 server patch from the customer portal.\n2. Back up your existing Data Grid installation. You should back up databases, configuration files, and so on.\n3. Install the Data Grid 7.3.3 server patch. Refer to the 7.3 Release Notes for patching instructions.\n4. Restart Data Grid to ensure the changes take effect.", "product_ids": [ "Red Hat Data Grid 7.3.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0727" }, { "category": "workaround", "details": "Use Elytron instead of legacy Security subsystem.", "product_ids": [ "Red Hat Data Grid 7.3.3" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat Data Grid 7.3.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "undertow: DEBUG log for io.undertow.request.security if enabled leaks credentials to log files" }, { "cve": "CVE-2019-14379", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-07-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1737517" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in FasterXML jackson-databind, where it would permit polymorphic deserialization of malicious objects using the ehcache and logback JNDI gadgets when used in conjunction with polymorphic type handling methods such as `enableDefaultTyping()` or when @JsonTypeInfo is using `Id.CLASS` or `Id.MINIMAL_CLASS` or in any other way which ObjectMapper.readValue might instantiate objects from unsafe sources. An attacker could use this flaw to execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: default typing mishandling leading to remote code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nSimilarly, Satellite 6 does not enable polymorphic unmarshmalling, which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Data Grid 7.3.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14379" }, { "category": "external", "summary": "RHBZ#1737517", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1737517" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14379", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14379" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14379", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14379" } ], "release_date": "2019-07-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-05T12:53:27+00:00", "details": "To install this update, do the following:\n\n1. Download the Data Grid 7.3.3 server patch from the customer portal.\n2. Back up your existing Data Grid installation. You should back up databases, configuration files, and so on.\n3. Install the Data Grid 7.3.3 server patch. Refer to the 7.3 Release Notes for patching instructions.\n4. Restart Data Grid to ensure the changes take effect.", "product_ids": [ "Red Hat Data Grid 7.3.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0727" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Data Grid 7.3.3" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat Data Grid 7.3.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: default typing mishandling leading to remote code execution" } ] }
rhsa-2019:4040
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "New Red Hat Single Sign-On 7.3.5 packages are now available for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Single Sign-On 7.3 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications.\n\nThis release of Red Hat Single Sign-On 7.3.5 on RHEL 6 serves as a replacement for Red Hat Single Sign-On 7.3.4, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* keycloak: Service accounts reset password flow not using placeholder.org domain anymore (CVE-2019-14837)\n\n* undertow: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* undertow: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* undertow: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default (CVE-2019-14838)\n\n* wildfly: wildfly-security-manager: security manager authorization bypass (CVE-2019-14843)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:4040", "url": "https://access.redhat.com/errata/RHSA-2019:4040" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.3/", "url": "https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.3/" }, { "category": "external", "summary": "1730227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1730227" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1751227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751227" }, { "category": "external", "summary": "1752980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752980" }, { "category": "external", "summary": "KEYCLOAK-11815", "url": "https://issues.redhat.com/browse/KEYCLOAK-11815" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_4040.json" } ], "title": "Red Hat Security Advisory: Red Hat Single Sign-On 7.3.5 security update on RHEL 6", "tracking": { "current_release_date": "2025-03-15T19:44:39+00:00", "generator": { "date": "2025-03-15T19:44:39+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.1" } }, "id": "RHSA-2019:4040", "initial_release_date": "2019-12-02T17:04:39+00:00", "revision_history": [ { "date": "2019-12-02T17:04:39+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-12-02T17:04:39+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-03-15T19:44:39+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Single Sign-On 7.3 for RHEL 6 Server", "product": { "name": "Red Hat Single Sign-On 7.3 for RHEL 6 Server", "product_id": "6Server-RHSSO-7.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:red_hat_single_sign_on:7::el6" } } } ], "category": "product_family", "name": "Red Hat Single Sign-On" }, { "branches": [ { "category": "product_version", "name": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "product": { "name": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "product_id": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6sso?arch=noarch" } } }, { "category": "product_version", "name": "rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "product": { "name": "rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "product_id": "rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6sso?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "product": { "name": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "product_id": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6sso?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch as a component of Red Hat Single Sign-On 7.3 for RHEL 6 Server", "product_id": "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" }, "product_reference": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "relates_to_product_reference": "6Server-RHSSO-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src as a component of Red Hat Single Sign-On 7.3 for RHEL 6 Server", "product_id": "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src" }, "product_reference": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "relates_to_product_reference": "6Server-RHSSO-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch as a component of Red Hat Single Sign-On 7.3 for RHEL 6 Server", "product_id": "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" }, "product_reference": "rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "relates_to_product_reference": "6Server-RHSSO-7.3" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:04:39+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4040" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:04:39+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4040" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:04:39+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4040" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "Vadim Ashikhman" ] } ], "cve": "CVE-2019-14837", "cwe": { "id": "CWE-547", "name": "Use of Hard-coded, Security-relevant Constants" }, "discovery_date": "2019-07-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1730227" } ], "notes": [ { "category": "description", "text": "A flaw was found in Keycloak. The use of an open hard-coded domain can allow an unauthorized login by setting up a mail server and resetting the user credentials, enabling information disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak: keycloak uses hardcoded open dummy domain for new accounts enabling information disclosure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14837" }, { "category": "external", "summary": "RHBZ#1730227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1730227" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14837", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14837" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14837", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14837" } ], "release_date": "2019-12-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:04:39+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4040" }, { "category": "workaround", "details": "It is not a very straight forward workaround but it is possible to mitigate this by manually editing the default Email ID ([email protected]) to some valid email ID ([email protected]) in the USER_ENTITY table in the RHSSO database used.", "product_ids": [ "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "keycloak: keycloak uses hardcoded open dummy domain for new accounts enabling information disclosure" }, { "acknowledgments": [ { "names": [ "F\u00e1bio Magalh\u00e3es de Andrade" ], "organization": "Sonda Ativas" }, { "names": [ "Juliano de Castro Santos", "Leonard Lunardi" ], "organization": "UnimedBH" } ], "cve": "CVE-2019-14838", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2019-08-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1751227" } ], "notes": [ { "category": "description", "text": "It was found that Wildfly users had default user permissions set incorrectly. A malicious user could use this flaw to access unauthorized controls for the application server.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14838" }, { "category": "external", "summary": "RHBZ#1751227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751227" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14838", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14838" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14838", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14838" }, { "category": "external", "summary": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14838", "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14838" } ], "release_date": "2019-10-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:04:39+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4040" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default" }, { "cve": "CVE-2019-14843", "cwe": { "id": "CWE-592", "name": "CWE-592" }, "discovery_date": "2019-09-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1752980" } ], "notes": [ { "category": "description", "text": "A flaw was found in Wildfly Security Manager, running under JDK 11 or 8, that authorized requests for any requester. This flaw could be used by a malicious app deployed on the app server to access unauthorized information and possibly conduct further attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-security-manager: security manager authorization bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14843" }, { "category": "external", "summary": "RHBZ#1752980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752980" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14843", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14843" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14843", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14843" } ], "release_date": "2019-09-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:04:39+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4040" }, { "category": "workaround", "details": "This flaw only affects the Security Manager running under JDK 11 or 8. To mitigate exposure to this flaw, do not run under those JDK versions.", "product_ids": [ "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "wildfly-security-manager: security manager authorization bypass" } ] }
rhsa-2019_2955
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for rh-nodejs8-nodejs is now available for Red Hat Software Collections.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.\n\nThe following packages have been upgraded to a later upstream version: rh-nodejs8-nodejs (8.16.1).\n\nSecurity Fix(es):\n\n* HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511)\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using PRIORITY frames results in excessive resource consumption (CVE-2019-9513)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* HTTP/2: 0-length headers lead to denial of service (CVE-2019-9516)\n\n* HTTP/2: request for large response leads to denial of service (CVE-2019-9517)\n\n* HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:2955", "url": "https://access.redhat.com/errata/RHSA-2019:2955" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735741" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2955.json" } ], "title": "Red Hat Security Advisory: rh-nodejs8-nodejs security update", "tracking": { "current_release_date": "2024-12-15T18:55:21+00:00", "generator": { "date": "2024-12-15T18:55:21+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2019:2955", "initial_release_date": "2019-10-02T14:29:13+00:00", "revision_history": [ { "date": "2019-10-02T14:29:13+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-10-02T14:29:13+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-15T18:55:21+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } } ], "category": "product_family", "name": "Red Hat Software Collections" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs8-0:3.0-5.el7.ppc64le", "product": { "name": "rh-nodejs8-0:3.0-5.el7.ppc64le", "product_id": "rh-nodejs8-0:3.0-5.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "product": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "product_id": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "product": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "product_id": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "product": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "product_id": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "product": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "product_id": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "product": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "product_id": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "product": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "product_id": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs8-0:3.0-5.el7.s390x", "product": { "name": "rh-nodejs8-0:3.0-5.el7.s390x", "product_id": "rh-nodejs8-0:3.0-5.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs8-runtime-0:3.0-5.el7.s390x", "product": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.s390x", "product_id": "rh-nodejs8-runtime-0:3.0-5.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "product": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "product_id": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "product": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "product_id": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "product": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "product_id": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "product": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "product_id": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "product": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "product_id": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs8-0:3.0-5.el7.aarch64", "product": { "name": "rh-nodejs8-0:3.0-5.el7.aarch64", "product_id": "rh-nodejs8-0:3.0-5.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=aarch64" } } }, { "category": "product_version", "name": "rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "product": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "product_id": "rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=aarch64" } } }, { "category": "product_version", "name": "rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "product": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "product_id": "rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=aarch64" } } }, { "category": "product_version", "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "product": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "product_id": "rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=aarch64" } } }, { "category": "product_version", "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "product": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "product_id": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=aarch64" } } }, { "category": "product_version", "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "product": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "product_id": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=aarch64" } } }, { "category": "product_version", "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "product": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "product_id": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs8-0:3.0-5.el7.src", "product": { "name": "rh-nodejs8-0:3.0-5.el7.src", "product_id": "rh-nodejs8-0:3.0-5.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "product": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "product_id": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs8-0:3.0-5.el7.x86_64", "product": { "name": "rh-nodejs8-0:3.0-5.el7.x86_64", "product_id": "rh-nodejs8-0:3.0-5.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "product": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "product_id": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "product": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "product_id": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "product": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "product_id": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "product": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "product_id": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "product": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "product_id": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "product": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "product_id": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "product": { "name": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "product_id": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.src", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch" }, "product_reference": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch" }, "product_reference": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch" }, "product_reference": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch" }, "product_reference": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch" }, "product_reference": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.src", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch" }, "product_reference": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-9511", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741860" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker can request a large amount of data by manipulating window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this queue can consume excess CPU, memory, or both, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: large amount of data requests leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "There are no mitigations available for nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "RHBZ#1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9511", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-02T14:29:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2955" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: large amount of data requests leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-02T14:29:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2955" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9513", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735741" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker, using PRIORITY frames to flood the system, could cause excessive CPU usage and starvation of other clients. The largest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PRIORITY frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for packages nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9513" }, { "category": "external", "summary": "RHBZ#1735741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735741" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9513", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9513" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9513", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9513" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nghttp2.org/blog/2019/08/19/nghttp2-v1-39-2/", "url": "https://nghttp2.org/blog/2019/08/19/nghttp2-v1-39-2/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-02T14:29:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2955" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PRIORITY frames results in excessive resource consumption" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-02T14:29:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2955" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-02T14:29:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2955" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "cve": "CVE-2019-9516", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741864" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker, sending a stream of header with a 0-length header name and a 0-length header value, could cause some implementations to allocate memory for these headers and keep the allocations alive until the session dies. The can consume excess memory, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: 0-length headers lead to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9516" }, { "category": "external", "summary": "RHBZ#1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9516", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9516" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://github.com/nghttp2/nghttp2/issues/1382#", "url": "https://github.com/nghttp2/nghttp2/issues/1382#" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-02T14:29:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2955" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: 0-length headers lead to denial of service" }, { "cve": "CVE-2019-9517", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741868" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in HTTP/2. An attacker can open a HTTP/2 window so the peer can send without constraint. The TCP window remains closed so the peer cannot write the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the server\u0027s queue is setup, the responses can consume excess memory, CPU, or both, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: request for large response leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "The package httpd versions as shipped with Red Hat Enterprise Linux 5, 6 and 7 are not affected by this issue as HTTP/2 support is not provided.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9517" }, { "category": "external", "summary": "RHBZ#1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9517", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9517" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-02T14:29:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2955" }, { "category": "workaround", "details": "The httpd version shipped with Red Hat Enterprise Linux 8 provides HTTP/2 support through mod_http2 package. While mod_http2 package is not updated, users can disable HTTP/2 support as mitigation action by executing the following steps:\n\n1. Stop httpd service:\n$ systemctl stop httpd\n\n2. Remove http/2 protocol support from configuration files:\n$ sed -i \u0027s/\\(h2\\)\\|\\(h2c\\)//g\u0027 \u003chttpd_config_file\u003e\n\n3. Validate configuration files to make sure all syntax is valid:\n$ apachectl configtest\n\n4. Restart httpd service:\n$ systemctl start httpd", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: request for large response leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9518", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735749" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using frames with an empty payload, a flood could occur that results in excessive CPU usage and starvation of other clients. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using empty frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9518" }, { "category": "external", "summary": "RHBZ#1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9518", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-02T14:29:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2955" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using empty frames results in excessive resource consumption" } ] }
rhsa-2019_2594
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat OpenShift Container Platform 4.1.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the container images for Red Hat\nOpenShift Container Platform 4.1.14. All container images have been rebuilt with updated versions of golang. See the following advisory for the\nRPM packages for this release:\n\nhttps://access.redhat.com/errata/RHBA-2019:2660\n\nSecurity Fix(es):\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nThis release also includes the following bugs: \n\n* Previously, users would see an error in the web console when navigating to the ClusterResourceQuota instances from the CRD list. The problem has been fixed, and you can now successfully list ClusterResourceQuota instances from the CRD page. (BZ#1743259)\n\nSpace precludes documenting all of the container images in this advisory.\nSee the following Release Notes documentation, which will be updated\nshortly for this release, for details about these changes:\n\nhttps://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-rel\nease-notes.html\n\nYou may download the oc tool and use it to inspect release image metadata\nas follows:\n\n $ oc adm release info quay.io/openshift-release-dev/ocp-release:4.1.14\n\nThe image digest is sha256:fd41c9bda9e0ff306954f1fd7af6428edff8c3989b75f9fe984968db66846231\n\nAll OpenShift Container Platform 4.1 users are advised to upgrade to these\nupdated packages and images.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:2594", "url": "https://access.redhat.com/errata/RHSA-2019:2594" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1717794", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1717794" }, { "category": "external", "summary": "1729510", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1729510" }, { "category": "external", "summary": "1735363", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735363" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1737156", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1737156" }, { "category": "external", "summary": "1737164", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1737164" }, { "category": "external", "summary": "1737386", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1737386" }, { "category": "external", "summary": "1740044", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1740044" }, { "category": "external", "summary": "1741067", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741067" }, { "category": "external", "summary": "1741499", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741499" }, { "category": "external", "summary": "1741694", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741694" }, { "category": "external", "summary": "1743119", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1743119" }, { "category": "external", "summary": "1743259", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1743259" }, { "category": "external", "summary": "1743418", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1743418" }, { "category": "external", "summary": "1743587", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1743587" }, { "category": "external", "summary": "1743748", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1743748" }, { "category": "external", "summary": "1743771", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1743771" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2594.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 4.1.14 security and bug fix update", "tracking": { "current_release_date": "2024-11-13T22:08:45+00:00", "generator": { "date": "2024-11-13T22:08:45+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2019:2594", "initial_release_date": "2019-09-10T15:58:57+00:00", "revision_history": [ { "date": "2019-09-10T15:58:57+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-09-10T15:58:57+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-13T22:08:45+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.1", "product": { "name": "Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.1::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "openshift4/ose-cluster-autoscaler@sha256:b995c30d43493a8d393282c760584605951048dbe395eeac6b6b1bec269ff3ad_amd64", "product": { "name": "openshift4/ose-cluster-autoscaler@sha256:b995c30d43493a8d393282c760584605951048dbe395eeac6b6b1bec269ff3ad_amd64", "product_id": "openshift4/ose-cluster-autoscaler@sha256:b995c30d43493a8d393282c760584605951048dbe395eeac6b6b1bec269ff3ad_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-autoscaler@sha256:b995c30d43493a8d393282c760584605951048dbe395eeac6b6b1bec269ff3ad?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-autoscaler\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-descheduler@sha256:f7527c56780840d4062768e88f098229effd9796639ad67f6cdf841941a7e4a1_amd64", "product": { "name": "openshift4/ose-descheduler@sha256:f7527c56780840d4062768e88f098229effd9796639ad67f6cdf841941a7e4a1_amd64", "product_id": "openshift4/ose-descheduler@sha256:f7527c56780840d4062768e88f098229effd9796639ad67f6cdf841941a7e4a1_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-descheduler@sha256:f7527c56780840d4062768e88f098229effd9796639ad67f6cdf841941a7e4a1?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-descheduler\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-baremetal-machine-controllers@sha256:d9ca5e81aa2fb401f9c5bfb63e85fc5d93ae1e657ab992e879a2b9d520f3fea3_amd64", "product": { "name": "openshift4/ose-baremetal-machine-controllers@sha256:d9ca5e81aa2fb401f9c5bfb63e85fc5d93ae1e657ab992e879a2b9d520f3fea3_amd64", "product_id": "openshift4/ose-baremetal-machine-controllers@sha256:d9ca5e81aa2fb401f9c5bfb63e85fc5d93ae1e657ab992e879a2b9d520f3fea3_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-baremetal-machine-controllers@sha256:d9ca5e81aa2fb401f9c5bfb63e85fc5d93ae1e657ab992e879a2b9d520f3fea3?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-machine-controllers\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-logging-operator@sha256:7926e2be0854ff3edac0ced6950a0be04ad26d46a5da638611457c3fe0f1a19a_amd64", "product": { "name": "openshift4/ose-cluster-logging-operator@sha256:7926e2be0854ff3edac0ced6950a0be04ad26d46a5da638611457c3fe0f1a19a_amd64", "product_id": "openshift4/ose-cluster-logging-operator@sha256:7926e2be0854ff3edac0ced6950a0be04ad26d46a5da638611457c3fe0f1a19a_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-logging-operator@sha256:7926e2be0854ff3edac0ced6950a0be04ad26d46a5da638611457c3fe0f1a19a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-logging-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-monitoring-operator@sha256:05d69056c09c34d095ccedc757ecf2692690c72d2bee4e6b6afc58b01ec55d9c_amd64", "product": { "name": "openshift4/ose-cluster-monitoring-operator@sha256:05d69056c09c34d095ccedc757ecf2692690c72d2bee4e6b6afc58b01ec55d9c_amd64", "product_id": "openshift4/ose-cluster-monitoring-operator@sha256:05d69056c09c34d095ccedc757ecf2692690c72d2bee4e6b6afc58b01ec55d9c_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-monitoring-operator@sha256:05d69056c09c34d095ccedc757ecf2692690c72d2bee4e6b6afc58b01ec55d9c?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-monitoring-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-network-operator@sha256:2561079cceff11035c216fea71c0a10622696266aa5a9323ef13806c91537a68_amd64", "product": { "name": "openshift4/ose-cluster-network-operator@sha256:2561079cceff11035c216fea71c0a10622696266aa5a9323ef13806c91537a68_amd64", "product_id": "openshift4/ose-cluster-network-operator@sha256:2561079cceff11035c216fea71c0a10622696266aa5a9323ef13806c91537a68_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-network-operator@sha256:2561079cceff11035c216fea71c0a10622696266aa5a9323ef13806c91537a68?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-network-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-node-tuning-operator@sha256:b6fa66947d674eb2fc12b38fb9355c43c57a484d85e56dd013960a760046b793_amd64", "product": { "name": "openshift4/ose-cluster-node-tuning-operator@sha256:b6fa66947d674eb2fc12b38fb9355c43c57a484d85e56dd013960a760046b793_amd64", "product_id": "openshift4/ose-cluster-node-tuning-operator@sha256:b6fa66947d674eb2fc12b38fb9355c43c57a484d85e56dd013960a760046b793_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-node-tuning-operator@sha256:b6fa66947d674eb2fc12b38fb9355c43c57a484d85e56dd013960a760046b793?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-node-tuning-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-version-operator@sha256:2d99cc15d95e08541d60ebc1966b534fda48d00ee69c7c226996ac407a813d6b_amd64", "product": { "name": "openshift4/ose-cluster-version-operator@sha256:2d99cc15d95e08541d60ebc1966b534fda48d00ee69c7c226996ac407a813d6b_amd64", "product_id": "openshift4/ose-cluster-version-operator@sha256:2d99cc15d95e08541d60ebc1966b534fda48d00ee69c7c226996ac407a813d6b_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-version-operator@sha256:2d99cc15d95e08541d60ebc1966b534fda48d00ee69c7c226996ac407a813d6b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-version-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-configmap-reloader@sha256:84bb7a8504eb34ff5e4e9ca92aab960c078ededed07ab0fe79620c0b9f32a51f_amd64", "product": { "name": "openshift4/ose-configmap-reloader@sha256:84bb7a8504eb34ff5e4e9ca92aab960c078ededed07ab0fe79620c0b9f32a51f_amd64", "product_id": "openshift4/ose-configmap-reloader@sha256:84bb7a8504eb34ff5e4e9ca92aab960c078ededed07ab0fe79620c0b9f32a51f_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-configmap-reloader@sha256:84bb7a8504eb34ff5e4e9ca92aab960c078ededed07ab0fe79620c0b9f32a51f?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-configmap-reloader\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-coredns@sha256:9a330c9540816c13ddbbc93e99107f3d2a194c79eae20d81e8b8d252e9282c14_amd64", "product": { "name": "openshift4/ose-coredns@sha256:9a330c9540816c13ddbbc93e99107f3d2a194c79eae20d81e8b8d252e9282c14_amd64", "product_id": "openshift4/ose-coredns@sha256:9a330c9540816c13ddbbc93e99107f3d2a194c79eae20d81e8b8d252e9282c14_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-coredns@sha256:9a330c9540816c13ddbbc93e99107f3d2a194c79eae20d81e8b8d252e9282c14?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-coredns\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-descheduler-operator@sha256:71ba5a71c71074c282634a6261825c57977abd4999cc03957b8c407808a72902_amd64", "product": { "name": "openshift4/ose-descheduler-operator@sha256:71ba5a71c71074c282634a6261825c57977abd4999cc03957b8c407808a72902_amd64", "product_id": "openshift4/ose-descheduler-operator@sha256:71ba5a71c71074c282634a6261825c57977abd4999cc03957b8c407808a72902_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-descheduler-operator@sha256:71ba5a71c71074c282634a6261825c57977abd4999cc03957b8c407808a72902?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-descheduler-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-elasticsearch-operator@sha256:6b153238aa96aa4128de68a8df8dde185ebb930d2cee6fe1c033ff7b713fb6f9_amd64", "product": { "name": "openshift4/ose-elasticsearch-operator@sha256:6b153238aa96aa4128de68a8df8dde185ebb930d2cee6fe1c033ff7b713fb6f9_amd64", "product_id": "openshift4/ose-elasticsearch-operator@sha256:6b153238aa96aa4128de68a8df8dde185ebb930d2cee6fe1c033ff7b713fb6f9_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-elasticsearch-operator@sha256:6b153238aa96aa4128de68a8df8dde185ebb930d2cee6fe1c033ff7b713fb6f9?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-elasticsearch-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-oauth-proxy@sha256:383360705efc0605760c3b2b1d0fa288094eb6dad8158c540d950f661b4ba880_amd64", "product": { "name": "openshift4/ose-oauth-proxy@sha256:383360705efc0605760c3b2b1d0fa288094eb6dad8158c540d950f661b4ba880_amd64", "product_id": "openshift4/ose-oauth-proxy@sha256:383360705efc0605760c3b2b1d0fa288094eb6dad8158c540d950f661b4ba880_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-oauth-proxy@sha256:383360705efc0605760c3b2b1d0fa288094eb6dad8158c540d950f661b4ba880?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-proxy\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-prometheus-alertmanager@sha256:ef6c822baa9167856e613e7f1c14a1b44da42a394d91b9e0407d01d769a8fb40_amd64", "product": { "name": "openshift4/ose-prometheus-alertmanager@sha256:ef6c822baa9167856e613e7f1c14a1b44da42a394d91b9e0407d01d769a8fb40_amd64", "product_id": "openshift4/ose-prometheus-alertmanager@sha256:ef6c822baa9167856e613e7f1c14a1b44da42a394d91b9e0407d01d769a8fb40_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-prometheus-alertmanager@sha256:ef6c822baa9167856e613e7f1c14a1b44da42a394d91b9e0407d01d769a8fb40?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-alertmanager\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-prometheus-node-exporter@sha256:56c31eb82f202b0ab38bc600ef01ef68302a0a57b7274c9537d3518855e2da1d_amd64", "product": { "name": "openshift4/ose-prometheus-node-exporter@sha256:56c31eb82f202b0ab38bc600ef01ef68302a0a57b7274c9537d3518855e2da1d_amd64", "product_id": "openshift4/ose-prometheus-node-exporter@sha256:56c31eb82f202b0ab38bc600ef01ef68302a0a57b7274c9537d3518855e2da1d_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-prometheus-node-exporter@sha256:56c31eb82f202b0ab38bc600ef01ef68302a0a57b7274c9537d3518855e2da1d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-node-exporter\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-prometheus@sha256:38e663d919d2c96af52656b42d18556cf457b84ef3160e27496f6db36ffa92a3_amd64", "product": { "name": "openshift4/ose-prometheus@sha256:38e663d919d2c96af52656b42d18556cf457b84ef3160e27496f6db36ffa92a3_amd64", "product_id": "openshift4/ose-prometheus@sha256:38e663d919d2c96af52656b42d18556cf457b84ef3160e27496f6db36ffa92a3_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-prometheus@sha256:38e663d919d2c96af52656b42d18556cf457b84ef3160e27496f6db36ffa92a3?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-grafana@sha256:4304ba0edd79f4b2b7b6f4766dd696e8fb21423ff0dc50a18388e2163d9df3de_amd64", "product": { "name": "openshift4/ose-grafana@sha256:4304ba0edd79f4b2b7b6f4766dd696e8fb21423ff0dc50a18388e2163d9df3de_amd64", "product_id": "openshift4/ose-grafana@sha256:4304ba0edd79f4b2b7b6f4766dd696e8fb21423ff0dc50a18388e2163d9df3de_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-grafana@sha256:4304ba0edd79f4b2b7b6f4766dd696e8fb21423ff0dc50a18388e2163d9df3de?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-grafana\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-jenkins-agent-maven@sha256:ce5dd50d7005ed2d5ef36de673a2cf2cec07ad997ed93956605fe8fc8836d15c_amd64", "product": { "name": "openshift4/ose-jenkins-agent-maven@sha256:ce5dd50d7005ed2d5ef36de673a2cf2cec07ad997ed93956605fe8fc8836d15c_amd64", "product_id": "openshift4/ose-jenkins-agent-maven@sha256:ce5dd50d7005ed2d5ef36de673a2cf2cec07ad997ed93956605fe8fc8836d15c_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-jenkins-agent-maven@sha256:ce5dd50d7005ed2d5ef36de673a2cf2cec07ad997ed93956605fe8fc8836d15c?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-maven\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-jenkins-agent-base@sha256:c29122b0ed52c031f5f99ddb3338b6515bc05ac1e90864dda1131dcf9af87924_amd64", "product": { "name": "openshift4/ose-jenkins-agent-base@sha256:c29122b0ed52c031f5f99ddb3338b6515bc05ac1e90864dda1131dcf9af87924_amd64", "product_id": "openshift4/ose-jenkins-agent-base@sha256:c29122b0ed52c031f5f99ddb3338b6515bc05ac1e90864dda1131dcf9af87924_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-jenkins-agent-base@sha256:c29122b0ed52c031f5f99ddb3338b6515bc05ac1e90864dda1131dcf9af87924?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-base\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-kube-proxy@sha256:3afce3e28952226f1bb959b2859050e848ed5d4549ac5e2fc267f51b11fc6ec3_amd64", "product": { "name": "openshift4/ose-kube-proxy@sha256:3afce3e28952226f1bb959b2859050e848ed5d4549ac5e2fc267f51b11fc6ec3_amd64", "product_id": "openshift4/ose-kube-proxy@sha256:3afce3e28952226f1bb959b2859050e848ed5d4549ac5e2fc267f51b11fc6ec3_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-kube-proxy@sha256:3afce3e28952226f1bb959b2859050e848ed5d4549ac5e2fc267f51b11fc6ec3?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kube-proxy\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-kube-rbac-proxy@sha256:dab4af2713fa59499ee8d2cb169d636ddb425590e6924bc2c03597c0b10bd246_amd64", "product": { "name": "openshift4/ose-kube-rbac-proxy@sha256:dab4af2713fa59499ee8d2cb169d636ddb425590e6924bc2c03597c0b10bd246_amd64", "product_id": "openshift4/ose-kube-rbac-proxy@sha256:dab4af2713fa59499ee8d2cb169d636ddb425590e6924bc2c03597c0b10bd246_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-kube-rbac-proxy@sha256:dab4af2713fa59499ee8d2cb169d636ddb425590e6924bc2c03597c0b10bd246?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kube-rbac-proxy\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-kube-state-metrics@sha256:4ff6cd48b319093041c2fa9c32ce16c6ea4dffb1c66ef4923f9cfc108cdfe6cc_amd64", "product": { "name": "openshift4/ose-kube-state-metrics@sha256:4ff6cd48b319093041c2fa9c32ce16c6ea4dffb1c66ef4923f9cfc108cdfe6cc_amd64", "product_id": "openshift4/ose-kube-state-metrics@sha256:4ff6cd48b319093041c2fa9c32ce16c6ea4dffb1c66ef4923f9cfc108cdfe6cc_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-kube-state-metrics@sha256:4ff6cd48b319093041c2fa9c32ce16c6ea4dffb1c66ef4923f9cfc108cdfe6cc?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kube-state-metrics\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-logging-curator5@sha256:91942a469532fda2a4609f2d7ddf693cca5b2ccd8c770d0e36823f0cc67d884c_amd64", "product": { "name": "openshift4/ose-logging-curator5@sha256:91942a469532fda2a4609f2d7ddf693cca5b2ccd8c770d0e36823f0cc67d884c_amd64", "product_id": "openshift4/ose-logging-curator5@sha256:91942a469532fda2a4609f2d7ddf693cca5b2ccd8c770d0e36823f0cc67d884c_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-logging-curator5@sha256:91942a469532fda2a4609f2d7ddf693cca5b2ccd8c770d0e36823f0cc67d884c?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-logging-curator5\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-logging-elasticsearch5@sha256:c4693439c2f0f114238cc4034bfc6cd17f93bb9562ac2c0f9feb30f9c657fcd7_amd64", "product": { "name": "openshift4/ose-logging-elasticsearch5@sha256:c4693439c2f0f114238cc4034bfc6cd17f93bb9562ac2c0f9feb30f9c657fcd7_amd64", "product_id": "openshift4/ose-logging-elasticsearch5@sha256:c4693439c2f0f114238cc4034bfc6cd17f93bb9562ac2c0f9feb30f9c657fcd7_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-logging-elasticsearch5@sha256:c4693439c2f0f114238cc4034bfc6cd17f93bb9562ac2c0f9feb30f9c657fcd7?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-logging-elasticsearch5\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-logging-eventrouter@sha256:7668a706700163a35def516d1e1be336fef418ea477ef014ba90f5317569384b_amd64", "product": { "name": "openshift4/ose-logging-eventrouter@sha256:7668a706700163a35def516d1e1be336fef418ea477ef014ba90f5317569384b_amd64", "product_id": "openshift4/ose-logging-eventrouter@sha256:7668a706700163a35def516d1e1be336fef418ea477ef014ba90f5317569384b_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-logging-eventrouter@sha256:7668a706700163a35def516d1e1be336fef418ea477ef014ba90f5317569384b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-logging-eventrouter\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-logging-fluentd@sha256:3ef99bc79d891b111828c6c29faa8f3cd37d8ab8897186eff2bc85824939f632_amd64", "product": { "name": "openshift4/ose-logging-fluentd@sha256:3ef99bc79d891b111828c6c29faa8f3cd37d8ab8897186eff2bc85824939f632_amd64", "product_id": "openshift4/ose-logging-fluentd@sha256:3ef99bc79d891b111828c6c29faa8f3cd37d8ab8897186eff2bc85824939f632_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-logging-fluentd@sha256:3ef99bc79d891b111828c6c29faa8f3cd37d8ab8897186eff2bc85824939f632?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-logging-fluentd\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-operator-marketplace@sha256:3c5b9b86c9a9cd3c11290a44e29f016fe054b7068dd5b8469956909a63813db8_amd64", "product": { "name": "openshift4/ose-operator-marketplace@sha256:3c5b9b86c9a9cd3c11290a44e29f016fe054b7068dd5b8469956909a63813db8_amd64", "product_id": "openshift4/ose-operator-marketplace@sha256:3c5b9b86c9a9cd3c11290a44e29f016fe054b7068dd5b8469956909a63813db8_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-operator-marketplace@sha256:3c5b9b86c9a9cd3c11290a44e29f016fe054b7068dd5b8469956909a63813db8?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-marketplace\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-multus-cni@sha256:9be2123934d7f80af6439a84b5a9887459c1655549c7790fd080e965e89049b4_amd64", "product": { "name": "openshift4/ose-multus-cni@sha256:9be2123934d7f80af6439a84b5a9887459c1655549c7790fd080e965e89049b4_amd64", "product_id": "openshift4/ose-multus-cni@sha256:9be2123934d7f80af6439a84b5a9887459c1655549c7790fd080e965e89049b4_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-multus-cni@sha256:9be2123934d7f80af6439a84b5a9887459c1655549c7790fd080e965e89049b4?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-cni\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-ansible-operator@sha256:9469e5ed49937aeb64f0a3dbb5332f087c8498494127a5c507c02c3d4286afb1_amd64", "product": { "name": "openshift4/ose-ansible-operator@sha256:9469e5ed49937aeb64f0a3dbb5332f087c8498494127a5c507c02c3d4286afb1_amd64", "product_id": "openshift4/ose-ansible-operator@sha256:9469e5ed49937aeb64f0a3dbb5332f087c8498494127a5c507c02c3d4286afb1_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-ansible-operator@sha256:9469e5ed49937aeb64f0a3dbb5332f087c8498494127a5c507c02c3d4286afb1?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ansible-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/apb-base@sha256:183441575a8a0ba144fdd346e5ab560a067725a9b66d890493c326e14135512e_amd64", "product": { "name": "openshift4/apb-base@sha256:183441575a8a0ba144fdd346e5ab560a067725a9b66d890493c326e14135512e_amd64", "product_id": "openshift4/apb-base@sha256:183441575a8a0ba144fdd346e5ab560a067725a9b66d890493c326e14135512e_amd64", "product_identification_helper": { "purl": "pkg:oci/apb-base@sha256:183441575a8a0ba144fdd346e5ab560a067725a9b66d890493c326e14135512e?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/apb-base\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-docker-builder@sha256:25b131fc577def1179ce8a2022211d366fa461b6afef2f566b3f177930a3d0db_amd64", "product": { "name": "openshift4/ose-docker-builder@sha256:25b131fc577def1179ce8a2022211d366fa461b6afef2f566b3f177930a3d0db_amd64", "product_id": "openshift4/ose-docker-builder@sha256:25b131fc577def1179ce8a2022211d366fa461b6afef2f566b3f177930a3d0db_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-docker-builder@sha256:25b131fc577def1179ce8a2022211d366fa461b6afef2f566b3f177930a3d0db?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-docker-builder\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cli@sha256:bb846647aa233adddf5ed39056fdf98a7d9dc3abef4c985df3de698a44ecc7fd_amd64", "product": { "name": "openshift4/ose-cli@sha256:bb846647aa233adddf5ed39056fdf98a7d9dc3abef4c985df3de698a44ecc7fd_amd64", "product_id": "openshift4/ose-cli@sha256:bb846647aa233adddf5ed39056fdf98a7d9dc3abef4c985df3de698a44ecc7fd_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cli@sha256:bb846647aa233adddf5ed39056fdf98a7d9dc3abef4c985df3de698a44ecc7fd?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cli\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-capacity@sha256:24db95a9d24960c14775136419eed7dfddb7b7d70577fab77a63b64fc66d53a7_amd64", "product": { "name": "openshift4/ose-cluster-capacity@sha256:24db95a9d24960c14775136419eed7dfddb7b7d70577fab77a63b64fc66d53a7_amd64", "product_id": "openshift4/ose-cluster-capacity@sha256:24db95a9d24960c14775136419eed7dfddb7b7d70577fab77a63b64fc66d53a7_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-capacity@sha256:24db95a9d24960c14775136419eed7dfddb7b7d70577fab77a63b64fc66d53a7?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-capacity\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-console@sha256:68c4a7514623c31f7fdf7058a0dcd968dc4e4a63bcf0236ff21333bfb27cc4aa_amd64", "product": { "name": "openshift4/ose-console@sha256:68c4a7514623c31f7fdf7058a0dcd968dc4e4a63bcf0236ff21333bfb27cc4aa_amd64", "product_id": "openshift4/ose-console@sha256:68c4a7514623c31f7fdf7058a0dcd968dc4e4a63bcf0236ff21333bfb27cc4aa_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-console@sha256:68c4a7514623c31f7fdf7058a0dcd968dc4e4a63bcf0236ff21333bfb27cc4aa?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-console\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-console-operator@sha256:665d6d89d83c51de08526c08365317b3dbb9f20e1528ffb35697f6c8bd409ca3_amd64", "product": { "name": "openshift4/ose-console-operator@sha256:665d6d89d83c51de08526c08365317b3dbb9f20e1528ffb35697f6c8bd409ca3_amd64", "product_id": "openshift4/ose-console-operator@sha256:665d6d89d83c51de08526c08365317b3dbb9f20e1528ffb35697f6c8bd409ca3_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-console-operator@sha256:665d6d89d83c51de08526c08365317b3dbb9f20e1528ffb35697f6c8bd409ca3?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-console-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-deployer@sha256:ab62d8277ea2e69cf6697343c4b6bfef67f04c5f31cdf47fc510cb76969ca2ca_amd64", "product": { "name": "openshift4/ose-deployer@sha256:ab62d8277ea2e69cf6697343c4b6bfef67f04c5f31cdf47fc510cb76969ca2ca_amd64", "product_id": "openshift4/ose-deployer@sha256:ab62d8277ea2e69cf6697343c4b6bfef67f04c5f31cdf47fc510cb76969ca2ca_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-deployer@sha256:ab62d8277ea2e69cf6697343c4b6bfef67f04c5f31cdf47fc510cb76969ca2ca?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-deployer\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-egress-dns-proxy@sha256:2c00e51829c679d3573f813b0eced5c16382966ecf609915b47a8472872bbb64_amd64", "product": { "name": "openshift4/ose-egress-dns-proxy@sha256:2c00e51829c679d3573f813b0eced5c16382966ecf609915b47a8472872bbb64_amd64", "product_id": "openshift4/ose-egress-dns-proxy@sha256:2c00e51829c679d3573f813b0eced5c16382966ecf609915b47a8472872bbb64_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-egress-dns-proxy@sha256:2c00e51829c679d3573f813b0eced5c16382966ecf609915b47a8472872bbb64?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-egress-dns-proxy\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-egress-router@sha256:c46ed6f837821decadaaf07266b9d67f89b98621618bc073abdc38db51bc692a_amd64", "product": { "name": "openshift4/ose-egress-router@sha256:c46ed6f837821decadaaf07266b9d67f89b98621618bc073abdc38db51bc692a_amd64", "product_id": "openshift4/ose-egress-router@sha256:c46ed6f837821decadaaf07266b9d67f89b98621618bc073abdc38db51bc692a_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-egress-router@sha256:c46ed6f837821decadaaf07266b9d67f89b98621618bc073abdc38db51bc692a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-egress-router\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-haproxy-router@sha256:e0c7adba792e43e96c8d6f4e0845e2d001d0f652ece6f567b09ac481b07eafdc_amd64", "product": { "name": "openshift4/ose-haproxy-router@sha256:e0c7adba792e43e96c8d6f4e0845e2d001d0f652ece6f567b09ac481b07eafdc_amd64", "product_id": "openshift4/ose-haproxy-router@sha256:e0c7adba792e43e96c8d6f4e0845e2d001d0f652ece6f567b09ac481b07eafdc_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-haproxy-router@sha256:e0c7adba792e43e96c8d6f4e0845e2d001d0f652ece6f567b09ac481b07eafdc?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-haproxy-router\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-hyperkube@sha256:150fe3e51c75f09bd366d06a96749e17cd01aa845319032c327387950b52a34e_amd64", "product": { "name": "openshift4/ose-hyperkube@sha256:150fe3e51c75f09bd366d06a96749e17cd01aa845319032c327387950b52a34e_amd64", "product_id": "openshift4/ose-hyperkube@sha256:150fe3e51c75f09bd366d06a96749e17cd01aa845319032c327387950b52a34e_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-hyperkube@sha256:150fe3e51c75f09bd366d06a96749e17cd01aa845319032c327387950b52a34e?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-hyperkube\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-hypershift@sha256:48392b80092bca63f2969b14412017601ebfda1b54141db53c2bc5b2317c389a_amd64", "product": { "name": "openshift4/ose-hypershift@sha256:48392b80092bca63f2969b14412017601ebfda1b54141db53c2bc5b2317c389a_amd64", "product_id": "openshift4/ose-hypershift@sha256:48392b80092bca63f2969b14412017601ebfda1b54141db53c2bc5b2317c389a_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-hypershift@sha256:48392b80092bca63f2969b14412017601ebfda1b54141db53c2bc5b2317c389a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-hypershift\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-keepalived-ipfailover@sha256:1c0b3bde2963560aa0c50bd8365abd39bc5cfae28409fbdc60abf786546eb2e8_amd64", "product": { "name": "openshift4/ose-keepalived-ipfailover@sha256:1c0b3bde2963560aa0c50bd8365abd39bc5cfae28409fbdc60abf786546eb2e8_amd64", "product_id": "openshift4/ose-keepalived-ipfailover@sha256:1c0b3bde2963560aa0c50bd8365abd39bc5cfae28409fbdc60abf786546eb2e8_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-keepalived-ipfailover@sha256:1c0b3bde2963560aa0c50bd8365abd39bc5cfae28409fbdc60abf786546eb2e8?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-keepalived-ipfailover\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/mariadb-apb@sha256:a446829513325ac146b2aa1b555347b57a2377712df6cd8a431c1dbec0614331_amd64", "product": { "name": "openshift4/mariadb-apb@sha256:a446829513325ac146b2aa1b555347b57a2377712df6cd8a431c1dbec0614331_amd64", "product_id": "openshift4/mariadb-apb@sha256:a446829513325ac146b2aa1b555347b57a2377712df6cd8a431c1dbec0614331_amd64", "product_identification_helper": { "purl": "pkg:oci/mariadb-apb@sha256:a446829513325ac146b2aa1b555347b57a2377712df6cd8a431c1dbec0614331?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/mariadb-apb\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/mediawiki-apb@sha256:0a1ab047c6a93e3531f20673b275854361f36e2ebd4894b5ad1705c3dde42a76_amd64", "product": { "name": "openshift4/mediawiki-apb@sha256:0a1ab047c6a93e3531f20673b275854361f36e2ebd4894b5ad1705c3dde42a76_amd64", "product_id": "openshift4/mediawiki-apb@sha256:0a1ab047c6a93e3531f20673b275854361f36e2ebd4894b5ad1705c3dde42a76_amd64", "product_identification_helper": { "purl": "pkg:oci/mediawiki-apb@sha256:0a1ab047c6a93e3531f20673b275854361f36e2ebd4894b5ad1705c3dde42a76?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/mediawiki-apb\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/mediawiki@sha256:8014f0d73799f7f26b56a3d908b55de3103103f57a507d48fe9830c7d605f85d_amd64", "product": { "name": "openshift4/mediawiki@sha256:8014f0d73799f7f26b56a3d908b55de3103103f57a507d48fe9830c7d605f85d_amd64", "product_id": "openshift4/mediawiki@sha256:8014f0d73799f7f26b56a3d908b55de3103103f57a507d48fe9830c7d605f85d_amd64", "product_identification_helper": { "purl": "pkg:oci/mediawiki@sha256:8014f0d73799f7f26b56a3d908b55de3103103f57a507d48fe9830c7d605f85d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/mediawiki\u0026tag=v4.1.14-201909040920" } } }, { "category": "product_version", "name": "openshift4/mysql-apb@sha256:5772d2a584b96249c535df55b501ffe891162d7651b18244cdc16ab2f0d563dc_amd64", "product": { "name": "openshift4/mysql-apb@sha256:5772d2a584b96249c535df55b501ffe891162d7651b18244cdc16ab2f0d563dc_amd64", "product_id": "openshift4/mysql-apb@sha256:5772d2a584b96249c535df55b501ffe891162d7651b18244cdc16ab2f0d563dc_amd64", "product_identification_helper": { "purl": "pkg:oci/mysql-apb@sha256:5772d2a584b96249c535df55b501ffe891162d7651b18244cdc16ab2f0d563dc?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/mysql-apb\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-pod@sha256:40b2f3ff0b5ff873669613882579b2a714aed77e1fea4e28a26ebf2726177707_amd64", "product": { "name": "openshift4/ose-pod@sha256:40b2f3ff0b5ff873669613882579b2a714aed77e1fea4e28a26ebf2726177707_amd64", "product_id": "openshift4/ose-pod@sha256:40b2f3ff0b5ff873669613882579b2a714aed77e1fea4e28a26ebf2726177707_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-pod@sha256:40b2f3ff0b5ff873669613882579b2a714aed77e1fea4e28a26ebf2726177707?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-pod\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/postgresql-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64", "product": { "name": "openshift4/postgresql-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64", "product_id": "openshift4/postgresql-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64", "product_identification_helper": { "purl": "pkg:oci/postgresql-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/postgresql-apb\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/postgres-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64", "product": { "name": "openshift4/postgres-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64", "product_id": "openshift4/postgres-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64", "product_identification_helper": { "purl": "pkg:oci/postgres-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/postgres-apb\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-docker-registry@sha256:f7bd292dde7bd96195b313b4c459980fe8541bd89c442a4065a0114f42f3fe46_amd64", "product": { "name": "openshift4/ose-docker-registry@sha256:f7bd292dde7bd96195b313b4c459980fe8541bd89c442a4065a0114f42f3fe46_amd64", "product_id": "openshift4/ose-docker-registry@sha256:f7bd292dde7bd96195b313b4c459980fe8541bd89c442a4065a0114f42f3fe46_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-docker-registry@sha256:f7bd292dde7bd96195b313b4c459980fe8541bd89c442a4065a0114f42f3fe46?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-docker-registry\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-tests@sha256:28866a167dd7df474b053e92de3ba9bc0d95d918180b1e676637df30c2a27ef4_amd64", "product": { "name": "openshift4/ose-tests@sha256:28866a167dd7df474b053e92de3ba9bc0d95d918180b1e676637df30c2a27ef4_amd64", "product_id": "openshift4/ose-tests@sha256:28866a167dd7df474b053e92de3ba9bc0d95d918180b1e676637df30c2a27ef4_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-tests@sha256:28866a167dd7df474b053e92de3ba9bc0d95d918180b1e676637df30c2a27ef4?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-tests\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-jenkins@sha256:8da877d1df3fbb0fd4df607718847382d3ab38b862f868077c8938a1a7014f71_amd64", "product": { "name": "openshift4/ose-jenkins@sha256:8da877d1df3fbb0fd4df607718847382d3ab38b862f868077c8938a1a7014f71_amd64", "product_id": "openshift4/ose-jenkins@sha256:8da877d1df3fbb0fd4df607718847382d3ab38b862f868077c8938a1a7014f71_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-jenkins@sha256:8da877d1df3fbb0fd4df607718847382d3ab38b862f868077c8938a1a7014f71?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-operator-lifecycle-manager@sha256:9254b8d3097a0d067f07bcf735b3530eccc888466f99a6282aebb7bbdd9cbcc8_amd64", "product": { "name": "openshift4/ose-operator-lifecycle-manager@sha256:9254b8d3097a0d067f07bcf735b3530eccc888466f99a6282aebb7bbdd9cbcc8_amd64", "product_id": "openshift4/ose-operator-lifecycle-manager@sha256:9254b8d3097a0d067f07bcf735b3530eccc888466f99a6282aebb7bbdd9cbcc8_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-operator-lifecycle-manager@sha256:9254b8d3097a0d067f07bcf735b3530eccc888466f99a6282aebb7bbdd9cbcc8?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-lifecycle-manager\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-operator-registry@sha256:5eecc9d91c1ae4f0af586aa7d97fce8a32f23dfcdd64dcc61b9c536fbf4e8663_amd64", "product": { "name": "openshift4/ose-operator-registry@sha256:5eecc9d91c1ae4f0af586aa7d97fce8a32f23dfcdd64dcc61b9c536fbf4e8663_amd64", "product_id": "openshift4/ose-operator-registry@sha256:5eecc9d91c1ae4f0af586aa7d97fce8a32f23dfcdd64dcc61b9c536fbf4e8663_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-operator-registry@sha256:5eecc9d91c1ae4f0af586aa7d97fce8a32f23dfcdd64dcc61b9c536fbf4e8663?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-registry\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-aws-machine-controllers@sha256:e5f585aa452461ee95d55e84d81be54a82a458a54dbcad1f68a8f28edeb7638b_amd64", "product": { "name": "openshift4/ose-aws-machine-controllers@sha256:e5f585aa452461ee95d55e84d81be54a82a458a54dbcad1f68a8f28edeb7638b_amd64", "product_id": "openshift4/ose-aws-machine-controllers@sha256:e5f585aa452461ee95d55e84d81be54a82a458a54dbcad1f68a8f28edeb7638b_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-aws-machine-controllers@sha256:e5f585aa452461ee95d55e84d81be54a82a458a54dbcad1f68a8f28edeb7638b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-aws-machine-controllers\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-azure-machine-controllers@sha256:9f3199e5226fdcd5abe34a6f2e3a6ad7e7ad3f59edbff2bfd9b4c84566897eae_amd64", "product": { "name": "openshift4/ose-azure-machine-controllers@sha256:9f3199e5226fdcd5abe34a6f2e3a6ad7e7ad3f59edbff2bfd9b4c84566897eae_amd64", "product_id": "openshift4/ose-azure-machine-controllers@sha256:9f3199e5226fdcd5abe34a6f2e3a6ad7e7ad3f59edbff2bfd9b4c84566897eae_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-azure-machine-controllers@sha256:9f3199e5226fdcd5abe34a6f2e3a6ad7e7ad3f59edbff2bfd9b4c84566897eae?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-azure-machine-controllers\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cli-artifacts@sha256:bacaec21f6101ef686bb07b5d6e80b0b3ad06ab9a4d4f6e611ca3103c0030d7e_amd64", "product": { "name": "openshift4/ose-cli-artifacts@sha256:bacaec21f6101ef686bb07b5d6e80b0b3ad06ab9a4d4f6e611ca3103c0030d7e_amd64", "product_id": "openshift4/ose-cli-artifacts@sha256:bacaec21f6101ef686bb07b5d6e80b0b3ad06ab9a4d4f6e611ca3103c0030d7e_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cli-artifacts@sha256:bacaec21f6101ef686bb07b5d6e80b0b3ad06ab9a4d4f6e611ca3103c0030d7e?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cli-artifacts\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cloud-credential-operator@sha256:27c7bac07c2a2a38ddb65a9997b22946fbe37ddd06ecf52eccd0ef9235ae47ba_amd64", "product": { "name": "openshift4/ose-cloud-credential-operator@sha256:27c7bac07c2a2a38ddb65a9997b22946fbe37ddd06ecf52eccd0ef9235ae47ba_amd64", "product_id": "openshift4/ose-cloud-credential-operator@sha256:27c7bac07c2a2a38ddb65a9997b22946fbe37ddd06ecf52eccd0ef9235ae47ba_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cloud-credential-operator@sha256:27c7bac07c2a2a38ddb65a9997b22946fbe37ddd06ecf52eccd0ef9235ae47ba?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cloud-credential-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-authentication-operator@sha256:67dc9d9d90e5b37c73eda524a13e0bd98834b225adbfccc9d6c09a35a130c8f4_amd64", "product": { "name": "openshift4/ose-cluster-authentication-operator@sha256:67dc9d9d90e5b37c73eda524a13e0bd98834b225adbfccc9d6c09a35a130c8f4_amd64", "product_id": "openshift4/ose-cluster-authentication-operator@sha256:67dc9d9d90e5b37c73eda524a13e0bd98834b225adbfccc9d6c09a35a130c8f4_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-authentication-operator@sha256:67dc9d9d90e5b37c73eda524a13e0bd98834b225adbfccc9d6c09a35a130c8f4?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-authentication-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-autoscaler-operator@sha256:989948cb9998b518f3c325a2af3b24cfb7033ad2ac8be96cb3fafce2b4077435_amd64", "product": { "name": "openshift4/ose-cluster-autoscaler-operator@sha256:989948cb9998b518f3c325a2af3b24cfb7033ad2ac8be96cb3fafce2b4077435_amd64", "product_id": "openshift4/ose-cluster-autoscaler-operator@sha256:989948cb9998b518f3c325a2af3b24cfb7033ad2ac8be96cb3fafce2b4077435_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-autoscaler-operator@sha256:989948cb9998b518f3c325a2af3b24cfb7033ad2ac8be96cb3fafce2b4077435?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-autoscaler-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-bootstrap@sha256:9a676b7e363f022a511ab07ae81242b5c6d03523db11c37b0bf47e0f0324c9d8_amd64", "product": { "name": "openshift4/ose-cluster-bootstrap@sha256:9a676b7e363f022a511ab07ae81242b5c6d03523db11c37b0bf47e0f0324c9d8_amd64", "product_id": "openshift4/ose-cluster-bootstrap@sha256:9a676b7e363f022a511ab07ae81242b5c6d03523db11c37b0bf47e0f0324c9d8_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-bootstrap@sha256:9a676b7e363f022a511ab07ae81242b5c6d03523db11c37b0bf47e0f0324c9d8?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-bootstrap\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-config-operator@sha256:3b210b7313b4853f777d19248ba746b3d29251a3409124f984ae212809930427_amd64", "product": { "name": "openshift4/ose-cluster-config-operator@sha256:3b210b7313b4853f777d19248ba746b3d29251a3409124f984ae212809930427_amd64", "product_id": "openshift4/ose-cluster-config-operator@sha256:3b210b7313b4853f777d19248ba746b3d29251a3409124f984ae212809930427_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-config-operator@sha256:3b210b7313b4853f777d19248ba746b3d29251a3409124f984ae212809930427?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-config-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-dns-operator@sha256:5f70ba7ebcee1ecb9f65c8b43280935866607fc3dee6329ed473169f2acebe05_amd64", "product": { "name": "openshift4/ose-cluster-dns-operator@sha256:5f70ba7ebcee1ecb9f65c8b43280935866607fc3dee6329ed473169f2acebe05_amd64", "product_id": "openshift4/ose-cluster-dns-operator@sha256:5f70ba7ebcee1ecb9f65c8b43280935866607fc3dee6329ed473169f2acebe05_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-dns-operator@sha256:5f70ba7ebcee1ecb9f65c8b43280935866607fc3dee6329ed473169f2acebe05?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-dns-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-image-registry-operator@sha256:5c8fa5eb3828277f31ca0d4f7aedfee8e66dc0cfa3542772e6ac13c6b131644d_amd64", "product": { "name": "openshift4/ose-cluster-image-registry-operator@sha256:5c8fa5eb3828277f31ca0d4f7aedfee8e66dc0cfa3542772e6ac13c6b131644d_amd64", "product_id": "openshift4/ose-cluster-image-registry-operator@sha256:5c8fa5eb3828277f31ca0d4f7aedfee8e66dc0cfa3542772e6ac13c6b131644d_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-image-registry-operator@sha256:5c8fa5eb3828277f31ca0d4f7aedfee8e66dc0cfa3542772e6ac13c6b131644d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-image-registry-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-ingress-operator@sha256:b33e32eaac7d15947e32cbeb9d45e9ae3e6fbe470611ab78f28cfc99d8759b68_amd64", "product": { "name": "openshift4/ose-cluster-ingress-operator@sha256:b33e32eaac7d15947e32cbeb9d45e9ae3e6fbe470611ab78f28cfc99d8759b68_amd64", "product_id": "openshift4/ose-cluster-ingress-operator@sha256:b33e32eaac7d15947e32cbeb9d45e9ae3e6fbe470611ab78f28cfc99d8759b68_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-ingress-operator@sha256:b33e32eaac7d15947e32cbeb9d45e9ae3e6fbe470611ab78f28cfc99d8759b68?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-ingress-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:af88e84a2957ba9eeb1e5e3cdf9cf559ccb0de08d7a16c58a19c8eb805ba5a39_amd64", "product": { "name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:af88e84a2957ba9eeb1e5e3cdf9cf559ccb0de08d7a16c58a19c8eb805ba5a39_amd64", "product_id": "openshift4/ose-cluster-kube-apiserver-operator@sha256:af88e84a2957ba9eeb1e5e3cdf9cf559ccb0de08d7a16c58a19c8eb805ba5a39_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-apiserver-operator@sha256:af88e84a2957ba9eeb1e5e3cdf9cf559ccb0de08d7a16c58a19c8eb805ba5a39?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-apiserver-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:ca1e29c0c4eb029ed4d5544d5fde000000aa007f1d8e0fcf0fc0d317b5e06784_amd64", "product": { "name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:ca1e29c0c4eb029ed4d5544d5fde000000aa007f1d8e0fcf0fc0d317b5e06784_amd64", "product_id": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:ca1e29c0c4eb029ed4d5544d5fde000000aa007f1d8e0fcf0fc0d317b5e06784_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-controller-manager-operator@sha256:ca1e29c0c4eb029ed4d5544d5fde000000aa007f1d8e0fcf0fc0d317b5e06784?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-controller-manager-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:6f30eebebe4b774acd19eadeae80c4a7c8ccb503389c354bc76fc0f778cefe2b_amd64", "product": { "name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:6f30eebebe4b774acd19eadeae80c4a7c8ccb503389c354bc76fc0f778cefe2b_amd64", "product_id": "openshift4/ose-cluster-kube-scheduler-operator@sha256:6f30eebebe4b774acd19eadeae80c4a7c8ccb503389c354bc76fc0f778cefe2b_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-scheduler-operator@sha256:6f30eebebe4b774acd19eadeae80c4a7c8ccb503389c354bc76fc0f778cefe2b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-scheduler-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-machine-approver@sha256:3535b9ccd701ac3fa6b6a8339f6c10d6e74dd4d8f5f810690fa7e272ee82f837_amd64", "product": { "name": "openshift4/ose-cluster-machine-approver@sha256:3535b9ccd701ac3fa6b6a8339f6c10d6e74dd4d8f5f810690fa7e272ee82f837_amd64", "product_id": "openshift4/ose-cluster-machine-approver@sha256:3535b9ccd701ac3fa6b6a8339f6c10d6e74dd4d8f5f810690fa7e272ee82f837_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-machine-approver@sha256:3535b9ccd701ac3fa6b6a8339f6c10d6e74dd4d8f5f810690fa7e272ee82f837?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-machine-approver\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:1291555580ce58d7855c7b93ace6826cd2b1a22499fc5df3aad7d36a30b880ee_amd64", "product": { "name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:1291555580ce58d7855c7b93ace6826cd2b1a22499fc5df3aad7d36a30b880ee_amd64", "product_id": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:1291555580ce58d7855c7b93ace6826cd2b1a22499fc5df3aad7d36a30b880ee_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-openshift-apiserver-operator@sha256:1291555580ce58d7855c7b93ace6826cd2b1a22499fc5df3aad7d36a30b880ee?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-openshift-apiserver-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:3bdcfac3e9dcd30754f1e4158706bbcef77449fc3893521c86fd793cc1f7f32a_amd64", "product": { "name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:3bdcfac3e9dcd30754f1e4158706bbcef77449fc3893521c86fd793cc1f7f32a_amd64", "product_id": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:3bdcfac3e9dcd30754f1e4158706bbcef77449fc3893521c86fd793cc1f7f32a_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-openshift-controller-manager-operator@sha256:3bdcfac3e9dcd30754f1e4158706bbcef77449fc3893521c86fd793cc1f7f32a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-openshift-controller-manager-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-samples-operator@sha256:79ba26ee177bc7cd2ab89ddaa6c66b5dcfc6970dc457cc737d64b18b5d378637_amd64", "product": { "name": "openshift4/ose-cluster-samples-operator@sha256:79ba26ee177bc7cd2ab89ddaa6c66b5dcfc6970dc457cc737d64b18b5d378637_amd64", "product_id": "openshift4/ose-cluster-samples-operator@sha256:79ba26ee177bc7cd2ab89ddaa6c66b5dcfc6970dc457cc737d64b18b5d378637_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-samples-operator@sha256:79ba26ee177bc7cd2ab89ddaa6c66b5dcfc6970dc457cc737d64b18b5d378637?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-samples-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-storage-operator@sha256:95ad59eb2e2cc58f7ae6b850f648259687f266f05ac91166a39da6bf441e3e86_amd64", "product": { "name": "openshift4/ose-cluster-storage-operator@sha256:95ad59eb2e2cc58f7ae6b850f648259687f266f05ac91166a39da6bf441e3e86_amd64", "product_id": "openshift4/ose-cluster-storage-operator@sha256:95ad59eb2e2cc58f7ae6b850f648259687f266f05ac91166a39da6bf441e3e86_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-storage-operator@sha256:95ad59eb2e2cc58f7ae6b850f648259687f266f05ac91166a39da6bf441e3e86?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-storage-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-update-keys@sha256:f919d82bd99ecd768271c8ef7ad6bf6d2b5cb902410b93bbafc829c58b59a48f_amd64", "product": { "name": "openshift4/ose-cluster-update-keys@sha256:f919d82bd99ecd768271c8ef7ad6bf6d2b5cb902410b93bbafc829c58b59a48f_amd64", "product_id": "openshift4/ose-cluster-update-keys@sha256:f919d82bd99ecd768271c8ef7ad6bf6d2b5cb902410b93bbafc829c58b59a48f_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-update-keys@sha256:f919d82bd99ecd768271c8ef7ad6bf6d2b5cb902410b93bbafc829c58b59a48f?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-update-keys\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-egress-http-proxy@sha256:77ffd3c6dbb51743a13ce6a9cbd385602c24165848c205aca864b88af5b3c503_amd64", "product": { "name": "openshift4/ose-egress-http-proxy@sha256:77ffd3c6dbb51743a13ce6a9cbd385602c24165848c205aca864b88af5b3c503_amd64", "product_id": "openshift4/ose-egress-http-proxy@sha256:77ffd3c6dbb51743a13ce6a9cbd385602c24165848c205aca864b88af5b3c503_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-egress-http-proxy@sha256:77ffd3c6dbb51743a13ce6a9cbd385602c24165848c205aca864b88af5b3c503?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-egress-http-proxy\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-etcd@sha256:3df453713db7ea9a1bd8556a0a986fcd8d8c0a4649c262b9d8652ccfe648bb1e_amd64", "product": { "name": "openshift4/ose-etcd@sha256:3df453713db7ea9a1bd8556a0a986fcd8d8c0a4649c262b9d8652ccfe648bb1e_amd64", "product_id": "openshift4/ose-etcd@sha256:3df453713db7ea9a1bd8556a0a986fcd8d8c0a4649c262b9d8652ccfe648bb1e_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-etcd@sha256:3df453713db7ea9a1bd8556a0a986fcd8d8c0a4649c262b9d8652ccfe648bb1e?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-etcd\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-installer-artifacts@sha256:7f3e05fa013dead5501513b86c19719973d0f9ee5dbdd4d3f5264fe601dbf809_amd64", "product": { "name": "openshift4/ose-installer-artifacts@sha256:7f3e05fa013dead5501513b86c19719973d0f9ee5dbdd4d3f5264fe601dbf809_amd64", "product_id": "openshift4/ose-installer-artifacts@sha256:7f3e05fa013dead5501513b86c19719973d0f9ee5dbdd4d3f5264fe601dbf809_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-installer-artifacts@sha256:7f3e05fa013dead5501513b86c19719973d0f9ee5dbdd4d3f5264fe601dbf809?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-installer-artifacts\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-installer@sha256:7f0fb099018d7fba695adfff2c6cec1af789e3c3ccab61bb084a30ae1bdff79f_amd64", "product": { "name": "openshift4/ose-installer@sha256:7f0fb099018d7fba695adfff2c6cec1af789e3c3ccab61bb084a30ae1bdff79f_amd64", "product_id": "openshift4/ose-installer@sha256:7f0fb099018d7fba695adfff2c6cec1af789e3c3ccab61bb084a30ae1bdff79f_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-installer@sha256:7f0fb099018d7fba695adfff2c6cec1af789e3c3ccab61bb084a30ae1bdff79f?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-installer\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-libvirt-machine-controllers@sha256:2446ea720c26b213b9419bd2ad867c0ca1ec6df6d972cd5ffd6037b8fe0fbc88_amd64", "product": { "name": "openshift4/ose-libvirt-machine-controllers@sha256:2446ea720c26b213b9419bd2ad867c0ca1ec6df6d972cd5ffd6037b8fe0fbc88_amd64", "product_id": "openshift4/ose-libvirt-machine-controllers@sha256:2446ea720c26b213b9419bd2ad867c0ca1ec6df6d972cd5ffd6037b8fe0fbc88_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-libvirt-machine-controllers@sha256:2446ea720c26b213b9419bd2ad867c0ca1ec6df6d972cd5ffd6037b8fe0fbc88?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-libvirt-machine-controllers\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-machine-api-operator@sha256:6dfe7c13a6ae6c6e509f0d8cd0cb6e5284f9efd8cc2c949d87a471643e730957_amd64", "product": { "name": "openshift4/ose-machine-api-operator@sha256:6dfe7c13a6ae6c6e509f0d8cd0cb6e5284f9efd8cc2c949d87a471643e730957_amd64", "product_id": "openshift4/ose-machine-api-operator@sha256:6dfe7c13a6ae6c6e509f0d8cd0cb6e5284f9efd8cc2c949d87a471643e730957_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-machine-api-operator@sha256:6dfe7c13a6ae6c6e509f0d8cd0cb6e5284f9efd8cc2c949d87a471643e730957?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-machine-api-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-machine-config-operator@sha256:ebffd73f3e4ff92792bad0cfa5bba5bec17e2124c7618ae7c4bd49ac777b7deb_amd64", "product": { "name": "openshift4/ose-machine-config-operator@sha256:ebffd73f3e4ff92792bad0cfa5bba5bec17e2124c7618ae7c4bd49ac777b7deb_amd64", "product_id": "openshift4/ose-machine-config-operator@sha256:ebffd73f3e4ff92792bad0cfa5bba5bec17e2124c7618ae7c4bd49ac777b7deb_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-machine-config-operator@sha256:ebffd73f3e4ff92792bad0cfa5bba5bec17e2124c7618ae7c4bd49ac777b7deb?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-machine-config-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-multus-admission-controller@sha256:101d1c2eeebf1c5e336238056ff9415de50855363eebce3b75cf6ac562adca05_amd64", "product": { "name": "openshift4/ose-multus-admission-controller@sha256:101d1c2eeebf1c5e336238056ff9415de50855363eebce3b75cf6ac562adca05_amd64", "product_id": "openshift4/ose-multus-admission-controller@sha256:101d1c2eeebf1c5e336238056ff9415de50855363eebce3b75cf6ac562adca05_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-multus-admission-controller@sha256:101d1c2eeebf1c5e336238056ff9415de50855363eebce3b75cf6ac562adca05?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-admission-controller\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-must-gather@sha256:1acef66db6179f4289fc4abbb297df32c01d3b13fd85530ac6a0d925b517c3df_amd64", "product": { "name": "openshift4/ose-must-gather@sha256:1acef66db6179f4289fc4abbb297df32c01d3b13fd85530ac6a0d925b517c3df_amd64", "product_id": "openshift4/ose-must-gather@sha256:1acef66db6179f4289fc4abbb297df32c01d3b13fd85530ac6a0d925b517c3df_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-must-gather@sha256:1acef66db6179f4289fc4abbb297df32c01d3b13fd85530ac6a0d925b517c3df?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-must-gather\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-openstack-machine-controllers@sha256:1779881159f1548a75e4dfd8a285e6ecab2ceede42acd9d07f036ec28bf1e6f9_amd64", "product": { "name": "openshift4/ose-openstack-machine-controllers@sha256:1779881159f1548a75e4dfd8a285e6ecab2ceede42acd9d07f036ec28bf1e6f9_amd64", "product_id": "openshift4/ose-openstack-machine-controllers@sha256:1779881159f1548a75e4dfd8a285e6ecab2ceede42acd9d07f036ec28bf1e6f9_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-openstack-machine-controllers@sha256:1779881159f1548a75e4dfd8a285e6ecab2ceede42acd9d07f036ec28bf1e6f9?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-machine-controllers\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-ovn-kubernetes@sha256:d4234553bb7e59323ee19b5d87d189f78fb4cd747551af6a6413b88001e27e13_amd64", "product": { "name": "openshift4/ose-ovn-kubernetes@sha256:d4234553bb7e59323ee19b5d87d189f78fb4cd747551af6a6413b88001e27e13_amd64", "product_id": "openshift4/ose-ovn-kubernetes@sha256:d4234553bb7e59323ee19b5d87d189f78fb4cd747551af6a6413b88001e27e13_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-ovn-kubernetes@sha256:d4234553bb7e59323ee19b5d87d189f78fb4cd747551af6a6413b88001e27e13?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ovn-kubernetes\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-k8s-prometheus-adapter@sha256:95e7924437a3d110b334b1b03c01e2a65292f092110acde1a59db280ce8c7bda_amd64", "product": { "name": "openshift4/ose-k8s-prometheus-adapter@sha256:95e7924437a3d110b334b1b03c01e2a65292f092110acde1a59db280ce8c7bda_amd64", "product_id": "openshift4/ose-k8s-prometheus-adapter@sha256:95e7924437a3d110b334b1b03c01e2a65292f092110acde1a59db280ce8c7bda_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-k8s-prometheus-adapter@sha256:95e7924437a3d110b334b1b03c01e2a65292f092110acde1a59db280ce8c7bda?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-k8s-prometheus-adapter\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-service-ca-operator@sha256:ba2867ef0021af24b6667d114983400a0f7f5824842f1e11d1cda5aa91286737_amd64", "product": { "name": "openshift4/ose-service-ca-operator@sha256:ba2867ef0021af24b6667d114983400a0f7f5824842f1e11d1cda5aa91286737_amd64", "product_id": "openshift4/ose-service-ca-operator@sha256:ba2867ef0021af24b6667d114983400a0f7f5824842f1e11d1cda5aa91286737_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-service-ca-operator@sha256:ba2867ef0021af24b6667d114983400a0f7f5824842f1e11d1cda5aa91286737?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-service-ca-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-prometheus-config-reloader@sha256:6c0551dd87cc7eacc18ccbac093043b1178225f64843f13435f02ae7c2b4d91e_amd64", "product": { "name": "openshift4/ose-prometheus-config-reloader@sha256:6c0551dd87cc7eacc18ccbac093043b1178225f64843f13435f02ae7c2b4d91e_amd64", "product_id": "openshift4/ose-prometheus-config-reloader@sha256:6c0551dd87cc7eacc18ccbac093043b1178225f64843f13435f02ae7c2b4d91e_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-prometheus-config-reloader@sha256:6c0551dd87cc7eacc18ccbac093043b1178225f64843f13435f02ae7c2b4d91e?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-config-reloader\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-prometheus-operator@sha256:a5f9da1798e6b598157343e8751eda45ead551ddfb34ac5e742c6b1d8c8bf0d4_amd64", "product": { "name": "openshift4/ose-prometheus-operator@sha256:a5f9da1798e6b598157343e8751eda45ead551ddfb34ac5e742c6b1d8c8bf0d4_amd64", "product_id": "openshift4/ose-prometheus-operator@sha256:a5f9da1798e6b598157343e8751eda45ead551ddfb34ac5e742c6b1d8c8bf0d4_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-prometheus-operator@sha256:a5f9da1798e6b598157343e8751eda45ead551ddfb34ac5e742c6b1d8c8bf0d4?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-prom-label-proxy@sha256:c77261cc981cc8a5193ca1199c0a119db5757de135f4f7f5e558744371d2bd8a_amd64", "product": { "name": "openshift4/ose-prom-label-proxy@sha256:c77261cc981cc8a5193ca1199c0a119db5757de135f4f7f5e558744371d2bd8a_amd64", "product_id": "openshift4/ose-prom-label-proxy@sha256:c77261cc981cc8a5193ca1199c0a119db5757de135f4f7f5e558744371d2bd8a_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-prom-label-proxy@sha256:c77261cc981cc8a5193ca1199c0a119db5757de135f4f7f5e558744371d2bd8a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prom-label-proxy\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-cni@sha256:7a129a17d719761425ce26a47eaa115789be893f4a1054e37f3c76f891157886_amd64", "product": { "name": "openshift4/ose-sriov-cni@sha256:7a129a17d719761425ce26a47eaa115789be893f4a1054e37f3c76f891157886_amd64", "product_id": "openshift4/ose-sriov-cni@sha256:7a129a17d719761425ce26a47eaa115789be893f4a1054e37f3c76f891157886_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-cni@sha256:7a129a17d719761425ce26a47eaa115789be893f4a1054e37f3c76f891157886?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-cni\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-dp-admission-controller@sha256:e98327978a09c28baa5f10365d2df1e2c33bb689644d581aa6f7ff095e0c1c5d_amd64", "product": { "name": "openshift4/ose-sriov-dp-admission-controller@sha256:e98327978a09c28baa5f10365d2df1e2c33bb689644d581aa6f7ff095e0c1c5d_amd64", "product_id": "openshift4/ose-sriov-dp-admission-controller@sha256:e98327978a09c28baa5f10365d2df1e2c33bb689644d581aa6f7ff095e0c1c5d_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-dp-admission-controller@sha256:e98327978a09c28baa5f10365d2df1e2c33bb689644d581aa6f7ff095e0c1c5d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-dp-admission-controller\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-device-plugin@sha256:4dc4017eee056448d0192834de329c6563c48f625f21ca9db59b22d54db70de8_amd64", "product": { "name": "openshift4/ose-sriov-network-device-plugin@sha256:4dc4017eee056448d0192834de329c6563c48f625f21ca9db59b22d54db70de8_amd64", "product_id": "openshift4/ose-sriov-network-device-plugin@sha256:4dc4017eee056448d0192834de329c6563c48f625f21ca9db59b22d54db70de8_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-device-plugin@sha256:4dc4017eee056448d0192834de329c6563c48f625f21ca9db59b22d54db70de8?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-device-plugin\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-telemeter@sha256:5abb2f8cd1758441ba75e07e0a2f1180dbda0f13e6b51993d7c945b3d91b3bef_amd64", "product": { "name": "openshift4/ose-telemeter@sha256:5abb2f8cd1758441ba75e07e0a2f1180dbda0f13e6b51993d7c945b3d91b3bef_amd64", "product_id": "openshift4/ose-telemeter@sha256:5abb2f8cd1758441ba75e07e0a2f1180dbda0f13e6b51993d7c945b3d91b3bef_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-telemeter@sha256:5abb2f8cd1758441ba75e07e0a2f1180dbda0f13e6b51993d7c945b3d91b3bef?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-telemeter\u0026tag=v4.1.14-201908291507" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift4/apb-base@sha256:183441575a8a0ba144fdd346e5ab560a067725a9b66d890493c326e14135512e_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/apb-base@sha256:183441575a8a0ba144fdd346e5ab560a067725a9b66d890493c326e14135512e_amd64" }, "product_reference": "openshift4/apb-base@sha256:183441575a8a0ba144fdd346e5ab560a067725a9b66d890493c326e14135512e_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/mariadb-apb@sha256:a446829513325ac146b2aa1b555347b57a2377712df6cd8a431c1dbec0614331_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/mariadb-apb@sha256:a446829513325ac146b2aa1b555347b57a2377712df6cd8a431c1dbec0614331_amd64" }, "product_reference": "openshift4/mariadb-apb@sha256:a446829513325ac146b2aa1b555347b57a2377712df6cd8a431c1dbec0614331_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/mediawiki-apb@sha256:0a1ab047c6a93e3531f20673b275854361f36e2ebd4894b5ad1705c3dde42a76_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/mediawiki-apb@sha256:0a1ab047c6a93e3531f20673b275854361f36e2ebd4894b5ad1705c3dde42a76_amd64" }, "product_reference": "openshift4/mediawiki-apb@sha256:0a1ab047c6a93e3531f20673b275854361f36e2ebd4894b5ad1705c3dde42a76_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/mediawiki@sha256:8014f0d73799f7f26b56a3d908b55de3103103f57a507d48fe9830c7d605f85d_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/mediawiki@sha256:8014f0d73799f7f26b56a3d908b55de3103103f57a507d48fe9830c7d605f85d_amd64" }, "product_reference": "openshift4/mediawiki@sha256:8014f0d73799f7f26b56a3d908b55de3103103f57a507d48fe9830c7d605f85d_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/mysql-apb@sha256:5772d2a584b96249c535df55b501ffe891162d7651b18244cdc16ab2f0d563dc_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/mysql-apb@sha256:5772d2a584b96249c535df55b501ffe891162d7651b18244cdc16ab2f0d563dc_amd64" }, "product_reference": "openshift4/mysql-apb@sha256:5772d2a584b96249c535df55b501ffe891162d7651b18244cdc16ab2f0d563dc_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ansible-operator@sha256:9469e5ed49937aeb64f0a3dbb5332f087c8498494127a5c507c02c3d4286afb1_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-ansible-operator@sha256:9469e5ed49937aeb64f0a3dbb5332f087c8498494127a5c507c02c3d4286afb1_amd64" }, "product_reference": "openshift4/ose-ansible-operator@sha256:9469e5ed49937aeb64f0a3dbb5332f087c8498494127a5c507c02c3d4286afb1_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-aws-machine-controllers@sha256:e5f585aa452461ee95d55e84d81be54a82a458a54dbcad1f68a8f28edeb7638b_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-aws-machine-controllers@sha256:e5f585aa452461ee95d55e84d81be54a82a458a54dbcad1f68a8f28edeb7638b_amd64" }, "product_reference": "openshift4/ose-aws-machine-controllers@sha256:e5f585aa452461ee95d55e84d81be54a82a458a54dbcad1f68a8f28edeb7638b_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-azure-machine-controllers@sha256:9f3199e5226fdcd5abe34a6f2e3a6ad7e7ad3f59edbff2bfd9b4c84566897eae_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-azure-machine-controllers@sha256:9f3199e5226fdcd5abe34a6f2e3a6ad7e7ad3f59edbff2bfd9b4c84566897eae_amd64" }, "product_reference": "openshift4/ose-azure-machine-controllers@sha256:9f3199e5226fdcd5abe34a6f2e3a6ad7e7ad3f59edbff2bfd9b4c84566897eae_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-baremetal-machine-controllers@sha256:d9ca5e81aa2fb401f9c5bfb63e85fc5d93ae1e657ab992e879a2b9d520f3fea3_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-baremetal-machine-controllers@sha256:d9ca5e81aa2fb401f9c5bfb63e85fc5d93ae1e657ab992e879a2b9d520f3fea3_amd64" }, "product_reference": "openshift4/ose-baremetal-machine-controllers@sha256:d9ca5e81aa2fb401f9c5bfb63e85fc5d93ae1e657ab992e879a2b9d520f3fea3_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cli-artifacts@sha256:bacaec21f6101ef686bb07b5d6e80b0b3ad06ab9a4d4f6e611ca3103c0030d7e_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cli-artifacts@sha256:bacaec21f6101ef686bb07b5d6e80b0b3ad06ab9a4d4f6e611ca3103c0030d7e_amd64" }, "product_reference": "openshift4/ose-cli-artifacts@sha256:bacaec21f6101ef686bb07b5d6e80b0b3ad06ab9a4d4f6e611ca3103c0030d7e_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cli@sha256:bb846647aa233adddf5ed39056fdf98a7d9dc3abef4c985df3de698a44ecc7fd_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cli@sha256:bb846647aa233adddf5ed39056fdf98a7d9dc3abef4c985df3de698a44ecc7fd_amd64" }, "product_reference": "openshift4/ose-cli@sha256:bb846647aa233adddf5ed39056fdf98a7d9dc3abef4c985df3de698a44ecc7fd_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cloud-credential-operator@sha256:27c7bac07c2a2a38ddb65a9997b22946fbe37ddd06ecf52eccd0ef9235ae47ba_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cloud-credential-operator@sha256:27c7bac07c2a2a38ddb65a9997b22946fbe37ddd06ecf52eccd0ef9235ae47ba_amd64" }, "product_reference": "openshift4/ose-cloud-credential-operator@sha256:27c7bac07c2a2a38ddb65a9997b22946fbe37ddd06ecf52eccd0ef9235ae47ba_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-authentication-operator@sha256:67dc9d9d90e5b37c73eda524a13e0bd98834b225adbfccc9d6c09a35a130c8f4_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-authentication-operator@sha256:67dc9d9d90e5b37c73eda524a13e0bd98834b225adbfccc9d6c09a35a130c8f4_amd64" }, "product_reference": "openshift4/ose-cluster-authentication-operator@sha256:67dc9d9d90e5b37c73eda524a13e0bd98834b225adbfccc9d6c09a35a130c8f4_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-autoscaler-operator@sha256:989948cb9998b518f3c325a2af3b24cfb7033ad2ac8be96cb3fafce2b4077435_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-autoscaler-operator@sha256:989948cb9998b518f3c325a2af3b24cfb7033ad2ac8be96cb3fafce2b4077435_amd64" }, "product_reference": "openshift4/ose-cluster-autoscaler-operator@sha256:989948cb9998b518f3c325a2af3b24cfb7033ad2ac8be96cb3fafce2b4077435_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-autoscaler@sha256:b995c30d43493a8d393282c760584605951048dbe395eeac6b6b1bec269ff3ad_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-autoscaler@sha256:b995c30d43493a8d393282c760584605951048dbe395eeac6b6b1bec269ff3ad_amd64" }, "product_reference": "openshift4/ose-cluster-autoscaler@sha256:b995c30d43493a8d393282c760584605951048dbe395eeac6b6b1bec269ff3ad_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-bootstrap@sha256:9a676b7e363f022a511ab07ae81242b5c6d03523db11c37b0bf47e0f0324c9d8_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-bootstrap@sha256:9a676b7e363f022a511ab07ae81242b5c6d03523db11c37b0bf47e0f0324c9d8_amd64" }, "product_reference": "openshift4/ose-cluster-bootstrap@sha256:9a676b7e363f022a511ab07ae81242b5c6d03523db11c37b0bf47e0f0324c9d8_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-capacity@sha256:24db95a9d24960c14775136419eed7dfddb7b7d70577fab77a63b64fc66d53a7_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-capacity@sha256:24db95a9d24960c14775136419eed7dfddb7b7d70577fab77a63b64fc66d53a7_amd64" }, "product_reference": "openshift4/ose-cluster-capacity@sha256:24db95a9d24960c14775136419eed7dfddb7b7d70577fab77a63b64fc66d53a7_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-config-operator@sha256:3b210b7313b4853f777d19248ba746b3d29251a3409124f984ae212809930427_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-config-operator@sha256:3b210b7313b4853f777d19248ba746b3d29251a3409124f984ae212809930427_amd64" }, "product_reference": "openshift4/ose-cluster-config-operator@sha256:3b210b7313b4853f777d19248ba746b3d29251a3409124f984ae212809930427_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-dns-operator@sha256:5f70ba7ebcee1ecb9f65c8b43280935866607fc3dee6329ed473169f2acebe05_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-dns-operator@sha256:5f70ba7ebcee1ecb9f65c8b43280935866607fc3dee6329ed473169f2acebe05_amd64" }, "product_reference": "openshift4/ose-cluster-dns-operator@sha256:5f70ba7ebcee1ecb9f65c8b43280935866607fc3dee6329ed473169f2acebe05_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-image-registry-operator@sha256:5c8fa5eb3828277f31ca0d4f7aedfee8e66dc0cfa3542772e6ac13c6b131644d_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-image-registry-operator@sha256:5c8fa5eb3828277f31ca0d4f7aedfee8e66dc0cfa3542772e6ac13c6b131644d_amd64" }, "product_reference": "openshift4/ose-cluster-image-registry-operator@sha256:5c8fa5eb3828277f31ca0d4f7aedfee8e66dc0cfa3542772e6ac13c6b131644d_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-ingress-operator@sha256:b33e32eaac7d15947e32cbeb9d45e9ae3e6fbe470611ab78f28cfc99d8759b68_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-ingress-operator@sha256:b33e32eaac7d15947e32cbeb9d45e9ae3e6fbe470611ab78f28cfc99d8759b68_amd64" }, "product_reference": "openshift4/ose-cluster-ingress-operator@sha256:b33e32eaac7d15947e32cbeb9d45e9ae3e6fbe470611ab78f28cfc99d8759b68_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:af88e84a2957ba9eeb1e5e3cdf9cf559ccb0de08d7a16c58a19c8eb805ba5a39_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-apiserver-operator@sha256:af88e84a2957ba9eeb1e5e3cdf9cf559ccb0de08d7a16c58a19c8eb805ba5a39_amd64" }, "product_reference": "openshift4/ose-cluster-kube-apiserver-operator@sha256:af88e84a2957ba9eeb1e5e3cdf9cf559ccb0de08d7a16c58a19c8eb805ba5a39_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:ca1e29c0c4eb029ed4d5544d5fde000000aa007f1d8e0fcf0fc0d317b5e06784_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-controller-manager-operator@sha256:ca1e29c0c4eb029ed4d5544d5fde000000aa007f1d8e0fcf0fc0d317b5e06784_amd64" }, "product_reference": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:ca1e29c0c4eb029ed4d5544d5fde000000aa007f1d8e0fcf0fc0d317b5e06784_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:6f30eebebe4b774acd19eadeae80c4a7c8ccb503389c354bc76fc0f778cefe2b_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-scheduler-operator@sha256:6f30eebebe4b774acd19eadeae80c4a7c8ccb503389c354bc76fc0f778cefe2b_amd64" }, "product_reference": "openshift4/ose-cluster-kube-scheduler-operator@sha256:6f30eebebe4b774acd19eadeae80c4a7c8ccb503389c354bc76fc0f778cefe2b_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-logging-operator@sha256:7926e2be0854ff3edac0ced6950a0be04ad26d46a5da638611457c3fe0f1a19a_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-logging-operator@sha256:7926e2be0854ff3edac0ced6950a0be04ad26d46a5da638611457c3fe0f1a19a_amd64" }, "product_reference": "openshift4/ose-cluster-logging-operator@sha256:7926e2be0854ff3edac0ced6950a0be04ad26d46a5da638611457c3fe0f1a19a_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-machine-approver@sha256:3535b9ccd701ac3fa6b6a8339f6c10d6e74dd4d8f5f810690fa7e272ee82f837_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-machine-approver@sha256:3535b9ccd701ac3fa6b6a8339f6c10d6e74dd4d8f5f810690fa7e272ee82f837_amd64" }, "product_reference": "openshift4/ose-cluster-machine-approver@sha256:3535b9ccd701ac3fa6b6a8339f6c10d6e74dd4d8f5f810690fa7e272ee82f837_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-monitoring-operator@sha256:05d69056c09c34d095ccedc757ecf2692690c72d2bee4e6b6afc58b01ec55d9c_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-monitoring-operator@sha256:05d69056c09c34d095ccedc757ecf2692690c72d2bee4e6b6afc58b01ec55d9c_amd64" }, "product_reference": "openshift4/ose-cluster-monitoring-operator@sha256:05d69056c09c34d095ccedc757ecf2692690c72d2bee4e6b6afc58b01ec55d9c_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-network-operator@sha256:2561079cceff11035c216fea71c0a10622696266aa5a9323ef13806c91537a68_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-network-operator@sha256:2561079cceff11035c216fea71c0a10622696266aa5a9323ef13806c91537a68_amd64" }, "product_reference": "openshift4/ose-cluster-network-operator@sha256:2561079cceff11035c216fea71c0a10622696266aa5a9323ef13806c91537a68_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-node-tuning-operator@sha256:b6fa66947d674eb2fc12b38fb9355c43c57a484d85e56dd013960a760046b793_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-node-tuning-operator@sha256:b6fa66947d674eb2fc12b38fb9355c43c57a484d85e56dd013960a760046b793_amd64" }, "product_reference": "openshift4/ose-cluster-node-tuning-operator@sha256:b6fa66947d674eb2fc12b38fb9355c43c57a484d85e56dd013960a760046b793_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:1291555580ce58d7855c7b93ace6826cd2b1a22499fc5df3aad7d36a30b880ee_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-openshift-apiserver-operator@sha256:1291555580ce58d7855c7b93ace6826cd2b1a22499fc5df3aad7d36a30b880ee_amd64" }, "product_reference": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:1291555580ce58d7855c7b93ace6826cd2b1a22499fc5df3aad7d36a30b880ee_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:3bdcfac3e9dcd30754f1e4158706bbcef77449fc3893521c86fd793cc1f7f32a_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:3bdcfac3e9dcd30754f1e4158706bbcef77449fc3893521c86fd793cc1f7f32a_amd64" }, "product_reference": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:3bdcfac3e9dcd30754f1e4158706bbcef77449fc3893521c86fd793cc1f7f32a_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-samples-operator@sha256:79ba26ee177bc7cd2ab89ddaa6c66b5dcfc6970dc457cc737d64b18b5d378637_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-samples-operator@sha256:79ba26ee177bc7cd2ab89ddaa6c66b5dcfc6970dc457cc737d64b18b5d378637_amd64" }, "product_reference": "openshift4/ose-cluster-samples-operator@sha256:79ba26ee177bc7cd2ab89ddaa6c66b5dcfc6970dc457cc737d64b18b5d378637_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-storage-operator@sha256:95ad59eb2e2cc58f7ae6b850f648259687f266f05ac91166a39da6bf441e3e86_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-storage-operator@sha256:95ad59eb2e2cc58f7ae6b850f648259687f266f05ac91166a39da6bf441e3e86_amd64" }, "product_reference": "openshift4/ose-cluster-storage-operator@sha256:95ad59eb2e2cc58f7ae6b850f648259687f266f05ac91166a39da6bf441e3e86_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-update-keys@sha256:f919d82bd99ecd768271c8ef7ad6bf6d2b5cb902410b93bbafc829c58b59a48f_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-update-keys@sha256:f919d82bd99ecd768271c8ef7ad6bf6d2b5cb902410b93bbafc829c58b59a48f_amd64" }, "product_reference": "openshift4/ose-cluster-update-keys@sha256:f919d82bd99ecd768271c8ef7ad6bf6d2b5cb902410b93bbafc829c58b59a48f_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-version-operator@sha256:2d99cc15d95e08541d60ebc1966b534fda48d00ee69c7c226996ac407a813d6b_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-version-operator@sha256:2d99cc15d95e08541d60ebc1966b534fda48d00ee69c7c226996ac407a813d6b_amd64" }, "product_reference": "openshift4/ose-cluster-version-operator@sha256:2d99cc15d95e08541d60ebc1966b534fda48d00ee69c7c226996ac407a813d6b_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-configmap-reloader@sha256:84bb7a8504eb34ff5e4e9ca92aab960c078ededed07ab0fe79620c0b9f32a51f_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-configmap-reloader@sha256:84bb7a8504eb34ff5e4e9ca92aab960c078ededed07ab0fe79620c0b9f32a51f_amd64" }, "product_reference": "openshift4/ose-configmap-reloader@sha256:84bb7a8504eb34ff5e4e9ca92aab960c078ededed07ab0fe79620c0b9f32a51f_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-console-operator@sha256:665d6d89d83c51de08526c08365317b3dbb9f20e1528ffb35697f6c8bd409ca3_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-console-operator@sha256:665d6d89d83c51de08526c08365317b3dbb9f20e1528ffb35697f6c8bd409ca3_amd64" }, "product_reference": "openshift4/ose-console-operator@sha256:665d6d89d83c51de08526c08365317b3dbb9f20e1528ffb35697f6c8bd409ca3_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-console@sha256:68c4a7514623c31f7fdf7058a0dcd968dc4e4a63bcf0236ff21333bfb27cc4aa_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-console@sha256:68c4a7514623c31f7fdf7058a0dcd968dc4e4a63bcf0236ff21333bfb27cc4aa_amd64" }, "product_reference": "openshift4/ose-console@sha256:68c4a7514623c31f7fdf7058a0dcd968dc4e4a63bcf0236ff21333bfb27cc4aa_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-coredns@sha256:9a330c9540816c13ddbbc93e99107f3d2a194c79eae20d81e8b8d252e9282c14_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-coredns@sha256:9a330c9540816c13ddbbc93e99107f3d2a194c79eae20d81e8b8d252e9282c14_amd64" }, "product_reference": "openshift4/ose-coredns@sha256:9a330c9540816c13ddbbc93e99107f3d2a194c79eae20d81e8b8d252e9282c14_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-deployer@sha256:ab62d8277ea2e69cf6697343c4b6bfef67f04c5f31cdf47fc510cb76969ca2ca_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-deployer@sha256:ab62d8277ea2e69cf6697343c4b6bfef67f04c5f31cdf47fc510cb76969ca2ca_amd64" }, "product_reference": "openshift4/ose-deployer@sha256:ab62d8277ea2e69cf6697343c4b6bfef67f04c5f31cdf47fc510cb76969ca2ca_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-descheduler-operator@sha256:71ba5a71c71074c282634a6261825c57977abd4999cc03957b8c407808a72902_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-descheduler-operator@sha256:71ba5a71c71074c282634a6261825c57977abd4999cc03957b8c407808a72902_amd64" }, "product_reference": "openshift4/ose-descheduler-operator@sha256:71ba5a71c71074c282634a6261825c57977abd4999cc03957b8c407808a72902_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-descheduler@sha256:f7527c56780840d4062768e88f098229effd9796639ad67f6cdf841941a7e4a1_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-descheduler@sha256:f7527c56780840d4062768e88f098229effd9796639ad67f6cdf841941a7e4a1_amd64" }, "product_reference": "openshift4/ose-descheduler@sha256:f7527c56780840d4062768e88f098229effd9796639ad67f6cdf841941a7e4a1_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-docker-builder@sha256:25b131fc577def1179ce8a2022211d366fa461b6afef2f566b3f177930a3d0db_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-docker-builder@sha256:25b131fc577def1179ce8a2022211d366fa461b6afef2f566b3f177930a3d0db_amd64" }, "product_reference": "openshift4/ose-docker-builder@sha256:25b131fc577def1179ce8a2022211d366fa461b6afef2f566b3f177930a3d0db_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-docker-registry@sha256:f7bd292dde7bd96195b313b4c459980fe8541bd89c442a4065a0114f42f3fe46_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-docker-registry@sha256:f7bd292dde7bd96195b313b4c459980fe8541bd89c442a4065a0114f42f3fe46_amd64" }, "product_reference": "openshift4/ose-docker-registry@sha256:f7bd292dde7bd96195b313b4c459980fe8541bd89c442a4065a0114f42f3fe46_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-egress-dns-proxy@sha256:2c00e51829c679d3573f813b0eced5c16382966ecf609915b47a8472872bbb64_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-dns-proxy@sha256:2c00e51829c679d3573f813b0eced5c16382966ecf609915b47a8472872bbb64_amd64" }, "product_reference": "openshift4/ose-egress-dns-proxy@sha256:2c00e51829c679d3573f813b0eced5c16382966ecf609915b47a8472872bbb64_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-egress-http-proxy@sha256:77ffd3c6dbb51743a13ce6a9cbd385602c24165848c205aca864b88af5b3c503_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-http-proxy@sha256:77ffd3c6dbb51743a13ce6a9cbd385602c24165848c205aca864b88af5b3c503_amd64" }, "product_reference": "openshift4/ose-egress-http-proxy@sha256:77ffd3c6dbb51743a13ce6a9cbd385602c24165848c205aca864b88af5b3c503_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-egress-router@sha256:c46ed6f837821decadaaf07266b9d67f89b98621618bc073abdc38db51bc692a_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-router@sha256:c46ed6f837821decadaaf07266b9d67f89b98621618bc073abdc38db51bc692a_amd64" }, "product_reference": "openshift4/ose-egress-router@sha256:c46ed6f837821decadaaf07266b9d67f89b98621618bc073abdc38db51bc692a_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-elasticsearch-operator@sha256:6b153238aa96aa4128de68a8df8dde185ebb930d2cee6fe1c033ff7b713fb6f9_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-elasticsearch-operator@sha256:6b153238aa96aa4128de68a8df8dde185ebb930d2cee6fe1c033ff7b713fb6f9_amd64" }, "product_reference": "openshift4/ose-elasticsearch-operator@sha256:6b153238aa96aa4128de68a8df8dde185ebb930d2cee6fe1c033ff7b713fb6f9_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-etcd@sha256:3df453713db7ea9a1bd8556a0a986fcd8d8c0a4649c262b9d8652ccfe648bb1e_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-etcd@sha256:3df453713db7ea9a1bd8556a0a986fcd8d8c0a4649c262b9d8652ccfe648bb1e_amd64" }, "product_reference": "openshift4/ose-etcd@sha256:3df453713db7ea9a1bd8556a0a986fcd8d8c0a4649c262b9d8652ccfe648bb1e_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-grafana@sha256:4304ba0edd79f4b2b7b6f4766dd696e8fb21423ff0dc50a18388e2163d9df3de_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-grafana@sha256:4304ba0edd79f4b2b7b6f4766dd696e8fb21423ff0dc50a18388e2163d9df3de_amd64" }, "product_reference": "openshift4/ose-grafana@sha256:4304ba0edd79f4b2b7b6f4766dd696e8fb21423ff0dc50a18388e2163d9df3de_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-haproxy-router@sha256:e0c7adba792e43e96c8d6f4e0845e2d001d0f652ece6f567b09ac481b07eafdc_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-haproxy-router@sha256:e0c7adba792e43e96c8d6f4e0845e2d001d0f652ece6f567b09ac481b07eafdc_amd64" }, "product_reference": "openshift4/ose-haproxy-router@sha256:e0c7adba792e43e96c8d6f4e0845e2d001d0f652ece6f567b09ac481b07eafdc_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-hyperkube@sha256:150fe3e51c75f09bd366d06a96749e17cd01aa845319032c327387950b52a34e_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-hyperkube@sha256:150fe3e51c75f09bd366d06a96749e17cd01aa845319032c327387950b52a34e_amd64" }, "product_reference": "openshift4/ose-hyperkube@sha256:150fe3e51c75f09bd366d06a96749e17cd01aa845319032c327387950b52a34e_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-hypershift@sha256:48392b80092bca63f2969b14412017601ebfda1b54141db53c2bc5b2317c389a_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-hypershift@sha256:48392b80092bca63f2969b14412017601ebfda1b54141db53c2bc5b2317c389a_amd64" }, "product_reference": "openshift4/ose-hypershift@sha256:48392b80092bca63f2969b14412017601ebfda1b54141db53c2bc5b2317c389a_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-installer-artifacts@sha256:7f3e05fa013dead5501513b86c19719973d0f9ee5dbdd4d3f5264fe601dbf809_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-installer-artifacts@sha256:7f3e05fa013dead5501513b86c19719973d0f9ee5dbdd4d3f5264fe601dbf809_amd64" }, "product_reference": "openshift4/ose-installer-artifacts@sha256:7f3e05fa013dead5501513b86c19719973d0f9ee5dbdd4d3f5264fe601dbf809_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-installer@sha256:7f0fb099018d7fba695adfff2c6cec1af789e3c3ccab61bb084a30ae1bdff79f_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-installer@sha256:7f0fb099018d7fba695adfff2c6cec1af789e3c3ccab61bb084a30ae1bdff79f_amd64" }, "product_reference": "openshift4/ose-installer@sha256:7f0fb099018d7fba695adfff2c6cec1af789e3c3ccab61bb084a30ae1bdff79f_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins-agent-base@sha256:c29122b0ed52c031f5f99ddb3338b6515bc05ac1e90864dda1131dcf9af87924_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins-agent-base@sha256:c29122b0ed52c031f5f99ddb3338b6515bc05ac1e90864dda1131dcf9af87924_amd64" }, "product_reference": "openshift4/ose-jenkins-agent-base@sha256:c29122b0ed52c031f5f99ddb3338b6515bc05ac1e90864dda1131dcf9af87924_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins-agent-maven@sha256:ce5dd50d7005ed2d5ef36de673a2cf2cec07ad997ed93956605fe8fc8836d15c_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins-agent-maven@sha256:ce5dd50d7005ed2d5ef36de673a2cf2cec07ad997ed93956605fe8fc8836d15c_amd64" }, "product_reference": "openshift4/ose-jenkins-agent-maven@sha256:ce5dd50d7005ed2d5ef36de673a2cf2cec07ad997ed93956605fe8fc8836d15c_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins@sha256:8da877d1df3fbb0fd4df607718847382d3ab38b862f868077c8938a1a7014f71_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins@sha256:8da877d1df3fbb0fd4df607718847382d3ab38b862f868077c8938a1a7014f71_amd64" }, "product_reference": "openshift4/ose-jenkins@sha256:8da877d1df3fbb0fd4df607718847382d3ab38b862f868077c8938a1a7014f71_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-k8s-prometheus-adapter@sha256:95e7924437a3d110b334b1b03c01e2a65292f092110acde1a59db280ce8c7bda_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-k8s-prometheus-adapter@sha256:95e7924437a3d110b334b1b03c01e2a65292f092110acde1a59db280ce8c7bda_amd64" }, "product_reference": "openshift4/ose-k8s-prometheus-adapter@sha256:95e7924437a3d110b334b1b03c01e2a65292f092110acde1a59db280ce8c7bda_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-keepalived-ipfailover@sha256:1c0b3bde2963560aa0c50bd8365abd39bc5cfae28409fbdc60abf786546eb2e8_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-keepalived-ipfailover@sha256:1c0b3bde2963560aa0c50bd8365abd39bc5cfae28409fbdc60abf786546eb2e8_amd64" }, "product_reference": "openshift4/ose-keepalived-ipfailover@sha256:1c0b3bde2963560aa0c50bd8365abd39bc5cfae28409fbdc60abf786546eb2e8_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kube-proxy@sha256:3afce3e28952226f1bb959b2859050e848ed5d4549ac5e2fc267f51b11fc6ec3_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-proxy@sha256:3afce3e28952226f1bb959b2859050e848ed5d4549ac5e2fc267f51b11fc6ec3_amd64" }, "product_reference": "openshift4/ose-kube-proxy@sha256:3afce3e28952226f1bb959b2859050e848ed5d4549ac5e2fc267f51b11fc6ec3_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kube-rbac-proxy@sha256:dab4af2713fa59499ee8d2cb169d636ddb425590e6924bc2c03597c0b10bd246_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-rbac-proxy@sha256:dab4af2713fa59499ee8d2cb169d636ddb425590e6924bc2c03597c0b10bd246_amd64" }, "product_reference": "openshift4/ose-kube-rbac-proxy@sha256:dab4af2713fa59499ee8d2cb169d636ddb425590e6924bc2c03597c0b10bd246_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kube-state-metrics@sha256:4ff6cd48b319093041c2fa9c32ce16c6ea4dffb1c66ef4923f9cfc108cdfe6cc_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-state-metrics@sha256:4ff6cd48b319093041c2fa9c32ce16c6ea4dffb1c66ef4923f9cfc108cdfe6cc_amd64" }, "product_reference": "openshift4/ose-kube-state-metrics@sha256:4ff6cd48b319093041c2fa9c32ce16c6ea4dffb1c66ef4923f9cfc108cdfe6cc_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-libvirt-machine-controllers@sha256:2446ea720c26b213b9419bd2ad867c0ca1ec6df6d972cd5ffd6037b8fe0fbc88_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-libvirt-machine-controllers@sha256:2446ea720c26b213b9419bd2ad867c0ca1ec6df6d972cd5ffd6037b8fe0fbc88_amd64" }, "product_reference": "openshift4/ose-libvirt-machine-controllers@sha256:2446ea720c26b213b9419bd2ad867c0ca1ec6df6d972cd5ffd6037b8fe0fbc88_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-logging-curator5@sha256:91942a469532fda2a4609f2d7ddf693cca5b2ccd8c770d0e36823f0cc67d884c_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-curator5@sha256:91942a469532fda2a4609f2d7ddf693cca5b2ccd8c770d0e36823f0cc67d884c_amd64" }, "product_reference": "openshift4/ose-logging-curator5@sha256:91942a469532fda2a4609f2d7ddf693cca5b2ccd8c770d0e36823f0cc67d884c_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-logging-elasticsearch5@sha256:c4693439c2f0f114238cc4034bfc6cd17f93bb9562ac2c0f9feb30f9c657fcd7_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-elasticsearch5@sha256:c4693439c2f0f114238cc4034bfc6cd17f93bb9562ac2c0f9feb30f9c657fcd7_amd64" }, "product_reference": "openshift4/ose-logging-elasticsearch5@sha256:c4693439c2f0f114238cc4034bfc6cd17f93bb9562ac2c0f9feb30f9c657fcd7_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-logging-eventrouter@sha256:7668a706700163a35def516d1e1be336fef418ea477ef014ba90f5317569384b_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-eventrouter@sha256:7668a706700163a35def516d1e1be336fef418ea477ef014ba90f5317569384b_amd64" }, "product_reference": "openshift4/ose-logging-eventrouter@sha256:7668a706700163a35def516d1e1be336fef418ea477ef014ba90f5317569384b_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-logging-fluentd@sha256:3ef99bc79d891b111828c6c29faa8f3cd37d8ab8897186eff2bc85824939f632_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-fluentd@sha256:3ef99bc79d891b111828c6c29faa8f3cd37d8ab8897186eff2bc85824939f632_amd64" }, "product_reference": "openshift4/ose-logging-fluentd@sha256:3ef99bc79d891b111828c6c29faa8f3cd37d8ab8897186eff2bc85824939f632_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-machine-api-operator@sha256:6dfe7c13a6ae6c6e509f0d8cd0cb6e5284f9efd8cc2c949d87a471643e730957_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-machine-api-operator@sha256:6dfe7c13a6ae6c6e509f0d8cd0cb6e5284f9efd8cc2c949d87a471643e730957_amd64" }, "product_reference": "openshift4/ose-machine-api-operator@sha256:6dfe7c13a6ae6c6e509f0d8cd0cb6e5284f9efd8cc2c949d87a471643e730957_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-machine-config-operator@sha256:ebffd73f3e4ff92792bad0cfa5bba5bec17e2124c7618ae7c4bd49ac777b7deb_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-machine-config-operator@sha256:ebffd73f3e4ff92792bad0cfa5bba5bec17e2124c7618ae7c4bd49ac777b7deb_amd64" }, "product_reference": "openshift4/ose-machine-config-operator@sha256:ebffd73f3e4ff92792bad0cfa5bba5bec17e2124c7618ae7c4bd49ac777b7deb_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-admission-controller@sha256:101d1c2eeebf1c5e336238056ff9415de50855363eebce3b75cf6ac562adca05_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-admission-controller@sha256:101d1c2eeebf1c5e336238056ff9415de50855363eebce3b75cf6ac562adca05_amd64" }, "product_reference": "openshift4/ose-multus-admission-controller@sha256:101d1c2eeebf1c5e336238056ff9415de50855363eebce3b75cf6ac562adca05_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-cni@sha256:9be2123934d7f80af6439a84b5a9887459c1655549c7790fd080e965e89049b4_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-cni@sha256:9be2123934d7f80af6439a84b5a9887459c1655549c7790fd080e965e89049b4_amd64" }, "product_reference": "openshift4/ose-multus-cni@sha256:9be2123934d7f80af6439a84b5a9887459c1655549c7790fd080e965e89049b4_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-must-gather@sha256:1acef66db6179f4289fc4abbb297df32c01d3b13fd85530ac6a0d925b517c3df_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-must-gather@sha256:1acef66db6179f4289fc4abbb297df32c01d3b13fd85530ac6a0d925b517c3df_amd64" }, "product_reference": "openshift4/ose-must-gather@sha256:1acef66db6179f4289fc4abbb297df32c01d3b13fd85530ac6a0d925b517c3df_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-oauth-proxy@sha256:383360705efc0605760c3b2b1d0fa288094eb6dad8158c540d950f661b4ba880_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-oauth-proxy@sha256:383360705efc0605760c3b2b1d0fa288094eb6dad8158c540d950f661b4ba880_amd64" }, "product_reference": "openshift4/ose-oauth-proxy@sha256:383360705efc0605760c3b2b1d0fa288094eb6dad8158c540d950f661b4ba880_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openstack-machine-controllers@sha256:1779881159f1548a75e4dfd8a285e6ecab2ceede42acd9d07f036ec28bf1e6f9_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-openstack-machine-controllers@sha256:1779881159f1548a75e4dfd8a285e6ecab2ceede42acd9d07f036ec28bf1e6f9_amd64" }, "product_reference": "openshift4/ose-openstack-machine-controllers@sha256:1779881159f1548a75e4dfd8a285e6ecab2ceede42acd9d07f036ec28bf1e6f9_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-lifecycle-manager@sha256:9254b8d3097a0d067f07bcf735b3530eccc888466f99a6282aebb7bbdd9cbcc8_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-lifecycle-manager@sha256:9254b8d3097a0d067f07bcf735b3530eccc888466f99a6282aebb7bbdd9cbcc8_amd64" }, "product_reference": "openshift4/ose-operator-lifecycle-manager@sha256:9254b8d3097a0d067f07bcf735b3530eccc888466f99a6282aebb7bbdd9cbcc8_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-marketplace@sha256:3c5b9b86c9a9cd3c11290a44e29f016fe054b7068dd5b8469956909a63813db8_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-marketplace@sha256:3c5b9b86c9a9cd3c11290a44e29f016fe054b7068dd5b8469956909a63813db8_amd64" }, "product_reference": "openshift4/ose-operator-marketplace@sha256:3c5b9b86c9a9cd3c11290a44e29f016fe054b7068dd5b8469956909a63813db8_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-registry@sha256:5eecc9d91c1ae4f0af586aa7d97fce8a32f23dfcdd64dcc61b9c536fbf4e8663_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-registry@sha256:5eecc9d91c1ae4f0af586aa7d97fce8a32f23dfcdd64dcc61b9c536fbf4e8663_amd64" }, "product_reference": "openshift4/ose-operator-registry@sha256:5eecc9d91c1ae4f0af586aa7d97fce8a32f23dfcdd64dcc61b9c536fbf4e8663_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ovn-kubernetes@sha256:d4234553bb7e59323ee19b5d87d189f78fb4cd747551af6a6413b88001e27e13_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-ovn-kubernetes@sha256:d4234553bb7e59323ee19b5d87d189f78fb4cd747551af6a6413b88001e27e13_amd64" }, "product_reference": "openshift4/ose-ovn-kubernetes@sha256:d4234553bb7e59323ee19b5d87d189f78fb4cd747551af6a6413b88001e27e13_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-pod@sha256:40b2f3ff0b5ff873669613882579b2a714aed77e1fea4e28a26ebf2726177707_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-pod@sha256:40b2f3ff0b5ff873669613882579b2a714aed77e1fea4e28a26ebf2726177707_amd64" }, "product_reference": "openshift4/ose-pod@sha256:40b2f3ff0b5ff873669613882579b2a714aed77e1fea4e28a26ebf2726177707_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prom-label-proxy@sha256:c77261cc981cc8a5193ca1199c0a119db5757de135f4f7f5e558744371d2bd8a_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-prom-label-proxy@sha256:c77261cc981cc8a5193ca1199c0a119db5757de135f4f7f5e558744371d2bd8a_amd64" }, "product_reference": "openshift4/ose-prom-label-proxy@sha256:c77261cc981cc8a5193ca1199c0a119db5757de135f4f7f5e558744371d2bd8a_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus-alertmanager@sha256:ef6c822baa9167856e613e7f1c14a1b44da42a394d91b9e0407d01d769a8fb40_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-alertmanager@sha256:ef6c822baa9167856e613e7f1c14a1b44da42a394d91b9e0407d01d769a8fb40_amd64" }, "product_reference": "openshift4/ose-prometheus-alertmanager@sha256:ef6c822baa9167856e613e7f1c14a1b44da42a394d91b9e0407d01d769a8fb40_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus-config-reloader@sha256:6c0551dd87cc7eacc18ccbac093043b1178225f64843f13435f02ae7c2b4d91e_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-config-reloader@sha256:6c0551dd87cc7eacc18ccbac093043b1178225f64843f13435f02ae7c2b4d91e_amd64" }, "product_reference": "openshift4/ose-prometheus-config-reloader@sha256:6c0551dd87cc7eacc18ccbac093043b1178225f64843f13435f02ae7c2b4d91e_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus-node-exporter@sha256:56c31eb82f202b0ab38bc600ef01ef68302a0a57b7274c9537d3518855e2da1d_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-node-exporter@sha256:56c31eb82f202b0ab38bc600ef01ef68302a0a57b7274c9537d3518855e2da1d_amd64" }, "product_reference": "openshift4/ose-prometheus-node-exporter@sha256:56c31eb82f202b0ab38bc600ef01ef68302a0a57b7274c9537d3518855e2da1d_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus-operator@sha256:a5f9da1798e6b598157343e8751eda45ead551ddfb34ac5e742c6b1d8c8bf0d4_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-operator@sha256:a5f9da1798e6b598157343e8751eda45ead551ddfb34ac5e742c6b1d8c8bf0d4_amd64" }, "product_reference": "openshift4/ose-prometheus-operator@sha256:a5f9da1798e6b598157343e8751eda45ead551ddfb34ac5e742c6b1d8c8bf0d4_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus@sha256:38e663d919d2c96af52656b42d18556cf457b84ef3160e27496f6db36ffa92a3_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus@sha256:38e663d919d2c96af52656b42d18556cf457b84ef3160e27496f6db36ffa92a3_amd64" }, "product_reference": "openshift4/ose-prometheus@sha256:38e663d919d2c96af52656b42d18556cf457b84ef3160e27496f6db36ffa92a3_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-service-ca-operator@sha256:ba2867ef0021af24b6667d114983400a0f7f5824842f1e11d1cda5aa91286737_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-service-ca-operator@sha256:ba2867ef0021af24b6667d114983400a0f7f5824842f1e11d1cda5aa91286737_amd64" }, "product_reference": "openshift4/ose-service-ca-operator@sha256:ba2867ef0021af24b6667d114983400a0f7f5824842f1e11d1cda5aa91286737_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-cni@sha256:7a129a17d719761425ce26a47eaa115789be893f4a1054e37f3c76f891157886_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-cni@sha256:7a129a17d719761425ce26a47eaa115789be893f4a1054e37f3c76f891157886_amd64" }, "product_reference": "openshift4/ose-sriov-cni@sha256:7a129a17d719761425ce26a47eaa115789be893f4a1054e37f3c76f891157886_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-dp-admission-controller@sha256:e98327978a09c28baa5f10365d2df1e2c33bb689644d581aa6f7ff095e0c1c5d_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-dp-admission-controller@sha256:e98327978a09c28baa5f10365d2df1e2c33bb689644d581aa6f7ff095e0c1c5d_amd64" }, "product_reference": "openshift4/ose-sriov-dp-admission-controller@sha256:e98327978a09c28baa5f10365d2df1e2c33bb689644d581aa6f7ff095e0c1c5d_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-device-plugin@sha256:4dc4017eee056448d0192834de329c6563c48f625f21ca9db59b22d54db70de8_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-network-device-plugin@sha256:4dc4017eee056448d0192834de329c6563c48f625f21ca9db59b22d54db70de8_amd64" }, "product_reference": "openshift4/ose-sriov-network-device-plugin@sha256:4dc4017eee056448d0192834de329c6563c48f625f21ca9db59b22d54db70de8_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-telemeter@sha256:5abb2f8cd1758441ba75e07e0a2f1180dbda0f13e6b51993d7c945b3d91b3bef_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-telemeter@sha256:5abb2f8cd1758441ba75e07e0a2f1180dbda0f13e6b51993d7c945b3d91b3bef_amd64" }, "product_reference": "openshift4/ose-telemeter@sha256:5abb2f8cd1758441ba75e07e0a2f1180dbda0f13e6b51993d7c945b3d91b3bef_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-tests@sha256:28866a167dd7df474b053e92de3ba9bc0d95d918180b1e676637df30c2a27ef4_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-tests@sha256:28866a167dd7df474b053e92de3ba9bc0d95d918180b1e676637df30c2a27ef4_amd64" }, "product_reference": "openshift4/ose-tests@sha256:28866a167dd7df474b053e92de3ba9bc0d95d918180b1e676637df30c2a27ef4_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/postgres-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/postgres-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64" }, "product_reference": "openshift4/postgres-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/postgresql-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/postgresql-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64" }, "product_reference": "openshift4/postgresql-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.1:openshift4/apb-base@sha256:183441575a8a0ba144fdd346e5ab560a067725a9b66d890493c326e14135512e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mariadb-apb@sha256:a446829513325ac146b2aa1b555347b57a2377712df6cd8a431c1dbec0614331_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mediawiki-apb@sha256:0a1ab047c6a93e3531f20673b275854361f36e2ebd4894b5ad1705c3dde42a76_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mediawiki@sha256:8014f0d73799f7f26b56a3d908b55de3103103f57a507d48fe9830c7d605f85d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mysql-apb@sha256:5772d2a584b96249c535df55b501ffe891162d7651b18244cdc16ab2f0d563dc_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-ansible-operator@sha256:9469e5ed49937aeb64f0a3dbb5332f087c8498494127a5c507c02c3d4286afb1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-aws-machine-controllers@sha256:e5f585aa452461ee95d55e84d81be54a82a458a54dbcad1f68a8f28edeb7638b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-azure-machine-controllers@sha256:9f3199e5226fdcd5abe34a6f2e3a6ad7e7ad3f59edbff2bfd9b4c84566897eae_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-baremetal-machine-controllers@sha256:d9ca5e81aa2fb401f9c5bfb63e85fc5d93ae1e657ab992e879a2b9d520f3fea3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cli-artifacts@sha256:bacaec21f6101ef686bb07b5d6e80b0b3ad06ab9a4d4f6e611ca3103c0030d7e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cli@sha256:bb846647aa233adddf5ed39056fdf98a7d9dc3abef4c985df3de698a44ecc7fd_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cloud-credential-operator@sha256:27c7bac07c2a2a38ddb65a9997b22946fbe37ddd06ecf52eccd0ef9235ae47ba_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-authentication-operator@sha256:67dc9d9d90e5b37c73eda524a13e0bd98834b225adbfccc9d6c09a35a130c8f4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-autoscaler-operator@sha256:989948cb9998b518f3c325a2af3b24cfb7033ad2ac8be96cb3fafce2b4077435_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-autoscaler@sha256:b995c30d43493a8d393282c760584605951048dbe395eeac6b6b1bec269ff3ad_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-bootstrap@sha256:9a676b7e363f022a511ab07ae81242b5c6d03523db11c37b0bf47e0f0324c9d8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-capacity@sha256:24db95a9d24960c14775136419eed7dfddb7b7d70577fab77a63b64fc66d53a7_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-config-operator@sha256:3b210b7313b4853f777d19248ba746b3d29251a3409124f984ae212809930427_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-dns-operator@sha256:5f70ba7ebcee1ecb9f65c8b43280935866607fc3dee6329ed473169f2acebe05_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-image-registry-operator@sha256:5c8fa5eb3828277f31ca0d4f7aedfee8e66dc0cfa3542772e6ac13c6b131644d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-ingress-operator@sha256:b33e32eaac7d15947e32cbeb9d45e9ae3e6fbe470611ab78f28cfc99d8759b68_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-apiserver-operator@sha256:af88e84a2957ba9eeb1e5e3cdf9cf559ccb0de08d7a16c58a19c8eb805ba5a39_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-controller-manager-operator@sha256:ca1e29c0c4eb029ed4d5544d5fde000000aa007f1d8e0fcf0fc0d317b5e06784_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-scheduler-operator@sha256:6f30eebebe4b774acd19eadeae80c4a7c8ccb503389c354bc76fc0f778cefe2b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-logging-operator@sha256:7926e2be0854ff3edac0ced6950a0be04ad26d46a5da638611457c3fe0f1a19a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-machine-approver@sha256:3535b9ccd701ac3fa6b6a8339f6c10d6e74dd4d8f5f810690fa7e272ee82f837_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-monitoring-operator@sha256:05d69056c09c34d095ccedc757ecf2692690c72d2bee4e6b6afc58b01ec55d9c_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-network-operator@sha256:2561079cceff11035c216fea71c0a10622696266aa5a9323ef13806c91537a68_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-node-tuning-operator@sha256:b6fa66947d674eb2fc12b38fb9355c43c57a484d85e56dd013960a760046b793_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-openshift-apiserver-operator@sha256:1291555580ce58d7855c7b93ace6826cd2b1a22499fc5df3aad7d36a30b880ee_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:3bdcfac3e9dcd30754f1e4158706bbcef77449fc3893521c86fd793cc1f7f32a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-samples-operator@sha256:79ba26ee177bc7cd2ab89ddaa6c66b5dcfc6970dc457cc737d64b18b5d378637_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-storage-operator@sha256:95ad59eb2e2cc58f7ae6b850f648259687f266f05ac91166a39da6bf441e3e86_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-update-keys@sha256:f919d82bd99ecd768271c8ef7ad6bf6d2b5cb902410b93bbafc829c58b59a48f_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-version-operator@sha256:2d99cc15d95e08541d60ebc1966b534fda48d00ee69c7c226996ac407a813d6b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-configmap-reloader@sha256:84bb7a8504eb34ff5e4e9ca92aab960c078ededed07ab0fe79620c0b9f32a51f_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-console-operator@sha256:665d6d89d83c51de08526c08365317b3dbb9f20e1528ffb35697f6c8bd409ca3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-console@sha256:68c4a7514623c31f7fdf7058a0dcd968dc4e4a63bcf0236ff21333bfb27cc4aa_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-coredns@sha256:9a330c9540816c13ddbbc93e99107f3d2a194c79eae20d81e8b8d252e9282c14_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-deployer@sha256:ab62d8277ea2e69cf6697343c4b6bfef67f04c5f31cdf47fc510cb76969ca2ca_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-descheduler-operator@sha256:71ba5a71c71074c282634a6261825c57977abd4999cc03957b8c407808a72902_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-descheduler@sha256:f7527c56780840d4062768e88f098229effd9796639ad67f6cdf841941a7e4a1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-docker-builder@sha256:25b131fc577def1179ce8a2022211d366fa461b6afef2f566b3f177930a3d0db_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-docker-registry@sha256:f7bd292dde7bd96195b313b4c459980fe8541bd89c442a4065a0114f42f3fe46_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-dns-proxy@sha256:2c00e51829c679d3573f813b0eced5c16382966ecf609915b47a8472872bbb64_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-http-proxy@sha256:77ffd3c6dbb51743a13ce6a9cbd385602c24165848c205aca864b88af5b3c503_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-router@sha256:c46ed6f837821decadaaf07266b9d67f89b98621618bc073abdc38db51bc692a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-elasticsearch-operator@sha256:6b153238aa96aa4128de68a8df8dde185ebb930d2cee6fe1c033ff7b713fb6f9_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-etcd@sha256:3df453713db7ea9a1bd8556a0a986fcd8d8c0a4649c262b9d8652ccfe648bb1e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-grafana@sha256:4304ba0edd79f4b2b7b6f4766dd696e8fb21423ff0dc50a18388e2163d9df3de_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-haproxy-router@sha256:e0c7adba792e43e96c8d6f4e0845e2d001d0f652ece6f567b09ac481b07eafdc_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-hyperkube@sha256:150fe3e51c75f09bd366d06a96749e17cd01aa845319032c327387950b52a34e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-hypershift@sha256:48392b80092bca63f2969b14412017601ebfda1b54141db53c2bc5b2317c389a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-installer-artifacts@sha256:7f3e05fa013dead5501513b86c19719973d0f9ee5dbdd4d3f5264fe601dbf809_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-installer@sha256:7f0fb099018d7fba695adfff2c6cec1af789e3c3ccab61bb084a30ae1bdff79f_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins-agent-base@sha256:c29122b0ed52c031f5f99ddb3338b6515bc05ac1e90864dda1131dcf9af87924_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins-agent-maven@sha256:ce5dd50d7005ed2d5ef36de673a2cf2cec07ad997ed93956605fe8fc8836d15c_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins@sha256:8da877d1df3fbb0fd4df607718847382d3ab38b862f868077c8938a1a7014f71_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-k8s-prometheus-adapter@sha256:95e7924437a3d110b334b1b03c01e2a65292f092110acde1a59db280ce8c7bda_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-keepalived-ipfailover@sha256:1c0b3bde2963560aa0c50bd8365abd39bc5cfae28409fbdc60abf786546eb2e8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-proxy@sha256:3afce3e28952226f1bb959b2859050e848ed5d4549ac5e2fc267f51b11fc6ec3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-rbac-proxy@sha256:dab4af2713fa59499ee8d2cb169d636ddb425590e6924bc2c03597c0b10bd246_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-state-metrics@sha256:4ff6cd48b319093041c2fa9c32ce16c6ea4dffb1c66ef4923f9cfc108cdfe6cc_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-libvirt-machine-controllers@sha256:2446ea720c26b213b9419bd2ad867c0ca1ec6df6d972cd5ffd6037b8fe0fbc88_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-curator5@sha256:91942a469532fda2a4609f2d7ddf693cca5b2ccd8c770d0e36823f0cc67d884c_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-elasticsearch5@sha256:c4693439c2f0f114238cc4034bfc6cd17f93bb9562ac2c0f9feb30f9c657fcd7_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-eventrouter@sha256:7668a706700163a35def516d1e1be336fef418ea477ef014ba90f5317569384b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-fluentd@sha256:3ef99bc79d891b111828c6c29faa8f3cd37d8ab8897186eff2bc85824939f632_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-machine-api-operator@sha256:6dfe7c13a6ae6c6e509f0d8cd0cb6e5284f9efd8cc2c949d87a471643e730957_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-machine-config-operator@sha256:ebffd73f3e4ff92792bad0cfa5bba5bec17e2124c7618ae7c4bd49ac777b7deb_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-admission-controller@sha256:101d1c2eeebf1c5e336238056ff9415de50855363eebce3b75cf6ac562adca05_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-cni@sha256:9be2123934d7f80af6439a84b5a9887459c1655549c7790fd080e965e89049b4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-must-gather@sha256:1acef66db6179f4289fc4abbb297df32c01d3b13fd85530ac6a0d925b517c3df_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-oauth-proxy@sha256:383360705efc0605760c3b2b1d0fa288094eb6dad8158c540d950f661b4ba880_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-openstack-machine-controllers@sha256:1779881159f1548a75e4dfd8a285e6ecab2ceede42acd9d07f036ec28bf1e6f9_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-lifecycle-manager@sha256:9254b8d3097a0d067f07bcf735b3530eccc888466f99a6282aebb7bbdd9cbcc8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-marketplace@sha256:3c5b9b86c9a9cd3c11290a44e29f016fe054b7068dd5b8469956909a63813db8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-registry@sha256:5eecc9d91c1ae4f0af586aa7d97fce8a32f23dfcdd64dcc61b9c536fbf4e8663_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-ovn-kubernetes@sha256:d4234553bb7e59323ee19b5d87d189f78fb4cd747551af6a6413b88001e27e13_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-pod@sha256:40b2f3ff0b5ff873669613882579b2a714aed77e1fea4e28a26ebf2726177707_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prom-label-proxy@sha256:c77261cc981cc8a5193ca1199c0a119db5757de135f4f7f5e558744371d2bd8a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-alertmanager@sha256:ef6c822baa9167856e613e7f1c14a1b44da42a394d91b9e0407d01d769a8fb40_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-config-reloader@sha256:6c0551dd87cc7eacc18ccbac093043b1178225f64843f13435f02ae7c2b4d91e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-node-exporter@sha256:56c31eb82f202b0ab38bc600ef01ef68302a0a57b7274c9537d3518855e2da1d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-operator@sha256:a5f9da1798e6b598157343e8751eda45ead551ddfb34ac5e742c6b1d8c8bf0d4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus@sha256:38e663d919d2c96af52656b42d18556cf457b84ef3160e27496f6db36ffa92a3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-service-ca-operator@sha256:ba2867ef0021af24b6667d114983400a0f7f5824842f1e11d1cda5aa91286737_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-cni@sha256:7a129a17d719761425ce26a47eaa115789be893f4a1054e37f3c76f891157886_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-dp-admission-controller@sha256:e98327978a09c28baa5f10365d2df1e2c33bb689644d581aa6f7ff095e0c1c5d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-network-device-plugin@sha256:4dc4017eee056448d0192834de329c6563c48f625f21ca9db59b22d54db70de8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-telemeter@sha256:5abb2f8cd1758441ba75e07e0a2f1180dbda0f13e6b51993d7c945b3d91b3bef_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-tests@sha256:28866a167dd7df474b053e92de3ba9bc0d95d918180b1e676637df30c2a27ef4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/postgres-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64", "7Server-RH7-RHOSE-4.1:openshift4/postgresql-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-10T15:58:57+00:00", "details": "For OpenShift Container Platform 4.1 see the following documentation, which\nwill be updated shortly for release 4.1.14, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.1/updating/updating-cluster-cli.html.", "product_ids": [ "7Server-RH7-RHOSE-4.1:openshift4/apb-base@sha256:183441575a8a0ba144fdd346e5ab560a067725a9b66d890493c326e14135512e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mariadb-apb@sha256:a446829513325ac146b2aa1b555347b57a2377712df6cd8a431c1dbec0614331_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mediawiki-apb@sha256:0a1ab047c6a93e3531f20673b275854361f36e2ebd4894b5ad1705c3dde42a76_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mediawiki@sha256:8014f0d73799f7f26b56a3d908b55de3103103f57a507d48fe9830c7d605f85d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mysql-apb@sha256:5772d2a584b96249c535df55b501ffe891162d7651b18244cdc16ab2f0d563dc_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-ansible-operator@sha256:9469e5ed49937aeb64f0a3dbb5332f087c8498494127a5c507c02c3d4286afb1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-aws-machine-controllers@sha256:e5f585aa452461ee95d55e84d81be54a82a458a54dbcad1f68a8f28edeb7638b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-azure-machine-controllers@sha256:9f3199e5226fdcd5abe34a6f2e3a6ad7e7ad3f59edbff2bfd9b4c84566897eae_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-baremetal-machine-controllers@sha256:d9ca5e81aa2fb401f9c5bfb63e85fc5d93ae1e657ab992e879a2b9d520f3fea3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cli-artifacts@sha256:bacaec21f6101ef686bb07b5d6e80b0b3ad06ab9a4d4f6e611ca3103c0030d7e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cli@sha256:bb846647aa233adddf5ed39056fdf98a7d9dc3abef4c985df3de698a44ecc7fd_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cloud-credential-operator@sha256:27c7bac07c2a2a38ddb65a9997b22946fbe37ddd06ecf52eccd0ef9235ae47ba_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-authentication-operator@sha256:67dc9d9d90e5b37c73eda524a13e0bd98834b225adbfccc9d6c09a35a130c8f4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-autoscaler-operator@sha256:989948cb9998b518f3c325a2af3b24cfb7033ad2ac8be96cb3fafce2b4077435_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-autoscaler@sha256:b995c30d43493a8d393282c760584605951048dbe395eeac6b6b1bec269ff3ad_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-bootstrap@sha256:9a676b7e363f022a511ab07ae81242b5c6d03523db11c37b0bf47e0f0324c9d8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-capacity@sha256:24db95a9d24960c14775136419eed7dfddb7b7d70577fab77a63b64fc66d53a7_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-config-operator@sha256:3b210b7313b4853f777d19248ba746b3d29251a3409124f984ae212809930427_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-dns-operator@sha256:5f70ba7ebcee1ecb9f65c8b43280935866607fc3dee6329ed473169f2acebe05_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-image-registry-operator@sha256:5c8fa5eb3828277f31ca0d4f7aedfee8e66dc0cfa3542772e6ac13c6b131644d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-ingress-operator@sha256:b33e32eaac7d15947e32cbeb9d45e9ae3e6fbe470611ab78f28cfc99d8759b68_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-apiserver-operator@sha256:af88e84a2957ba9eeb1e5e3cdf9cf559ccb0de08d7a16c58a19c8eb805ba5a39_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-controller-manager-operator@sha256:ca1e29c0c4eb029ed4d5544d5fde000000aa007f1d8e0fcf0fc0d317b5e06784_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-scheduler-operator@sha256:6f30eebebe4b774acd19eadeae80c4a7c8ccb503389c354bc76fc0f778cefe2b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-logging-operator@sha256:7926e2be0854ff3edac0ced6950a0be04ad26d46a5da638611457c3fe0f1a19a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-machine-approver@sha256:3535b9ccd701ac3fa6b6a8339f6c10d6e74dd4d8f5f810690fa7e272ee82f837_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-monitoring-operator@sha256:05d69056c09c34d095ccedc757ecf2692690c72d2bee4e6b6afc58b01ec55d9c_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-network-operator@sha256:2561079cceff11035c216fea71c0a10622696266aa5a9323ef13806c91537a68_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-node-tuning-operator@sha256:b6fa66947d674eb2fc12b38fb9355c43c57a484d85e56dd013960a760046b793_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-openshift-apiserver-operator@sha256:1291555580ce58d7855c7b93ace6826cd2b1a22499fc5df3aad7d36a30b880ee_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:3bdcfac3e9dcd30754f1e4158706bbcef77449fc3893521c86fd793cc1f7f32a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-samples-operator@sha256:79ba26ee177bc7cd2ab89ddaa6c66b5dcfc6970dc457cc737d64b18b5d378637_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-storage-operator@sha256:95ad59eb2e2cc58f7ae6b850f648259687f266f05ac91166a39da6bf441e3e86_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-update-keys@sha256:f919d82bd99ecd768271c8ef7ad6bf6d2b5cb902410b93bbafc829c58b59a48f_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-version-operator@sha256:2d99cc15d95e08541d60ebc1966b534fda48d00ee69c7c226996ac407a813d6b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-configmap-reloader@sha256:84bb7a8504eb34ff5e4e9ca92aab960c078ededed07ab0fe79620c0b9f32a51f_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-console-operator@sha256:665d6d89d83c51de08526c08365317b3dbb9f20e1528ffb35697f6c8bd409ca3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-console@sha256:68c4a7514623c31f7fdf7058a0dcd968dc4e4a63bcf0236ff21333bfb27cc4aa_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-coredns@sha256:9a330c9540816c13ddbbc93e99107f3d2a194c79eae20d81e8b8d252e9282c14_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-deployer@sha256:ab62d8277ea2e69cf6697343c4b6bfef67f04c5f31cdf47fc510cb76969ca2ca_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-descheduler-operator@sha256:71ba5a71c71074c282634a6261825c57977abd4999cc03957b8c407808a72902_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-descheduler@sha256:f7527c56780840d4062768e88f098229effd9796639ad67f6cdf841941a7e4a1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-docker-builder@sha256:25b131fc577def1179ce8a2022211d366fa461b6afef2f566b3f177930a3d0db_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-docker-registry@sha256:f7bd292dde7bd96195b313b4c459980fe8541bd89c442a4065a0114f42f3fe46_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-dns-proxy@sha256:2c00e51829c679d3573f813b0eced5c16382966ecf609915b47a8472872bbb64_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-http-proxy@sha256:77ffd3c6dbb51743a13ce6a9cbd385602c24165848c205aca864b88af5b3c503_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-router@sha256:c46ed6f837821decadaaf07266b9d67f89b98621618bc073abdc38db51bc692a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-elasticsearch-operator@sha256:6b153238aa96aa4128de68a8df8dde185ebb930d2cee6fe1c033ff7b713fb6f9_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-etcd@sha256:3df453713db7ea9a1bd8556a0a986fcd8d8c0a4649c262b9d8652ccfe648bb1e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-grafana@sha256:4304ba0edd79f4b2b7b6f4766dd696e8fb21423ff0dc50a18388e2163d9df3de_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-haproxy-router@sha256:e0c7adba792e43e96c8d6f4e0845e2d001d0f652ece6f567b09ac481b07eafdc_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-hyperkube@sha256:150fe3e51c75f09bd366d06a96749e17cd01aa845319032c327387950b52a34e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-hypershift@sha256:48392b80092bca63f2969b14412017601ebfda1b54141db53c2bc5b2317c389a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-installer-artifacts@sha256:7f3e05fa013dead5501513b86c19719973d0f9ee5dbdd4d3f5264fe601dbf809_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-installer@sha256:7f0fb099018d7fba695adfff2c6cec1af789e3c3ccab61bb084a30ae1bdff79f_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins-agent-base@sha256:c29122b0ed52c031f5f99ddb3338b6515bc05ac1e90864dda1131dcf9af87924_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins-agent-maven@sha256:ce5dd50d7005ed2d5ef36de673a2cf2cec07ad997ed93956605fe8fc8836d15c_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins@sha256:8da877d1df3fbb0fd4df607718847382d3ab38b862f868077c8938a1a7014f71_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-k8s-prometheus-adapter@sha256:95e7924437a3d110b334b1b03c01e2a65292f092110acde1a59db280ce8c7bda_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-keepalived-ipfailover@sha256:1c0b3bde2963560aa0c50bd8365abd39bc5cfae28409fbdc60abf786546eb2e8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-proxy@sha256:3afce3e28952226f1bb959b2859050e848ed5d4549ac5e2fc267f51b11fc6ec3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-rbac-proxy@sha256:dab4af2713fa59499ee8d2cb169d636ddb425590e6924bc2c03597c0b10bd246_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-state-metrics@sha256:4ff6cd48b319093041c2fa9c32ce16c6ea4dffb1c66ef4923f9cfc108cdfe6cc_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-libvirt-machine-controllers@sha256:2446ea720c26b213b9419bd2ad867c0ca1ec6df6d972cd5ffd6037b8fe0fbc88_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-curator5@sha256:91942a469532fda2a4609f2d7ddf693cca5b2ccd8c770d0e36823f0cc67d884c_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-elasticsearch5@sha256:c4693439c2f0f114238cc4034bfc6cd17f93bb9562ac2c0f9feb30f9c657fcd7_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-eventrouter@sha256:7668a706700163a35def516d1e1be336fef418ea477ef014ba90f5317569384b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-fluentd@sha256:3ef99bc79d891b111828c6c29faa8f3cd37d8ab8897186eff2bc85824939f632_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-machine-api-operator@sha256:6dfe7c13a6ae6c6e509f0d8cd0cb6e5284f9efd8cc2c949d87a471643e730957_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-machine-config-operator@sha256:ebffd73f3e4ff92792bad0cfa5bba5bec17e2124c7618ae7c4bd49ac777b7deb_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-admission-controller@sha256:101d1c2eeebf1c5e336238056ff9415de50855363eebce3b75cf6ac562adca05_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-cni@sha256:9be2123934d7f80af6439a84b5a9887459c1655549c7790fd080e965e89049b4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-must-gather@sha256:1acef66db6179f4289fc4abbb297df32c01d3b13fd85530ac6a0d925b517c3df_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-oauth-proxy@sha256:383360705efc0605760c3b2b1d0fa288094eb6dad8158c540d950f661b4ba880_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-openstack-machine-controllers@sha256:1779881159f1548a75e4dfd8a285e6ecab2ceede42acd9d07f036ec28bf1e6f9_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-lifecycle-manager@sha256:9254b8d3097a0d067f07bcf735b3530eccc888466f99a6282aebb7bbdd9cbcc8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-marketplace@sha256:3c5b9b86c9a9cd3c11290a44e29f016fe054b7068dd5b8469956909a63813db8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-registry@sha256:5eecc9d91c1ae4f0af586aa7d97fce8a32f23dfcdd64dcc61b9c536fbf4e8663_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-ovn-kubernetes@sha256:d4234553bb7e59323ee19b5d87d189f78fb4cd747551af6a6413b88001e27e13_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-pod@sha256:40b2f3ff0b5ff873669613882579b2a714aed77e1fea4e28a26ebf2726177707_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prom-label-proxy@sha256:c77261cc981cc8a5193ca1199c0a119db5757de135f4f7f5e558744371d2bd8a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-alertmanager@sha256:ef6c822baa9167856e613e7f1c14a1b44da42a394d91b9e0407d01d769a8fb40_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-config-reloader@sha256:6c0551dd87cc7eacc18ccbac093043b1178225f64843f13435f02ae7c2b4d91e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-node-exporter@sha256:56c31eb82f202b0ab38bc600ef01ef68302a0a57b7274c9537d3518855e2da1d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-operator@sha256:a5f9da1798e6b598157343e8751eda45ead551ddfb34ac5e742c6b1d8c8bf0d4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus@sha256:38e663d919d2c96af52656b42d18556cf457b84ef3160e27496f6db36ffa92a3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-service-ca-operator@sha256:ba2867ef0021af24b6667d114983400a0f7f5824842f1e11d1cda5aa91286737_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-cni@sha256:7a129a17d719761425ce26a47eaa115789be893f4a1054e37f3c76f891157886_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-dp-admission-controller@sha256:e98327978a09c28baa5f10365d2df1e2c33bb689644d581aa6f7ff095e0c1c5d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-network-device-plugin@sha256:4dc4017eee056448d0192834de329c6563c48f625f21ca9db59b22d54db70de8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-telemeter@sha256:5abb2f8cd1758441ba75e07e0a2f1180dbda0f13e6b51993d7c945b3d91b3bef_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-tests@sha256:28866a167dd7df474b053e92de3ba9bc0d95d918180b1e676637df30c2a27ef4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/postgres-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64", "7Server-RH7-RHOSE-4.1:openshift4/postgresql-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2594" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-4.1:openshift4/apb-base@sha256:183441575a8a0ba144fdd346e5ab560a067725a9b66d890493c326e14135512e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mariadb-apb@sha256:a446829513325ac146b2aa1b555347b57a2377712df6cd8a431c1dbec0614331_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mediawiki-apb@sha256:0a1ab047c6a93e3531f20673b275854361f36e2ebd4894b5ad1705c3dde42a76_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mediawiki@sha256:8014f0d73799f7f26b56a3d908b55de3103103f57a507d48fe9830c7d605f85d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mysql-apb@sha256:5772d2a584b96249c535df55b501ffe891162d7651b18244cdc16ab2f0d563dc_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-ansible-operator@sha256:9469e5ed49937aeb64f0a3dbb5332f087c8498494127a5c507c02c3d4286afb1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-aws-machine-controllers@sha256:e5f585aa452461ee95d55e84d81be54a82a458a54dbcad1f68a8f28edeb7638b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-azure-machine-controllers@sha256:9f3199e5226fdcd5abe34a6f2e3a6ad7e7ad3f59edbff2bfd9b4c84566897eae_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-baremetal-machine-controllers@sha256:d9ca5e81aa2fb401f9c5bfb63e85fc5d93ae1e657ab992e879a2b9d520f3fea3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cli-artifacts@sha256:bacaec21f6101ef686bb07b5d6e80b0b3ad06ab9a4d4f6e611ca3103c0030d7e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cli@sha256:bb846647aa233adddf5ed39056fdf98a7d9dc3abef4c985df3de698a44ecc7fd_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cloud-credential-operator@sha256:27c7bac07c2a2a38ddb65a9997b22946fbe37ddd06ecf52eccd0ef9235ae47ba_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-authentication-operator@sha256:67dc9d9d90e5b37c73eda524a13e0bd98834b225adbfccc9d6c09a35a130c8f4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-autoscaler-operator@sha256:989948cb9998b518f3c325a2af3b24cfb7033ad2ac8be96cb3fafce2b4077435_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-autoscaler@sha256:b995c30d43493a8d393282c760584605951048dbe395eeac6b6b1bec269ff3ad_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-bootstrap@sha256:9a676b7e363f022a511ab07ae81242b5c6d03523db11c37b0bf47e0f0324c9d8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-capacity@sha256:24db95a9d24960c14775136419eed7dfddb7b7d70577fab77a63b64fc66d53a7_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-config-operator@sha256:3b210b7313b4853f777d19248ba746b3d29251a3409124f984ae212809930427_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-dns-operator@sha256:5f70ba7ebcee1ecb9f65c8b43280935866607fc3dee6329ed473169f2acebe05_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-image-registry-operator@sha256:5c8fa5eb3828277f31ca0d4f7aedfee8e66dc0cfa3542772e6ac13c6b131644d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-ingress-operator@sha256:b33e32eaac7d15947e32cbeb9d45e9ae3e6fbe470611ab78f28cfc99d8759b68_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-apiserver-operator@sha256:af88e84a2957ba9eeb1e5e3cdf9cf559ccb0de08d7a16c58a19c8eb805ba5a39_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-controller-manager-operator@sha256:ca1e29c0c4eb029ed4d5544d5fde000000aa007f1d8e0fcf0fc0d317b5e06784_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-scheduler-operator@sha256:6f30eebebe4b774acd19eadeae80c4a7c8ccb503389c354bc76fc0f778cefe2b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-logging-operator@sha256:7926e2be0854ff3edac0ced6950a0be04ad26d46a5da638611457c3fe0f1a19a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-machine-approver@sha256:3535b9ccd701ac3fa6b6a8339f6c10d6e74dd4d8f5f810690fa7e272ee82f837_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-monitoring-operator@sha256:05d69056c09c34d095ccedc757ecf2692690c72d2bee4e6b6afc58b01ec55d9c_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-network-operator@sha256:2561079cceff11035c216fea71c0a10622696266aa5a9323ef13806c91537a68_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-node-tuning-operator@sha256:b6fa66947d674eb2fc12b38fb9355c43c57a484d85e56dd013960a760046b793_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-openshift-apiserver-operator@sha256:1291555580ce58d7855c7b93ace6826cd2b1a22499fc5df3aad7d36a30b880ee_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:3bdcfac3e9dcd30754f1e4158706bbcef77449fc3893521c86fd793cc1f7f32a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-samples-operator@sha256:79ba26ee177bc7cd2ab89ddaa6c66b5dcfc6970dc457cc737d64b18b5d378637_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-storage-operator@sha256:95ad59eb2e2cc58f7ae6b850f648259687f266f05ac91166a39da6bf441e3e86_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-update-keys@sha256:f919d82bd99ecd768271c8ef7ad6bf6d2b5cb902410b93bbafc829c58b59a48f_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-version-operator@sha256:2d99cc15d95e08541d60ebc1966b534fda48d00ee69c7c226996ac407a813d6b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-configmap-reloader@sha256:84bb7a8504eb34ff5e4e9ca92aab960c078ededed07ab0fe79620c0b9f32a51f_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-console-operator@sha256:665d6d89d83c51de08526c08365317b3dbb9f20e1528ffb35697f6c8bd409ca3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-console@sha256:68c4a7514623c31f7fdf7058a0dcd968dc4e4a63bcf0236ff21333bfb27cc4aa_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-coredns@sha256:9a330c9540816c13ddbbc93e99107f3d2a194c79eae20d81e8b8d252e9282c14_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-deployer@sha256:ab62d8277ea2e69cf6697343c4b6bfef67f04c5f31cdf47fc510cb76969ca2ca_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-descheduler-operator@sha256:71ba5a71c71074c282634a6261825c57977abd4999cc03957b8c407808a72902_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-descheduler@sha256:f7527c56780840d4062768e88f098229effd9796639ad67f6cdf841941a7e4a1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-docker-builder@sha256:25b131fc577def1179ce8a2022211d366fa461b6afef2f566b3f177930a3d0db_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-docker-registry@sha256:f7bd292dde7bd96195b313b4c459980fe8541bd89c442a4065a0114f42f3fe46_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-dns-proxy@sha256:2c00e51829c679d3573f813b0eced5c16382966ecf609915b47a8472872bbb64_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-http-proxy@sha256:77ffd3c6dbb51743a13ce6a9cbd385602c24165848c205aca864b88af5b3c503_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-router@sha256:c46ed6f837821decadaaf07266b9d67f89b98621618bc073abdc38db51bc692a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-elasticsearch-operator@sha256:6b153238aa96aa4128de68a8df8dde185ebb930d2cee6fe1c033ff7b713fb6f9_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-etcd@sha256:3df453713db7ea9a1bd8556a0a986fcd8d8c0a4649c262b9d8652ccfe648bb1e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-grafana@sha256:4304ba0edd79f4b2b7b6f4766dd696e8fb21423ff0dc50a18388e2163d9df3de_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-haproxy-router@sha256:e0c7adba792e43e96c8d6f4e0845e2d001d0f652ece6f567b09ac481b07eafdc_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-hyperkube@sha256:150fe3e51c75f09bd366d06a96749e17cd01aa845319032c327387950b52a34e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-hypershift@sha256:48392b80092bca63f2969b14412017601ebfda1b54141db53c2bc5b2317c389a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-installer-artifacts@sha256:7f3e05fa013dead5501513b86c19719973d0f9ee5dbdd4d3f5264fe601dbf809_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-installer@sha256:7f0fb099018d7fba695adfff2c6cec1af789e3c3ccab61bb084a30ae1bdff79f_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins-agent-base@sha256:c29122b0ed52c031f5f99ddb3338b6515bc05ac1e90864dda1131dcf9af87924_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins-agent-maven@sha256:ce5dd50d7005ed2d5ef36de673a2cf2cec07ad997ed93956605fe8fc8836d15c_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins@sha256:8da877d1df3fbb0fd4df607718847382d3ab38b862f868077c8938a1a7014f71_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-k8s-prometheus-adapter@sha256:95e7924437a3d110b334b1b03c01e2a65292f092110acde1a59db280ce8c7bda_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-keepalived-ipfailover@sha256:1c0b3bde2963560aa0c50bd8365abd39bc5cfae28409fbdc60abf786546eb2e8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-proxy@sha256:3afce3e28952226f1bb959b2859050e848ed5d4549ac5e2fc267f51b11fc6ec3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-rbac-proxy@sha256:dab4af2713fa59499ee8d2cb169d636ddb425590e6924bc2c03597c0b10bd246_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-state-metrics@sha256:4ff6cd48b319093041c2fa9c32ce16c6ea4dffb1c66ef4923f9cfc108cdfe6cc_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-libvirt-machine-controllers@sha256:2446ea720c26b213b9419bd2ad867c0ca1ec6df6d972cd5ffd6037b8fe0fbc88_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-curator5@sha256:91942a469532fda2a4609f2d7ddf693cca5b2ccd8c770d0e36823f0cc67d884c_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-elasticsearch5@sha256:c4693439c2f0f114238cc4034bfc6cd17f93bb9562ac2c0f9feb30f9c657fcd7_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-eventrouter@sha256:7668a706700163a35def516d1e1be336fef418ea477ef014ba90f5317569384b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-fluentd@sha256:3ef99bc79d891b111828c6c29faa8f3cd37d8ab8897186eff2bc85824939f632_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-machine-api-operator@sha256:6dfe7c13a6ae6c6e509f0d8cd0cb6e5284f9efd8cc2c949d87a471643e730957_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-machine-config-operator@sha256:ebffd73f3e4ff92792bad0cfa5bba5bec17e2124c7618ae7c4bd49ac777b7deb_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-admission-controller@sha256:101d1c2eeebf1c5e336238056ff9415de50855363eebce3b75cf6ac562adca05_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-cni@sha256:9be2123934d7f80af6439a84b5a9887459c1655549c7790fd080e965e89049b4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-must-gather@sha256:1acef66db6179f4289fc4abbb297df32c01d3b13fd85530ac6a0d925b517c3df_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-oauth-proxy@sha256:383360705efc0605760c3b2b1d0fa288094eb6dad8158c540d950f661b4ba880_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-openstack-machine-controllers@sha256:1779881159f1548a75e4dfd8a285e6ecab2ceede42acd9d07f036ec28bf1e6f9_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-lifecycle-manager@sha256:9254b8d3097a0d067f07bcf735b3530eccc888466f99a6282aebb7bbdd9cbcc8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-marketplace@sha256:3c5b9b86c9a9cd3c11290a44e29f016fe054b7068dd5b8469956909a63813db8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-registry@sha256:5eecc9d91c1ae4f0af586aa7d97fce8a32f23dfcdd64dcc61b9c536fbf4e8663_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-ovn-kubernetes@sha256:d4234553bb7e59323ee19b5d87d189f78fb4cd747551af6a6413b88001e27e13_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-pod@sha256:40b2f3ff0b5ff873669613882579b2a714aed77e1fea4e28a26ebf2726177707_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prom-label-proxy@sha256:c77261cc981cc8a5193ca1199c0a119db5757de135f4f7f5e558744371d2bd8a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-alertmanager@sha256:ef6c822baa9167856e613e7f1c14a1b44da42a394d91b9e0407d01d769a8fb40_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-config-reloader@sha256:6c0551dd87cc7eacc18ccbac093043b1178225f64843f13435f02ae7c2b4d91e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-node-exporter@sha256:56c31eb82f202b0ab38bc600ef01ef68302a0a57b7274c9537d3518855e2da1d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-operator@sha256:a5f9da1798e6b598157343e8751eda45ead551ddfb34ac5e742c6b1d8c8bf0d4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus@sha256:38e663d919d2c96af52656b42d18556cf457b84ef3160e27496f6db36ffa92a3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-service-ca-operator@sha256:ba2867ef0021af24b6667d114983400a0f7f5824842f1e11d1cda5aa91286737_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-cni@sha256:7a129a17d719761425ce26a47eaa115789be893f4a1054e37f3c76f891157886_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-dp-admission-controller@sha256:e98327978a09c28baa5f10365d2df1e2c33bb689644d581aa6f7ff095e0c1c5d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-network-device-plugin@sha256:4dc4017eee056448d0192834de329c6563c48f625f21ca9db59b22d54db70de8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-telemeter@sha256:5abb2f8cd1758441ba75e07e0a2f1180dbda0f13e6b51993d7c945b3d91b3bef_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-tests@sha256:28866a167dd7df474b053e92de3ba9bc0d95d918180b1e676637df30c2a27ef4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/postgres-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64", "7Server-RH7-RHOSE-4.1:openshift4/postgresql-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.1:openshift4/apb-base@sha256:183441575a8a0ba144fdd346e5ab560a067725a9b66d890493c326e14135512e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mariadb-apb@sha256:a446829513325ac146b2aa1b555347b57a2377712df6cd8a431c1dbec0614331_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mediawiki-apb@sha256:0a1ab047c6a93e3531f20673b275854361f36e2ebd4894b5ad1705c3dde42a76_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mediawiki@sha256:8014f0d73799f7f26b56a3d908b55de3103103f57a507d48fe9830c7d605f85d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mysql-apb@sha256:5772d2a584b96249c535df55b501ffe891162d7651b18244cdc16ab2f0d563dc_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-ansible-operator@sha256:9469e5ed49937aeb64f0a3dbb5332f087c8498494127a5c507c02c3d4286afb1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-aws-machine-controllers@sha256:e5f585aa452461ee95d55e84d81be54a82a458a54dbcad1f68a8f28edeb7638b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-azure-machine-controllers@sha256:9f3199e5226fdcd5abe34a6f2e3a6ad7e7ad3f59edbff2bfd9b4c84566897eae_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-baremetal-machine-controllers@sha256:d9ca5e81aa2fb401f9c5bfb63e85fc5d93ae1e657ab992e879a2b9d520f3fea3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cli-artifacts@sha256:bacaec21f6101ef686bb07b5d6e80b0b3ad06ab9a4d4f6e611ca3103c0030d7e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cli@sha256:bb846647aa233adddf5ed39056fdf98a7d9dc3abef4c985df3de698a44ecc7fd_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cloud-credential-operator@sha256:27c7bac07c2a2a38ddb65a9997b22946fbe37ddd06ecf52eccd0ef9235ae47ba_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-authentication-operator@sha256:67dc9d9d90e5b37c73eda524a13e0bd98834b225adbfccc9d6c09a35a130c8f4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-autoscaler-operator@sha256:989948cb9998b518f3c325a2af3b24cfb7033ad2ac8be96cb3fafce2b4077435_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-autoscaler@sha256:b995c30d43493a8d393282c760584605951048dbe395eeac6b6b1bec269ff3ad_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-bootstrap@sha256:9a676b7e363f022a511ab07ae81242b5c6d03523db11c37b0bf47e0f0324c9d8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-capacity@sha256:24db95a9d24960c14775136419eed7dfddb7b7d70577fab77a63b64fc66d53a7_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-config-operator@sha256:3b210b7313b4853f777d19248ba746b3d29251a3409124f984ae212809930427_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-dns-operator@sha256:5f70ba7ebcee1ecb9f65c8b43280935866607fc3dee6329ed473169f2acebe05_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-image-registry-operator@sha256:5c8fa5eb3828277f31ca0d4f7aedfee8e66dc0cfa3542772e6ac13c6b131644d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-ingress-operator@sha256:b33e32eaac7d15947e32cbeb9d45e9ae3e6fbe470611ab78f28cfc99d8759b68_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-apiserver-operator@sha256:af88e84a2957ba9eeb1e5e3cdf9cf559ccb0de08d7a16c58a19c8eb805ba5a39_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-controller-manager-operator@sha256:ca1e29c0c4eb029ed4d5544d5fde000000aa007f1d8e0fcf0fc0d317b5e06784_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-scheduler-operator@sha256:6f30eebebe4b774acd19eadeae80c4a7c8ccb503389c354bc76fc0f778cefe2b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-logging-operator@sha256:7926e2be0854ff3edac0ced6950a0be04ad26d46a5da638611457c3fe0f1a19a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-machine-approver@sha256:3535b9ccd701ac3fa6b6a8339f6c10d6e74dd4d8f5f810690fa7e272ee82f837_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-monitoring-operator@sha256:05d69056c09c34d095ccedc757ecf2692690c72d2bee4e6b6afc58b01ec55d9c_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-network-operator@sha256:2561079cceff11035c216fea71c0a10622696266aa5a9323ef13806c91537a68_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-node-tuning-operator@sha256:b6fa66947d674eb2fc12b38fb9355c43c57a484d85e56dd013960a760046b793_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-openshift-apiserver-operator@sha256:1291555580ce58d7855c7b93ace6826cd2b1a22499fc5df3aad7d36a30b880ee_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:3bdcfac3e9dcd30754f1e4158706bbcef77449fc3893521c86fd793cc1f7f32a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-samples-operator@sha256:79ba26ee177bc7cd2ab89ddaa6c66b5dcfc6970dc457cc737d64b18b5d378637_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-storage-operator@sha256:95ad59eb2e2cc58f7ae6b850f648259687f266f05ac91166a39da6bf441e3e86_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-update-keys@sha256:f919d82bd99ecd768271c8ef7ad6bf6d2b5cb902410b93bbafc829c58b59a48f_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-version-operator@sha256:2d99cc15d95e08541d60ebc1966b534fda48d00ee69c7c226996ac407a813d6b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-configmap-reloader@sha256:84bb7a8504eb34ff5e4e9ca92aab960c078ededed07ab0fe79620c0b9f32a51f_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-console-operator@sha256:665d6d89d83c51de08526c08365317b3dbb9f20e1528ffb35697f6c8bd409ca3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-console@sha256:68c4a7514623c31f7fdf7058a0dcd968dc4e4a63bcf0236ff21333bfb27cc4aa_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-coredns@sha256:9a330c9540816c13ddbbc93e99107f3d2a194c79eae20d81e8b8d252e9282c14_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-deployer@sha256:ab62d8277ea2e69cf6697343c4b6bfef67f04c5f31cdf47fc510cb76969ca2ca_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-descheduler-operator@sha256:71ba5a71c71074c282634a6261825c57977abd4999cc03957b8c407808a72902_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-descheduler@sha256:f7527c56780840d4062768e88f098229effd9796639ad67f6cdf841941a7e4a1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-docker-builder@sha256:25b131fc577def1179ce8a2022211d366fa461b6afef2f566b3f177930a3d0db_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-docker-registry@sha256:f7bd292dde7bd96195b313b4c459980fe8541bd89c442a4065a0114f42f3fe46_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-dns-proxy@sha256:2c00e51829c679d3573f813b0eced5c16382966ecf609915b47a8472872bbb64_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-http-proxy@sha256:77ffd3c6dbb51743a13ce6a9cbd385602c24165848c205aca864b88af5b3c503_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-router@sha256:c46ed6f837821decadaaf07266b9d67f89b98621618bc073abdc38db51bc692a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-elasticsearch-operator@sha256:6b153238aa96aa4128de68a8df8dde185ebb930d2cee6fe1c033ff7b713fb6f9_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-etcd@sha256:3df453713db7ea9a1bd8556a0a986fcd8d8c0a4649c262b9d8652ccfe648bb1e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-grafana@sha256:4304ba0edd79f4b2b7b6f4766dd696e8fb21423ff0dc50a18388e2163d9df3de_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-haproxy-router@sha256:e0c7adba792e43e96c8d6f4e0845e2d001d0f652ece6f567b09ac481b07eafdc_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-hyperkube@sha256:150fe3e51c75f09bd366d06a96749e17cd01aa845319032c327387950b52a34e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-hypershift@sha256:48392b80092bca63f2969b14412017601ebfda1b54141db53c2bc5b2317c389a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-installer-artifacts@sha256:7f3e05fa013dead5501513b86c19719973d0f9ee5dbdd4d3f5264fe601dbf809_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-installer@sha256:7f0fb099018d7fba695adfff2c6cec1af789e3c3ccab61bb084a30ae1bdff79f_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins-agent-base@sha256:c29122b0ed52c031f5f99ddb3338b6515bc05ac1e90864dda1131dcf9af87924_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins-agent-maven@sha256:ce5dd50d7005ed2d5ef36de673a2cf2cec07ad997ed93956605fe8fc8836d15c_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins@sha256:8da877d1df3fbb0fd4df607718847382d3ab38b862f868077c8938a1a7014f71_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-k8s-prometheus-adapter@sha256:95e7924437a3d110b334b1b03c01e2a65292f092110acde1a59db280ce8c7bda_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-keepalived-ipfailover@sha256:1c0b3bde2963560aa0c50bd8365abd39bc5cfae28409fbdc60abf786546eb2e8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-proxy@sha256:3afce3e28952226f1bb959b2859050e848ed5d4549ac5e2fc267f51b11fc6ec3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-rbac-proxy@sha256:dab4af2713fa59499ee8d2cb169d636ddb425590e6924bc2c03597c0b10bd246_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-state-metrics@sha256:4ff6cd48b319093041c2fa9c32ce16c6ea4dffb1c66ef4923f9cfc108cdfe6cc_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-libvirt-machine-controllers@sha256:2446ea720c26b213b9419bd2ad867c0ca1ec6df6d972cd5ffd6037b8fe0fbc88_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-curator5@sha256:91942a469532fda2a4609f2d7ddf693cca5b2ccd8c770d0e36823f0cc67d884c_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-elasticsearch5@sha256:c4693439c2f0f114238cc4034bfc6cd17f93bb9562ac2c0f9feb30f9c657fcd7_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-eventrouter@sha256:7668a706700163a35def516d1e1be336fef418ea477ef014ba90f5317569384b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-fluentd@sha256:3ef99bc79d891b111828c6c29faa8f3cd37d8ab8897186eff2bc85824939f632_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-machine-api-operator@sha256:6dfe7c13a6ae6c6e509f0d8cd0cb6e5284f9efd8cc2c949d87a471643e730957_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-machine-config-operator@sha256:ebffd73f3e4ff92792bad0cfa5bba5bec17e2124c7618ae7c4bd49ac777b7deb_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-admission-controller@sha256:101d1c2eeebf1c5e336238056ff9415de50855363eebce3b75cf6ac562adca05_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-cni@sha256:9be2123934d7f80af6439a84b5a9887459c1655549c7790fd080e965e89049b4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-must-gather@sha256:1acef66db6179f4289fc4abbb297df32c01d3b13fd85530ac6a0d925b517c3df_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-oauth-proxy@sha256:383360705efc0605760c3b2b1d0fa288094eb6dad8158c540d950f661b4ba880_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-openstack-machine-controllers@sha256:1779881159f1548a75e4dfd8a285e6ecab2ceede42acd9d07f036ec28bf1e6f9_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-lifecycle-manager@sha256:9254b8d3097a0d067f07bcf735b3530eccc888466f99a6282aebb7bbdd9cbcc8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-marketplace@sha256:3c5b9b86c9a9cd3c11290a44e29f016fe054b7068dd5b8469956909a63813db8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-registry@sha256:5eecc9d91c1ae4f0af586aa7d97fce8a32f23dfcdd64dcc61b9c536fbf4e8663_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-ovn-kubernetes@sha256:d4234553bb7e59323ee19b5d87d189f78fb4cd747551af6a6413b88001e27e13_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-pod@sha256:40b2f3ff0b5ff873669613882579b2a714aed77e1fea4e28a26ebf2726177707_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prom-label-proxy@sha256:c77261cc981cc8a5193ca1199c0a119db5757de135f4f7f5e558744371d2bd8a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-alertmanager@sha256:ef6c822baa9167856e613e7f1c14a1b44da42a394d91b9e0407d01d769a8fb40_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-config-reloader@sha256:6c0551dd87cc7eacc18ccbac093043b1178225f64843f13435f02ae7c2b4d91e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-node-exporter@sha256:56c31eb82f202b0ab38bc600ef01ef68302a0a57b7274c9537d3518855e2da1d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-operator@sha256:a5f9da1798e6b598157343e8751eda45ead551ddfb34ac5e742c6b1d8c8bf0d4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus@sha256:38e663d919d2c96af52656b42d18556cf457b84ef3160e27496f6db36ffa92a3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-service-ca-operator@sha256:ba2867ef0021af24b6667d114983400a0f7f5824842f1e11d1cda5aa91286737_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-cni@sha256:7a129a17d719761425ce26a47eaa115789be893f4a1054e37f3c76f891157886_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-dp-admission-controller@sha256:e98327978a09c28baa5f10365d2df1e2c33bb689644d581aa6f7ff095e0c1c5d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-network-device-plugin@sha256:4dc4017eee056448d0192834de329c6563c48f625f21ca9db59b22d54db70de8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-telemeter@sha256:5abb2f8cd1758441ba75e07e0a2f1180dbda0f13e6b51993d7c945b3d91b3bef_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-tests@sha256:28866a167dd7df474b053e92de3ba9bc0d95d918180b1e676637df30c2a27ef4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/postgres-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64", "7Server-RH7-RHOSE-4.1:openshift4/postgresql-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-10T15:58:57+00:00", "details": "For OpenShift Container Platform 4.1 see the following documentation, which\nwill be updated shortly for release 4.1.14, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.1/updating/updating-cluster-cli.html.", "product_ids": [ "7Server-RH7-RHOSE-4.1:openshift4/apb-base@sha256:183441575a8a0ba144fdd346e5ab560a067725a9b66d890493c326e14135512e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mariadb-apb@sha256:a446829513325ac146b2aa1b555347b57a2377712df6cd8a431c1dbec0614331_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mediawiki-apb@sha256:0a1ab047c6a93e3531f20673b275854361f36e2ebd4894b5ad1705c3dde42a76_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mediawiki@sha256:8014f0d73799f7f26b56a3d908b55de3103103f57a507d48fe9830c7d605f85d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mysql-apb@sha256:5772d2a584b96249c535df55b501ffe891162d7651b18244cdc16ab2f0d563dc_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-ansible-operator@sha256:9469e5ed49937aeb64f0a3dbb5332f087c8498494127a5c507c02c3d4286afb1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-aws-machine-controllers@sha256:e5f585aa452461ee95d55e84d81be54a82a458a54dbcad1f68a8f28edeb7638b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-azure-machine-controllers@sha256:9f3199e5226fdcd5abe34a6f2e3a6ad7e7ad3f59edbff2bfd9b4c84566897eae_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-baremetal-machine-controllers@sha256:d9ca5e81aa2fb401f9c5bfb63e85fc5d93ae1e657ab992e879a2b9d520f3fea3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cli-artifacts@sha256:bacaec21f6101ef686bb07b5d6e80b0b3ad06ab9a4d4f6e611ca3103c0030d7e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cli@sha256:bb846647aa233adddf5ed39056fdf98a7d9dc3abef4c985df3de698a44ecc7fd_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cloud-credential-operator@sha256:27c7bac07c2a2a38ddb65a9997b22946fbe37ddd06ecf52eccd0ef9235ae47ba_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-authentication-operator@sha256:67dc9d9d90e5b37c73eda524a13e0bd98834b225adbfccc9d6c09a35a130c8f4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-autoscaler-operator@sha256:989948cb9998b518f3c325a2af3b24cfb7033ad2ac8be96cb3fafce2b4077435_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-autoscaler@sha256:b995c30d43493a8d393282c760584605951048dbe395eeac6b6b1bec269ff3ad_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-bootstrap@sha256:9a676b7e363f022a511ab07ae81242b5c6d03523db11c37b0bf47e0f0324c9d8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-capacity@sha256:24db95a9d24960c14775136419eed7dfddb7b7d70577fab77a63b64fc66d53a7_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-config-operator@sha256:3b210b7313b4853f777d19248ba746b3d29251a3409124f984ae212809930427_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-dns-operator@sha256:5f70ba7ebcee1ecb9f65c8b43280935866607fc3dee6329ed473169f2acebe05_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-image-registry-operator@sha256:5c8fa5eb3828277f31ca0d4f7aedfee8e66dc0cfa3542772e6ac13c6b131644d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-ingress-operator@sha256:b33e32eaac7d15947e32cbeb9d45e9ae3e6fbe470611ab78f28cfc99d8759b68_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-apiserver-operator@sha256:af88e84a2957ba9eeb1e5e3cdf9cf559ccb0de08d7a16c58a19c8eb805ba5a39_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-controller-manager-operator@sha256:ca1e29c0c4eb029ed4d5544d5fde000000aa007f1d8e0fcf0fc0d317b5e06784_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-scheduler-operator@sha256:6f30eebebe4b774acd19eadeae80c4a7c8ccb503389c354bc76fc0f778cefe2b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-logging-operator@sha256:7926e2be0854ff3edac0ced6950a0be04ad26d46a5da638611457c3fe0f1a19a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-machine-approver@sha256:3535b9ccd701ac3fa6b6a8339f6c10d6e74dd4d8f5f810690fa7e272ee82f837_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-monitoring-operator@sha256:05d69056c09c34d095ccedc757ecf2692690c72d2bee4e6b6afc58b01ec55d9c_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-network-operator@sha256:2561079cceff11035c216fea71c0a10622696266aa5a9323ef13806c91537a68_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-node-tuning-operator@sha256:b6fa66947d674eb2fc12b38fb9355c43c57a484d85e56dd013960a760046b793_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-openshift-apiserver-operator@sha256:1291555580ce58d7855c7b93ace6826cd2b1a22499fc5df3aad7d36a30b880ee_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:3bdcfac3e9dcd30754f1e4158706bbcef77449fc3893521c86fd793cc1f7f32a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-samples-operator@sha256:79ba26ee177bc7cd2ab89ddaa6c66b5dcfc6970dc457cc737d64b18b5d378637_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-storage-operator@sha256:95ad59eb2e2cc58f7ae6b850f648259687f266f05ac91166a39da6bf441e3e86_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-update-keys@sha256:f919d82bd99ecd768271c8ef7ad6bf6d2b5cb902410b93bbafc829c58b59a48f_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-version-operator@sha256:2d99cc15d95e08541d60ebc1966b534fda48d00ee69c7c226996ac407a813d6b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-configmap-reloader@sha256:84bb7a8504eb34ff5e4e9ca92aab960c078ededed07ab0fe79620c0b9f32a51f_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-console-operator@sha256:665d6d89d83c51de08526c08365317b3dbb9f20e1528ffb35697f6c8bd409ca3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-console@sha256:68c4a7514623c31f7fdf7058a0dcd968dc4e4a63bcf0236ff21333bfb27cc4aa_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-coredns@sha256:9a330c9540816c13ddbbc93e99107f3d2a194c79eae20d81e8b8d252e9282c14_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-deployer@sha256:ab62d8277ea2e69cf6697343c4b6bfef67f04c5f31cdf47fc510cb76969ca2ca_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-descheduler-operator@sha256:71ba5a71c71074c282634a6261825c57977abd4999cc03957b8c407808a72902_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-descheduler@sha256:f7527c56780840d4062768e88f098229effd9796639ad67f6cdf841941a7e4a1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-docker-builder@sha256:25b131fc577def1179ce8a2022211d366fa461b6afef2f566b3f177930a3d0db_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-docker-registry@sha256:f7bd292dde7bd96195b313b4c459980fe8541bd89c442a4065a0114f42f3fe46_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-dns-proxy@sha256:2c00e51829c679d3573f813b0eced5c16382966ecf609915b47a8472872bbb64_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-http-proxy@sha256:77ffd3c6dbb51743a13ce6a9cbd385602c24165848c205aca864b88af5b3c503_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-router@sha256:c46ed6f837821decadaaf07266b9d67f89b98621618bc073abdc38db51bc692a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-elasticsearch-operator@sha256:6b153238aa96aa4128de68a8df8dde185ebb930d2cee6fe1c033ff7b713fb6f9_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-etcd@sha256:3df453713db7ea9a1bd8556a0a986fcd8d8c0a4649c262b9d8652ccfe648bb1e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-grafana@sha256:4304ba0edd79f4b2b7b6f4766dd696e8fb21423ff0dc50a18388e2163d9df3de_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-haproxy-router@sha256:e0c7adba792e43e96c8d6f4e0845e2d001d0f652ece6f567b09ac481b07eafdc_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-hyperkube@sha256:150fe3e51c75f09bd366d06a96749e17cd01aa845319032c327387950b52a34e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-hypershift@sha256:48392b80092bca63f2969b14412017601ebfda1b54141db53c2bc5b2317c389a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-installer-artifacts@sha256:7f3e05fa013dead5501513b86c19719973d0f9ee5dbdd4d3f5264fe601dbf809_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-installer@sha256:7f0fb099018d7fba695adfff2c6cec1af789e3c3ccab61bb084a30ae1bdff79f_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins-agent-base@sha256:c29122b0ed52c031f5f99ddb3338b6515bc05ac1e90864dda1131dcf9af87924_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins-agent-maven@sha256:ce5dd50d7005ed2d5ef36de673a2cf2cec07ad997ed93956605fe8fc8836d15c_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins@sha256:8da877d1df3fbb0fd4df607718847382d3ab38b862f868077c8938a1a7014f71_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-k8s-prometheus-adapter@sha256:95e7924437a3d110b334b1b03c01e2a65292f092110acde1a59db280ce8c7bda_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-keepalived-ipfailover@sha256:1c0b3bde2963560aa0c50bd8365abd39bc5cfae28409fbdc60abf786546eb2e8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-proxy@sha256:3afce3e28952226f1bb959b2859050e848ed5d4549ac5e2fc267f51b11fc6ec3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-rbac-proxy@sha256:dab4af2713fa59499ee8d2cb169d636ddb425590e6924bc2c03597c0b10bd246_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-state-metrics@sha256:4ff6cd48b319093041c2fa9c32ce16c6ea4dffb1c66ef4923f9cfc108cdfe6cc_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-libvirt-machine-controllers@sha256:2446ea720c26b213b9419bd2ad867c0ca1ec6df6d972cd5ffd6037b8fe0fbc88_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-curator5@sha256:91942a469532fda2a4609f2d7ddf693cca5b2ccd8c770d0e36823f0cc67d884c_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-elasticsearch5@sha256:c4693439c2f0f114238cc4034bfc6cd17f93bb9562ac2c0f9feb30f9c657fcd7_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-eventrouter@sha256:7668a706700163a35def516d1e1be336fef418ea477ef014ba90f5317569384b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-fluentd@sha256:3ef99bc79d891b111828c6c29faa8f3cd37d8ab8897186eff2bc85824939f632_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-machine-api-operator@sha256:6dfe7c13a6ae6c6e509f0d8cd0cb6e5284f9efd8cc2c949d87a471643e730957_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-machine-config-operator@sha256:ebffd73f3e4ff92792bad0cfa5bba5bec17e2124c7618ae7c4bd49ac777b7deb_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-admission-controller@sha256:101d1c2eeebf1c5e336238056ff9415de50855363eebce3b75cf6ac562adca05_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-cni@sha256:9be2123934d7f80af6439a84b5a9887459c1655549c7790fd080e965e89049b4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-must-gather@sha256:1acef66db6179f4289fc4abbb297df32c01d3b13fd85530ac6a0d925b517c3df_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-oauth-proxy@sha256:383360705efc0605760c3b2b1d0fa288094eb6dad8158c540d950f661b4ba880_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-openstack-machine-controllers@sha256:1779881159f1548a75e4dfd8a285e6ecab2ceede42acd9d07f036ec28bf1e6f9_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-lifecycle-manager@sha256:9254b8d3097a0d067f07bcf735b3530eccc888466f99a6282aebb7bbdd9cbcc8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-marketplace@sha256:3c5b9b86c9a9cd3c11290a44e29f016fe054b7068dd5b8469956909a63813db8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-registry@sha256:5eecc9d91c1ae4f0af586aa7d97fce8a32f23dfcdd64dcc61b9c536fbf4e8663_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-ovn-kubernetes@sha256:d4234553bb7e59323ee19b5d87d189f78fb4cd747551af6a6413b88001e27e13_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-pod@sha256:40b2f3ff0b5ff873669613882579b2a714aed77e1fea4e28a26ebf2726177707_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prom-label-proxy@sha256:c77261cc981cc8a5193ca1199c0a119db5757de135f4f7f5e558744371d2bd8a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-alertmanager@sha256:ef6c822baa9167856e613e7f1c14a1b44da42a394d91b9e0407d01d769a8fb40_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-config-reloader@sha256:6c0551dd87cc7eacc18ccbac093043b1178225f64843f13435f02ae7c2b4d91e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-node-exporter@sha256:56c31eb82f202b0ab38bc600ef01ef68302a0a57b7274c9537d3518855e2da1d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-operator@sha256:a5f9da1798e6b598157343e8751eda45ead551ddfb34ac5e742c6b1d8c8bf0d4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus@sha256:38e663d919d2c96af52656b42d18556cf457b84ef3160e27496f6db36ffa92a3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-service-ca-operator@sha256:ba2867ef0021af24b6667d114983400a0f7f5824842f1e11d1cda5aa91286737_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-cni@sha256:7a129a17d719761425ce26a47eaa115789be893f4a1054e37f3c76f891157886_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-dp-admission-controller@sha256:e98327978a09c28baa5f10365d2df1e2c33bb689644d581aa6f7ff095e0c1c5d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-network-device-plugin@sha256:4dc4017eee056448d0192834de329c6563c48f625f21ca9db59b22d54db70de8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-telemeter@sha256:5abb2f8cd1758441ba75e07e0a2f1180dbda0f13e6b51993d7c945b3d91b3bef_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-tests@sha256:28866a167dd7df474b053e92de3ba9bc0d95d918180b1e676637df30c2a27ef4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/postgres-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64", "7Server-RH7-RHOSE-4.1:openshift4/postgresql-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2594" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-4.1:openshift4/apb-base@sha256:183441575a8a0ba144fdd346e5ab560a067725a9b66d890493c326e14135512e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mariadb-apb@sha256:a446829513325ac146b2aa1b555347b57a2377712df6cd8a431c1dbec0614331_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mediawiki-apb@sha256:0a1ab047c6a93e3531f20673b275854361f36e2ebd4894b5ad1705c3dde42a76_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mediawiki@sha256:8014f0d73799f7f26b56a3d908b55de3103103f57a507d48fe9830c7d605f85d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mysql-apb@sha256:5772d2a584b96249c535df55b501ffe891162d7651b18244cdc16ab2f0d563dc_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-ansible-operator@sha256:9469e5ed49937aeb64f0a3dbb5332f087c8498494127a5c507c02c3d4286afb1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-aws-machine-controllers@sha256:e5f585aa452461ee95d55e84d81be54a82a458a54dbcad1f68a8f28edeb7638b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-azure-machine-controllers@sha256:9f3199e5226fdcd5abe34a6f2e3a6ad7e7ad3f59edbff2bfd9b4c84566897eae_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-baremetal-machine-controllers@sha256:d9ca5e81aa2fb401f9c5bfb63e85fc5d93ae1e657ab992e879a2b9d520f3fea3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cli-artifacts@sha256:bacaec21f6101ef686bb07b5d6e80b0b3ad06ab9a4d4f6e611ca3103c0030d7e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cli@sha256:bb846647aa233adddf5ed39056fdf98a7d9dc3abef4c985df3de698a44ecc7fd_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cloud-credential-operator@sha256:27c7bac07c2a2a38ddb65a9997b22946fbe37ddd06ecf52eccd0ef9235ae47ba_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-authentication-operator@sha256:67dc9d9d90e5b37c73eda524a13e0bd98834b225adbfccc9d6c09a35a130c8f4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-autoscaler-operator@sha256:989948cb9998b518f3c325a2af3b24cfb7033ad2ac8be96cb3fafce2b4077435_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-autoscaler@sha256:b995c30d43493a8d393282c760584605951048dbe395eeac6b6b1bec269ff3ad_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-bootstrap@sha256:9a676b7e363f022a511ab07ae81242b5c6d03523db11c37b0bf47e0f0324c9d8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-capacity@sha256:24db95a9d24960c14775136419eed7dfddb7b7d70577fab77a63b64fc66d53a7_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-config-operator@sha256:3b210b7313b4853f777d19248ba746b3d29251a3409124f984ae212809930427_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-dns-operator@sha256:5f70ba7ebcee1ecb9f65c8b43280935866607fc3dee6329ed473169f2acebe05_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-image-registry-operator@sha256:5c8fa5eb3828277f31ca0d4f7aedfee8e66dc0cfa3542772e6ac13c6b131644d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-ingress-operator@sha256:b33e32eaac7d15947e32cbeb9d45e9ae3e6fbe470611ab78f28cfc99d8759b68_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-apiserver-operator@sha256:af88e84a2957ba9eeb1e5e3cdf9cf559ccb0de08d7a16c58a19c8eb805ba5a39_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-controller-manager-operator@sha256:ca1e29c0c4eb029ed4d5544d5fde000000aa007f1d8e0fcf0fc0d317b5e06784_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-scheduler-operator@sha256:6f30eebebe4b774acd19eadeae80c4a7c8ccb503389c354bc76fc0f778cefe2b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-logging-operator@sha256:7926e2be0854ff3edac0ced6950a0be04ad26d46a5da638611457c3fe0f1a19a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-machine-approver@sha256:3535b9ccd701ac3fa6b6a8339f6c10d6e74dd4d8f5f810690fa7e272ee82f837_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-monitoring-operator@sha256:05d69056c09c34d095ccedc757ecf2692690c72d2bee4e6b6afc58b01ec55d9c_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-network-operator@sha256:2561079cceff11035c216fea71c0a10622696266aa5a9323ef13806c91537a68_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-node-tuning-operator@sha256:b6fa66947d674eb2fc12b38fb9355c43c57a484d85e56dd013960a760046b793_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-openshift-apiserver-operator@sha256:1291555580ce58d7855c7b93ace6826cd2b1a22499fc5df3aad7d36a30b880ee_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:3bdcfac3e9dcd30754f1e4158706bbcef77449fc3893521c86fd793cc1f7f32a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-samples-operator@sha256:79ba26ee177bc7cd2ab89ddaa6c66b5dcfc6970dc457cc737d64b18b5d378637_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-storage-operator@sha256:95ad59eb2e2cc58f7ae6b850f648259687f266f05ac91166a39da6bf441e3e86_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-update-keys@sha256:f919d82bd99ecd768271c8ef7ad6bf6d2b5cb902410b93bbafc829c58b59a48f_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-version-operator@sha256:2d99cc15d95e08541d60ebc1966b534fda48d00ee69c7c226996ac407a813d6b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-configmap-reloader@sha256:84bb7a8504eb34ff5e4e9ca92aab960c078ededed07ab0fe79620c0b9f32a51f_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-console-operator@sha256:665d6d89d83c51de08526c08365317b3dbb9f20e1528ffb35697f6c8bd409ca3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-console@sha256:68c4a7514623c31f7fdf7058a0dcd968dc4e4a63bcf0236ff21333bfb27cc4aa_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-coredns@sha256:9a330c9540816c13ddbbc93e99107f3d2a194c79eae20d81e8b8d252e9282c14_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-deployer@sha256:ab62d8277ea2e69cf6697343c4b6bfef67f04c5f31cdf47fc510cb76969ca2ca_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-descheduler-operator@sha256:71ba5a71c71074c282634a6261825c57977abd4999cc03957b8c407808a72902_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-descheduler@sha256:f7527c56780840d4062768e88f098229effd9796639ad67f6cdf841941a7e4a1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-docker-builder@sha256:25b131fc577def1179ce8a2022211d366fa461b6afef2f566b3f177930a3d0db_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-docker-registry@sha256:f7bd292dde7bd96195b313b4c459980fe8541bd89c442a4065a0114f42f3fe46_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-dns-proxy@sha256:2c00e51829c679d3573f813b0eced5c16382966ecf609915b47a8472872bbb64_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-http-proxy@sha256:77ffd3c6dbb51743a13ce6a9cbd385602c24165848c205aca864b88af5b3c503_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-router@sha256:c46ed6f837821decadaaf07266b9d67f89b98621618bc073abdc38db51bc692a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-elasticsearch-operator@sha256:6b153238aa96aa4128de68a8df8dde185ebb930d2cee6fe1c033ff7b713fb6f9_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-etcd@sha256:3df453713db7ea9a1bd8556a0a986fcd8d8c0a4649c262b9d8652ccfe648bb1e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-grafana@sha256:4304ba0edd79f4b2b7b6f4766dd696e8fb21423ff0dc50a18388e2163d9df3de_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-haproxy-router@sha256:e0c7adba792e43e96c8d6f4e0845e2d001d0f652ece6f567b09ac481b07eafdc_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-hyperkube@sha256:150fe3e51c75f09bd366d06a96749e17cd01aa845319032c327387950b52a34e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-hypershift@sha256:48392b80092bca63f2969b14412017601ebfda1b54141db53c2bc5b2317c389a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-installer-artifacts@sha256:7f3e05fa013dead5501513b86c19719973d0f9ee5dbdd4d3f5264fe601dbf809_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-installer@sha256:7f0fb099018d7fba695adfff2c6cec1af789e3c3ccab61bb084a30ae1bdff79f_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins-agent-base@sha256:c29122b0ed52c031f5f99ddb3338b6515bc05ac1e90864dda1131dcf9af87924_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins-agent-maven@sha256:ce5dd50d7005ed2d5ef36de673a2cf2cec07ad997ed93956605fe8fc8836d15c_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins@sha256:8da877d1df3fbb0fd4df607718847382d3ab38b862f868077c8938a1a7014f71_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-k8s-prometheus-adapter@sha256:95e7924437a3d110b334b1b03c01e2a65292f092110acde1a59db280ce8c7bda_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-keepalived-ipfailover@sha256:1c0b3bde2963560aa0c50bd8365abd39bc5cfae28409fbdc60abf786546eb2e8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-proxy@sha256:3afce3e28952226f1bb959b2859050e848ed5d4549ac5e2fc267f51b11fc6ec3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-rbac-proxy@sha256:dab4af2713fa59499ee8d2cb169d636ddb425590e6924bc2c03597c0b10bd246_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-state-metrics@sha256:4ff6cd48b319093041c2fa9c32ce16c6ea4dffb1c66ef4923f9cfc108cdfe6cc_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-libvirt-machine-controllers@sha256:2446ea720c26b213b9419bd2ad867c0ca1ec6df6d972cd5ffd6037b8fe0fbc88_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-curator5@sha256:91942a469532fda2a4609f2d7ddf693cca5b2ccd8c770d0e36823f0cc67d884c_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-elasticsearch5@sha256:c4693439c2f0f114238cc4034bfc6cd17f93bb9562ac2c0f9feb30f9c657fcd7_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-eventrouter@sha256:7668a706700163a35def516d1e1be336fef418ea477ef014ba90f5317569384b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-fluentd@sha256:3ef99bc79d891b111828c6c29faa8f3cd37d8ab8897186eff2bc85824939f632_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-machine-api-operator@sha256:6dfe7c13a6ae6c6e509f0d8cd0cb6e5284f9efd8cc2c949d87a471643e730957_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-machine-config-operator@sha256:ebffd73f3e4ff92792bad0cfa5bba5bec17e2124c7618ae7c4bd49ac777b7deb_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-admission-controller@sha256:101d1c2eeebf1c5e336238056ff9415de50855363eebce3b75cf6ac562adca05_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-cni@sha256:9be2123934d7f80af6439a84b5a9887459c1655549c7790fd080e965e89049b4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-must-gather@sha256:1acef66db6179f4289fc4abbb297df32c01d3b13fd85530ac6a0d925b517c3df_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-oauth-proxy@sha256:383360705efc0605760c3b2b1d0fa288094eb6dad8158c540d950f661b4ba880_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-openstack-machine-controllers@sha256:1779881159f1548a75e4dfd8a285e6ecab2ceede42acd9d07f036ec28bf1e6f9_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-lifecycle-manager@sha256:9254b8d3097a0d067f07bcf735b3530eccc888466f99a6282aebb7bbdd9cbcc8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-marketplace@sha256:3c5b9b86c9a9cd3c11290a44e29f016fe054b7068dd5b8469956909a63813db8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-registry@sha256:5eecc9d91c1ae4f0af586aa7d97fce8a32f23dfcdd64dcc61b9c536fbf4e8663_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-ovn-kubernetes@sha256:d4234553bb7e59323ee19b5d87d189f78fb4cd747551af6a6413b88001e27e13_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-pod@sha256:40b2f3ff0b5ff873669613882579b2a714aed77e1fea4e28a26ebf2726177707_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prom-label-proxy@sha256:c77261cc981cc8a5193ca1199c0a119db5757de135f4f7f5e558744371d2bd8a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-alertmanager@sha256:ef6c822baa9167856e613e7f1c14a1b44da42a394d91b9e0407d01d769a8fb40_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-config-reloader@sha256:6c0551dd87cc7eacc18ccbac093043b1178225f64843f13435f02ae7c2b4d91e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-node-exporter@sha256:56c31eb82f202b0ab38bc600ef01ef68302a0a57b7274c9537d3518855e2da1d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-operator@sha256:a5f9da1798e6b598157343e8751eda45ead551ddfb34ac5e742c6b1d8c8bf0d4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus@sha256:38e663d919d2c96af52656b42d18556cf457b84ef3160e27496f6db36ffa92a3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-service-ca-operator@sha256:ba2867ef0021af24b6667d114983400a0f7f5824842f1e11d1cda5aa91286737_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-cni@sha256:7a129a17d719761425ce26a47eaa115789be893f4a1054e37f3c76f891157886_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-dp-admission-controller@sha256:e98327978a09c28baa5f10365d2df1e2c33bb689644d581aa6f7ff095e0c1c5d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-network-device-plugin@sha256:4dc4017eee056448d0192834de329c6563c48f625f21ca9db59b22d54db70de8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-telemeter@sha256:5abb2f8cd1758441ba75e07e0a2f1180dbda0f13e6b51993d7c945b3d91b3bef_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-tests@sha256:28866a167dd7df474b053e92de3ba9bc0d95d918180b1e676637df30c2a27ef4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/postgres-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64", "7Server-RH7-RHOSE-4.1:openshift4/postgresql-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" } ] }
rhsa-2019_2966
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated Quay packages that fix several bugs and add various enhancements are now available.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Quay 3.1.1 errata release, including:\n\nSecurity Fix(es):\n\n* HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511)\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using PRIORITY frames resulting in excessive resource consumption (CVE-2019-9513)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* HTTP/2: 0-length headers lead to denial of service (CVE-2019-9516)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Fixed repository mirror credentials properly escaped to allow special characters\n* Fixed repository mirror UI cancel button enabled\n* Fixed repository mirror UI change next sync date", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:2966", "url": "https://access.redhat.com/errata/RHSA-2019:2966" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735741" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "1750473", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1750473" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2966.json" } ], "title": "Red Hat Security Advisory: Red Hat Quay v3.1.1 security update", "tracking": { "current_release_date": "2024-12-15T18:55:40+00:00", "generator": { "date": "2024-12-15T18:55:40+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2019:2966", "initial_release_date": "2019-10-03T18:57:22+00:00", "revision_history": [ { "date": "2019-10-03T18:57:22+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-10-03T18:57:22+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-15T18:55:40+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Quay v3", "product": { "name": "Quay v3", "product_id": "7Server-RH7-Quay-3", "product_identification_helper": { "cpe": "cpe:/a:redhat:quay:3::el7" } } } ], "category": "product_family", "name": "Red Hat Quay" }, { "branches": [ { "category": "product_version", "name": "quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64", "product": { "name": "quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64", "product_id": "quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64", "product_identification_helper": { "purl": "pkg:oci/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821?arch=amd64\u0026repository_url=registry.redhat.io/quay3/clair-jwt\u0026tag=v2.0.9-7" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64 as a component of Quay v3", "product_id": "7Server-RH7-Quay-3:quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64" }, "product_reference": "quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64", "relates_to_product_reference": "7Server-RH7-Quay-3" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-9511", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741860" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker can request a large amount of data by manipulating window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this queue can consume excess CPU, memory, or both, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: large amount of data requests leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "There are no mitigations available for nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-Quay-3:quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "RHBZ#1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9511", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-03T18:57:22+00:00", "details": "Please download the release images via:\n\nquay.io/redhat/quay:v3.1.1\nquay.io/redhat/clair-jwt:v3.1.1\nquay.io/redhat/quay-builder:v3.1.1", "product_ids": [ "7Server-RH7-Quay-3:quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2966" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "7Server-RH7-Quay-3:quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-Quay-3:quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: large amount of data requests leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-Quay-3:quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-03T18:57:22+00:00", "details": "Please download the release images via:\n\nquay.io/redhat/quay:v3.1.1\nquay.io/redhat/clair-jwt:v3.1.1\nquay.io/redhat/quay-builder:v3.1.1", "product_ids": [ "7Server-RH7-Quay-3:quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2966" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-Quay-3:quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9513", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735741" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker, using PRIORITY frames to flood the system, could cause excessive CPU usage and starvation of other clients. The largest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PRIORITY frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for packages nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-Quay-3:quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9513" }, { "category": "external", "summary": "RHBZ#1735741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735741" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9513", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9513" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9513", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9513" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nghttp2.org/blog/2019/08/19/nghttp2-v1-39-2/", "url": "https://nghttp2.org/blog/2019/08/19/nghttp2-v1-39-2/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-03T18:57:22+00:00", "details": "Please download the release images via:\n\nquay.io/redhat/quay:v3.1.1\nquay.io/redhat/clair-jwt:v3.1.1\nquay.io/redhat/quay-builder:v3.1.1", "product_ids": [ "7Server-RH7-Quay-3:quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2966" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "7Server-RH7-Quay-3:quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-Quay-3:quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PRIORITY frames results in excessive resource consumption" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-Quay-3:quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-03T18:57:22+00:00", "details": "Please download the release images via:\n\nquay.io/redhat/quay:v3.1.1\nquay.io/redhat/clair-jwt:v3.1.1\nquay.io/redhat/quay-builder:v3.1.1", "product_ids": [ "7Server-RH7-Quay-3:quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2966" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-Quay-3:quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "cve": "CVE-2019-9516", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741864" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker, sending a stream of header with a 0-length header name and a 0-length header value, could cause some implementations to allocate memory for these headers and keep the allocations alive until the session dies. The can consume excess memory, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: 0-length headers lead to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-Quay-3:quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9516" }, { "category": "external", "summary": "RHBZ#1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9516", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9516" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://github.com/nghttp2/nghttp2/issues/1382#", "url": "https://github.com/nghttp2/nghttp2/issues/1382#" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-03T18:57:22+00:00", "details": "Please download the release images via:\n\nquay.io/redhat/quay:v3.1.1\nquay.io/redhat/clair-jwt:v3.1.1\nquay.io/redhat/quay-builder:v3.1.1", "product_ids": [ "7Server-RH7-Quay-3:quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2966" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "7Server-RH7-Quay-3:quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-Quay-3:quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: 0-length headers lead to denial of service" } ] }
rhsa-2019:2766
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for gRPC, included in multus-cni-container, operator-lifecycle-manager-container, and operator-registry-container is now available for Red Hat OpenShift Container Platform 4.1.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains updated container images for multus-cni, operator-lifecycle-manager, and operator-registry in Red Hat OpenShift Container Platform 4.1.15. Each of these container images includes gRPC, which has been updated with the below fixes.\n\nSecurity Fix(es):\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:2766", "url": "https://access.redhat.com/errata/RHSA-2019:2766" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2766.json" } ], "title": "Red Hat Security Advisory: Red Hat OpenShift Enterprise 4.1.15 gRPC security update", "tracking": { "current_release_date": "2025-03-15T19:43:53+00:00", "generator": { "date": "2025-03-15T19:43:53+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.1" } }, "id": "RHSA-2019:2766", "initial_release_date": "2019-09-12T18:32:52+00:00", "revision_history": [ { "date": "2019-09-12T18:32:52+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-09-12T18:32:52+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-03-15T19:43:53+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.1", "product": { "name": "Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.1::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "openshift4/ose-multus-cni@sha256:38bc93888a2577e90168a0d4f7996d43f38878e11db255b26e58f5aa50b9df56_amd64", "product": { "name": "openshift4/ose-multus-cni@sha256:38bc93888a2577e90168a0d4f7996d43f38878e11db255b26e58f5aa50b9df56_amd64", "product_id": "openshift4/ose-multus-cni@sha256:38bc93888a2577e90168a0d4f7996d43f38878e11db255b26e58f5aa50b9df56_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-multus-cni@sha256:38bc93888a2577e90168a0d4f7996d43f38878e11db255b26e58f5aa50b9df56?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-cni\u0026tag=v4.1.15-201909041605" } } }, { "category": "product_version", "name": "openshift4/ose-operator-lifecycle-manager@sha256:0eca3cf5068a4c366f8f8a0fd4891d9cd86fe239764d189d37b8938196e323a1_amd64", "product": { "name": "openshift4/ose-operator-lifecycle-manager@sha256:0eca3cf5068a4c366f8f8a0fd4891d9cd86fe239764d189d37b8938196e323a1_amd64", "product_id": "openshift4/ose-operator-lifecycle-manager@sha256:0eca3cf5068a4c366f8f8a0fd4891d9cd86fe239764d189d37b8938196e323a1_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-operator-lifecycle-manager@sha256:0eca3cf5068a4c366f8f8a0fd4891d9cd86fe239764d189d37b8938196e323a1?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-lifecycle-manager\u0026tag=v4.1.15-201909041605" } } }, { "category": "product_version", "name": "openshift4/ose-operator-registry@sha256:79a386249506345846398f6bb26963f2d1e19dde1242003f42332718847be9c5_amd64", "product": { "name": "openshift4/ose-operator-registry@sha256:79a386249506345846398f6bb26963f2d1e19dde1242003f42332718847be9c5_amd64", "product_id": "openshift4/ose-operator-registry@sha256:79a386249506345846398f6bb26963f2d1e19dde1242003f42332718847be9c5_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-operator-registry@sha256:79a386249506345846398f6bb26963f2d1e19dde1242003f42332718847be9c5?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-registry\u0026tag=v4.1.15-201909041605" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-cni@sha256:38bc93888a2577e90168a0d4f7996d43f38878e11db255b26e58f5aa50b9df56_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-cni@sha256:38bc93888a2577e90168a0d4f7996d43f38878e11db255b26e58f5aa50b9df56_amd64" }, "product_reference": "openshift4/ose-multus-cni@sha256:38bc93888a2577e90168a0d4f7996d43f38878e11db255b26e58f5aa50b9df56_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-lifecycle-manager@sha256:0eca3cf5068a4c366f8f8a0fd4891d9cd86fe239764d189d37b8938196e323a1_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-lifecycle-manager@sha256:0eca3cf5068a4c366f8f8a0fd4891d9cd86fe239764d189d37b8938196e323a1_amd64" }, "product_reference": "openshift4/ose-operator-lifecycle-manager@sha256:0eca3cf5068a4c366f8f8a0fd4891d9cd86fe239764d189d37b8938196e323a1_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-registry@sha256:79a386249506345846398f6bb26963f2d1e19dde1242003f42332718847be9c5_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-registry@sha256:79a386249506345846398f6bb26963f2d1e19dde1242003f42332718847be9c5_amd64" }, "product_reference": "openshift4/ose-operator-registry@sha256:79a386249506345846398f6bb26963f2d1e19dde1242003f42332718847be9c5_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-cni@sha256:38bc93888a2577e90168a0d4f7996d43f38878e11db255b26e58f5aa50b9df56_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-lifecycle-manager@sha256:0eca3cf5068a4c366f8f8a0fd4891d9cd86fe239764d189d37b8938196e323a1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-registry@sha256:79a386249506345846398f6bb26963f2d1e19dde1242003f42332718847be9c5_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-12T18:32:52+00:00", "details": "For OpenShift Container Platform 4.1 see the following documentation, which\nwill be updated shortly for release 4.1.z, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-release-notes.html", "product_ids": [ "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-cni@sha256:38bc93888a2577e90168a0d4f7996d43f38878e11db255b26e58f5aa50b9df56_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-lifecycle-manager@sha256:0eca3cf5068a4c366f8f8a0fd4891d9cd86fe239764d189d37b8938196e323a1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-registry@sha256:79a386249506345846398f6bb26963f2d1e19dde1242003f42332718847be9c5_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2766" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-cni@sha256:38bc93888a2577e90168a0d4f7996d43f38878e11db255b26e58f5aa50b9df56_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-lifecycle-manager@sha256:0eca3cf5068a4c366f8f8a0fd4891d9cd86fe239764d189d37b8938196e323a1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-registry@sha256:79a386249506345846398f6bb26963f2d1e19dde1242003f42332718847be9c5_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-cni@sha256:38bc93888a2577e90168a0d4f7996d43f38878e11db255b26e58f5aa50b9df56_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-lifecycle-manager@sha256:0eca3cf5068a4c366f8f8a0fd4891d9cd86fe239764d189d37b8938196e323a1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-registry@sha256:79a386249506345846398f6bb26963f2d1e19dde1242003f42332718847be9c5_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-12T18:32:52+00:00", "details": "For OpenShift Container Platform 4.1 see the following documentation, which\nwill be updated shortly for release 4.1.z, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-release-notes.html", "product_ids": [ "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-cni@sha256:38bc93888a2577e90168a0d4f7996d43f38878e11db255b26e58f5aa50b9df56_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-lifecycle-manager@sha256:0eca3cf5068a4c366f8f8a0fd4891d9cd86fe239764d189d37b8938196e323a1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-registry@sha256:79a386249506345846398f6bb26963f2d1e19dde1242003f42332718847be9c5_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2766" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-cni@sha256:38bc93888a2577e90168a0d4f7996d43f38878e11db255b26e58f5aa50b9df56_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-lifecycle-manager@sha256:0eca3cf5068a4c366f8f8a0fd4891d9cd86fe239764d189d37b8938196e323a1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-registry@sha256:79a386249506345846398f6bb26963f2d1e19dde1242003f42332718847be9c5_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-cni@sha256:38bc93888a2577e90168a0d4f7996d43f38878e11db255b26e58f5aa50b9df56_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-lifecycle-manager@sha256:0eca3cf5068a4c366f8f8a0fd4891d9cd86fe239764d189d37b8938196e323a1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-registry@sha256:79a386249506345846398f6bb26963f2d1e19dde1242003f42332718847be9c5_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-12T18:32:52+00:00", "details": "For OpenShift Container Platform 4.1 see the following documentation, which\nwill be updated shortly for release 4.1.z, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-release-notes.html", "product_ids": [ "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-cni@sha256:38bc93888a2577e90168a0d4f7996d43f38878e11db255b26e58f5aa50b9df56_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-lifecycle-manager@sha256:0eca3cf5068a4c366f8f8a0fd4891d9cd86fe239764d189d37b8938196e323a1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-registry@sha256:79a386249506345846398f6bb26963f2d1e19dde1242003f42332718847be9c5_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2766" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-cni@sha256:38bc93888a2577e90168a0d4f7996d43f38878e11db255b26e58f5aa50b9df56_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-lifecycle-manager@sha256:0eca3cf5068a4c366f8f8a0fd4891d9cd86fe239764d189d37b8938196e323a1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-registry@sha256:79a386249506345846398f6bb26963f2d1e19dde1242003f42332718847be9c5_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" } ] }
RHSA-2019:3131
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat OpenShift Container Platform 4.1.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the cri-o, cri-tools, faq, ignition, openshift-external-storage and pivot RPM packages, which have been rebuilt with an updated version of golang for Red Hat OpenShift Container Platform 4.1.20.\n\nSecurity Fix(es):\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:3131", "url": "https://access.redhat.com/errata/RHSA-2019:3131" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3131.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 4.1.20 golang security update", "tracking": { "current_release_date": "2025-03-15T19:44:36+00:00", "generator": { "date": "2025-03-15T19:44:36+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.1" } }, "id": "RHSA-2019:3131", "initial_release_date": "2019-10-16T15:36:43+00:00", "revision_history": [ { "date": "2019-10-16T15:36:43+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-10-16T15:36:43+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-03-15T19:44:36+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.1", "product": { "name": "Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.1::el8" } } }, { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.1", "product": { "name": "Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.1::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "product": { "name": "cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "product_id": "cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debugsource-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "product": { "name": "cri-o-debugsource-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "product_id": "cri-o-debugsource-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "product": { "name": "cri-o-debuginfo-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "product_id": "cri-o-debuginfo-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.x86_64", "product": { "name": "cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.x86_64", "product_id": "cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "ignition-0:0.32.0-2.git5941fc0.el8.x86_64", "product": { "name": "ignition-0:0.32.0-2.git5941fc0.el8.x86_64", "product_id": "ignition-0:0.32.0-2.git5941fc0.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "ignition-validate-0:0.32.0-2.git5941fc0.el8.x86_64", "product": { "name": "ignition-validate-0:0.32.0-2.git5941fc0.el8.x86_64", "product_id": "ignition-validate-0:0.32.0-2.git5941fc0.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "ignition-debugsource-0:0.32.0-2.git5941fc0.el8.x86_64", "product": { "name": "ignition-debugsource-0:0.32.0-2.git5941fc0.el8.x86_64", "product_id": "ignition-debugsource-0:0.32.0-2.git5941fc0.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "ignition-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64", "product": { "name": "ignition-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64", "product_id": "ignition-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "ignition-validate-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64", "product": { "name": "ignition-validate-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64", "product_id": "ignition-validate-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "pivot-0:0.0.5-2.el8.x86_64", "product": { "name": "pivot-0:0.0.5-2.el8.x86_64", "product_id": "pivot-0:0.0.5-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64", "product": { "name": "cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64", "product_id": "cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64", "product": { "name": "cri-o-debuginfo-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64", "product_id": "cri-o-debuginfo-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64", "product": { "name": "cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64", "product_id": "cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "cri-tools-debuginfo-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64", "product": { "name": "cri-tools-debuginfo-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64", "product_id": "cri-tools-debuginfo-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "faq-0:0.0.6-4.el7.x86_64", "product": { "name": "faq-0:0.0.6-4.el7.x86_64", "product_id": "faq-0:0.0.6-4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "faq-debuginfo-0:0.0.6-4.el7.x86_64", "product": { "name": "faq-debuginfo-0:0.0.6-4.el7.x86_64", "product_id": "faq-debuginfo-0:0.0.6-4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-external-storage-cephfs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product": { "name": "openshift-external-storage-cephfs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product_id": "openshift-external-storage-cephfs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-cephfs-provisioner@0.0.2-7.gitd3c94f0.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-external-storage-efs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product": { "name": "openshift-external-storage-efs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product_id": "openshift-external-storage-efs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-efs-provisioner@0.0.2-7.gitd3c94f0.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-external-storage-local-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product": { "name": "openshift-external-storage-local-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product_id": "openshift-external-storage-local-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-local-provisioner@0.0.2-7.gitd3c94f0.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-external-storage-manila-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product": { "name": "openshift-external-storage-manila-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product_id": "openshift-external-storage-manila-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-manila-provisioner@0.0.2-7.gitd3c94f0.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-external-storage-snapshot-controller-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product": { "name": "openshift-external-storage-snapshot-controller-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product_id": "openshift-external-storage-snapshot-controller-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-snapshot-controller@0.0.2-7.gitd3c94f0.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-external-storage-snapshot-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product": { "name": "openshift-external-storage-snapshot-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product_id": "openshift-external-storage-snapshot-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-snapshot-provisioner@0.0.2-7.gitd3c94f0.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-external-storage-debuginfo-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product": { "name": "openshift-external-storage-debuginfo-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product_id": "openshift-external-storage-debuginfo-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.src", "product": { "name": "cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.src", "product_id": "cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.src", "product": { "name": "cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.src", "product_id": "cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "ignition-0:0.32.0-2.git5941fc0.el8.src", "product": { "name": "ignition-0:0.32.0-2.git5941fc0.el8.src", "product_id": "ignition-0:0.32.0-2.git5941fc0.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "pivot-0:0.0.5-2.el8.src", "product": { "name": "pivot-0:0.0.5-2.el8.src", "product_id": "pivot-0:0.0.5-2.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.src", "product": { "name": "cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.src", "product_id": "cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.src", "product": { "name": "cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.src", "product_id": "cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "faq-0:0.0.6-4.el7.src", "product": { "name": "faq-0:0.0.6-4.el7.src", "product_id": "faq-0:0.0.6-4.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "openshift-external-storage-0:0.0.2-7.gitd3c94f0.el7.src", "product": { "name": "openshift-external-storage-0:0.0.2-7.gitd3c94f0.el7.src", "product_id": "openshift-external-storage-0:0.0.2-7.gitd3c94f0.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.src" }, "product_reference": "cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64" }, "product_reference": "cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:cri-o-debuginfo-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64" }, "product_reference": "cri-o-debuginfo-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.src" }, "product_reference": "cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64" }, "product_reference": "cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debuginfo-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:cri-tools-debuginfo-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64" }, "product_reference": "cri-tools-debuginfo-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "faq-0:0.0.6-4.el7.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:faq-0:0.0.6-4.el7.src" }, "product_reference": "faq-0:0.0.6-4.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "faq-0:0.0.6-4.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:faq-0:0.0.6-4.el7.x86_64" }, "product_reference": "faq-0:0.0.6-4.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "faq-debuginfo-0:0.0.6-4.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:faq-debuginfo-0:0.0.6-4.el7.x86_64" }, "product_reference": "faq-debuginfo-0:0.0.6-4.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-0:0.0.2-7.gitd3c94f0.el7.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-external-storage-0:0.0.2-7.gitd3c94f0.el7.src" }, "product_reference": "openshift-external-storage-0:0.0.2-7.gitd3c94f0.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-cephfs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-external-storage-cephfs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64" }, "product_reference": "openshift-external-storage-cephfs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-debuginfo-0:0.0.2-7.gitd3c94f0.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-external-storage-debuginfo-0:0.0.2-7.gitd3c94f0.el7.x86_64" }, "product_reference": "openshift-external-storage-debuginfo-0:0.0.2-7.gitd3c94f0.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-efs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-external-storage-efs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64" }, "product_reference": "openshift-external-storage-efs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-local-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-external-storage-local-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64" }, "product_reference": "openshift-external-storage-local-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-manila-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-external-storage-manila-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64" }, "product_reference": "openshift-external-storage-manila-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-snapshot-controller-0:0.0.2-7.gitd3c94f0.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-external-storage-snapshot-controller-0:0.0.2-7.gitd3c94f0.el7.x86_64" }, "product_reference": "openshift-external-storage-snapshot-controller-0:0.0.2-7.gitd3c94f0.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-snapshot-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-external-storage-snapshot-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64" }, "product_reference": "openshift-external-storage-snapshot-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.src" }, "product_reference": "cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64" }, "product_reference": "cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:cri-o-debuginfo-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64" }, "product_reference": "cri-o-debuginfo-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debugsource-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:cri-o-debugsource-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64" }, "product_reference": "cri-o-debugsource-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.src" }, "product_reference": "cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.x86_64" }, "product_reference": "cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-0:0.32.0-2.git5941fc0.el8.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:ignition-0:0.32.0-2.git5941fc0.el8.src" }, "product_reference": "ignition-0:0.32.0-2.git5941fc0.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-0:0.32.0-2.git5941fc0.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:ignition-0:0.32.0-2.git5941fc0.el8.x86_64" }, "product_reference": "ignition-0:0.32.0-2.git5941fc0.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:ignition-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64" }, "product_reference": "ignition-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-debugsource-0:0.32.0-2.git5941fc0.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:ignition-debugsource-0:0.32.0-2.git5941fc0.el8.x86_64" }, "product_reference": "ignition-debugsource-0:0.32.0-2.git5941fc0.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-validate-0:0.32.0-2.git5941fc0.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:ignition-validate-0:0.32.0-2.git5941fc0.el8.x86_64" }, "product_reference": "ignition-validate-0:0.32.0-2.git5941fc0.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-validate-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:ignition-validate-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64" }, "product_reference": "ignition-validate-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "pivot-0:0.0.5-2.el8.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:pivot-0:0.0.5-2.el8.src" }, "product_reference": "pivot-0:0.0.5-2.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "pivot-0:0.0.5-2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:pivot-0:0.0.5-2.el8.x86_64" }, "product_reference": "pivot-0:0.0.5-2.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.1:cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.src", "7Server-RH7-RHOSE-4.1:cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64", "7Server-RH7-RHOSE-4.1:cri-o-debuginfo-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64", "7Server-RH7-RHOSE-4.1:cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.src", "7Server-RH7-RHOSE-4.1:cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64", "7Server-RH7-RHOSE-4.1:cri-tools-debuginfo-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64", "7Server-RH7-RHOSE-4.1:faq-0:0.0.6-4.el7.src", "7Server-RH7-RHOSE-4.1:faq-0:0.0.6-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:faq-debuginfo-0:0.0.6-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-0:0.0.2-7.gitd3c94f0.el7.src", "7Server-RH7-RHOSE-4.1:openshift-external-storage-cephfs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-debuginfo-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-efs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-local-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-manila-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-snapshot-controller-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-snapshot-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "8Base-RHOSE-4.1:cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.src", "8Base-RHOSE-4.1:cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "8Base-RHOSE-4.1:cri-o-debuginfo-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "8Base-RHOSE-4.1:cri-o-debugsource-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "8Base-RHOSE-4.1:cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.src", "8Base-RHOSE-4.1:cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.x86_64", "8Base-RHOSE-4.1:ignition-0:0.32.0-2.git5941fc0.el8.src", "8Base-RHOSE-4.1:ignition-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-debugsource-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-validate-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-validate-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:pivot-0:0.0.5-2.el8.src", "8Base-RHOSE-4.1:pivot-0:0.0.5-2.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-16T15:36:43+00:00", "details": "For OpenShift Container Platform 4.1 see the following documentation, which\nwill be updated shortly for release 4.1.20, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-release-notes.html", "product_ids": [ "7Server-RH7-RHOSE-4.1:cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.src", "7Server-RH7-RHOSE-4.1:cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64", "7Server-RH7-RHOSE-4.1:cri-o-debuginfo-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64", "7Server-RH7-RHOSE-4.1:cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.src", "7Server-RH7-RHOSE-4.1:cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64", "7Server-RH7-RHOSE-4.1:cri-tools-debuginfo-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64", "7Server-RH7-RHOSE-4.1:faq-0:0.0.6-4.el7.src", "7Server-RH7-RHOSE-4.1:faq-0:0.0.6-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:faq-debuginfo-0:0.0.6-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-0:0.0.2-7.gitd3c94f0.el7.src", "7Server-RH7-RHOSE-4.1:openshift-external-storage-cephfs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-debuginfo-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-efs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-local-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-manila-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-snapshot-controller-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-snapshot-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "8Base-RHOSE-4.1:cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.src", "8Base-RHOSE-4.1:cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "8Base-RHOSE-4.1:cri-o-debuginfo-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "8Base-RHOSE-4.1:cri-o-debugsource-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "8Base-RHOSE-4.1:cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.src", "8Base-RHOSE-4.1:cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.x86_64", "8Base-RHOSE-4.1:ignition-0:0.32.0-2.git5941fc0.el8.src", "8Base-RHOSE-4.1:ignition-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-debugsource-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-validate-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-validate-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:pivot-0:0.0.5-2.el8.src", "8Base-RHOSE-4.1:pivot-0:0.0.5-2.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3131" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-4.1:cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.src", "7Server-RH7-RHOSE-4.1:cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64", "7Server-RH7-RHOSE-4.1:cri-o-debuginfo-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64", "7Server-RH7-RHOSE-4.1:cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.src", "7Server-RH7-RHOSE-4.1:cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64", "7Server-RH7-RHOSE-4.1:cri-tools-debuginfo-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64", "7Server-RH7-RHOSE-4.1:faq-0:0.0.6-4.el7.src", "7Server-RH7-RHOSE-4.1:faq-0:0.0.6-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:faq-debuginfo-0:0.0.6-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-0:0.0.2-7.gitd3c94f0.el7.src", "7Server-RH7-RHOSE-4.1:openshift-external-storage-cephfs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-debuginfo-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-efs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-local-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-manila-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-snapshot-controller-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-snapshot-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "8Base-RHOSE-4.1:cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.src", "8Base-RHOSE-4.1:cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "8Base-RHOSE-4.1:cri-o-debuginfo-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "8Base-RHOSE-4.1:cri-o-debugsource-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "8Base-RHOSE-4.1:cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.src", "8Base-RHOSE-4.1:cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.x86_64", "8Base-RHOSE-4.1:ignition-0:0.32.0-2.git5941fc0.el8.src", "8Base-RHOSE-4.1:ignition-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-debugsource-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-validate-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-validate-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:pivot-0:0.0.5-2.el8.src", "8Base-RHOSE-4.1:pivot-0:0.0.5-2.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.1:cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.src", "7Server-RH7-RHOSE-4.1:cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64", "7Server-RH7-RHOSE-4.1:cri-o-debuginfo-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64", "7Server-RH7-RHOSE-4.1:cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.src", "7Server-RH7-RHOSE-4.1:cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64", "7Server-RH7-RHOSE-4.1:cri-tools-debuginfo-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64", "7Server-RH7-RHOSE-4.1:faq-0:0.0.6-4.el7.src", "7Server-RH7-RHOSE-4.1:faq-0:0.0.6-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:faq-debuginfo-0:0.0.6-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-0:0.0.2-7.gitd3c94f0.el7.src", "7Server-RH7-RHOSE-4.1:openshift-external-storage-cephfs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-debuginfo-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-efs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-local-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-manila-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-snapshot-controller-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-snapshot-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "8Base-RHOSE-4.1:cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.src", "8Base-RHOSE-4.1:cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "8Base-RHOSE-4.1:cri-o-debuginfo-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "8Base-RHOSE-4.1:cri-o-debugsource-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "8Base-RHOSE-4.1:cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.src", "8Base-RHOSE-4.1:cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.x86_64", "8Base-RHOSE-4.1:ignition-0:0.32.0-2.git5941fc0.el8.src", "8Base-RHOSE-4.1:ignition-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-debugsource-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-validate-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-validate-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:pivot-0:0.0.5-2.el8.src", "8Base-RHOSE-4.1:pivot-0:0.0.5-2.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-16T15:36:43+00:00", "details": "For OpenShift Container Platform 4.1 see the following documentation, which\nwill be updated shortly for release 4.1.20, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-release-notes.html", "product_ids": [ "7Server-RH7-RHOSE-4.1:cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.src", "7Server-RH7-RHOSE-4.1:cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64", "7Server-RH7-RHOSE-4.1:cri-o-debuginfo-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64", "7Server-RH7-RHOSE-4.1:cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.src", "7Server-RH7-RHOSE-4.1:cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64", "7Server-RH7-RHOSE-4.1:cri-tools-debuginfo-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64", "7Server-RH7-RHOSE-4.1:faq-0:0.0.6-4.el7.src", "7Server-RH7-RHOSE-4.1:faq-0:0.0.6-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:faq-debuginfo-0:0.0.6-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-0:0.0.2-7.gitd3c94f0.el7.src", "7Server-RH7-RHOSE-4.1:openshift-external-storage-cephfs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-debuginfo-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-efs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-local-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-manila-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-snapshot-controller-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-snapshot-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "8Base-RHOSE-4.1:cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.src", "8Base-RHOSE-4.1:cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "8Base-RHOSE-4.1:cri-o-debuginfo-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "8Base-RHOSE-4.1:cri-o-debugsource-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "8Base-RHOSE-4.1:cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.src", "8Base-RHOSE-4.1:cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.x86_64", "8Base-RHOSE-4.1:ignition-0:0.32.0-2.git5941fc0.el8.src", "8Base-RHOSE-4.1:ignition-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-debugsource-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-validate-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-validate-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:pivot-0:0.0.5-2.el8.src", "8Base-RHOSE-4.1:pivot-0:0.0.5-2.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3131" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-4.1:cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.src", "7Server-RH7-RHOSE-4.1:cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64", "7Server-RH7-RHOSE-4.1:cri-o-debuginfo-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64", "7Server-RH7-RHOSE-4.1:cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.src", "7Server-RH7-RHOSE-4.1:cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64", "7Server-RH7-RHOSE-4.1:cri-tools-debuginfo-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64", "7Server-RH7-RHOSE-4.1:faq-0:0.0.6-4.el7.src", "7Server-RH7-RHOSE-4.1:faq-0:0.0.6-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:faq-debuginfo-0:0.0.6-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-0:0.0.2-7.gitd3c94f0.el7.src", "7Server-RH7-RHOSE-4.1:openshift-external-storage-cephfs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-debuginfo-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-efs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-local-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-manila-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-snapshot-controller-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-snapshot-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "8Base-RHOSE-4.1:cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.src", "8Base-RHOSE-4.1:cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "8Base-RHOSE-4.1:cri-o-debuginfo-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "8Base-RHOSE-4.1:cri-o-debugsource-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "8Base-RHOSE-4.1:cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.src", "8Base-RHOSE-4.1:cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.x86_64", "8Base-RHOSE-4.1:ignition-0:0.32.0-2.git5941fc0.el8.src", "8Base-RHOSE-4.1:ignition-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-debugsource-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-validate-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-validate-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:pivot-0:0.0.5-2.el8.src", "8Base-RHOSE-4.1:pivot-0:0.0.5-2.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" } ] }
rhsa-2019:2966
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated Quay packages that fix several bugs and add various enhancements are now available.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Quay 3.1.1 errata release, including:\n\nSecurity Fix(es):\n\n* HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511)\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using PRIORITY frames resulting in excessive resource consumption (CVE-2019-9513)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* HTTP/2: 0-length headers lead to denial of service (CVE-2019-9516)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Fixed repository mirror credentials properly escaped to allow special characters\n* Fixed repository mirror UI cancel button enabled\n* Fixed repository mirror UI change next sync date", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:2966", "url": "https://access.redhat.com/errata/RHSA-2019:2966" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735741" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "1750473", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1750473" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2966.json" } ], "title": "Red Hat Security Advisory: Red Hat Quay v3.1.1 security update", "tracking": { "current_release_date": "2025-03-15T19:44:30+00:00", "generator": { "date": "2025-03-15T19:44:30+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.1" } }, "id": "RHSA-2019:2966", "initial_release_date": "2019-10-03T18:57:22+00:00", "revision_history": [ { "date": "2019-10-03T18:57:22+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-10-03T18:57:22+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-03-15T19:44:30+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Quay v3", "product": { "name": "Quay v3", "product_id": "7Server-RH7-Quay-3", "product_identification_helper": { "cpe": "cpe:/a:redhat:quay:3::el7" } } } ], "category": "product_family", "name": "Red Hat Quay" }, { "branches": [ { "category": "product_version", "name": "quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64", "product": { "name": "quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64", "product_id": "quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64", "product_identification_helper": { "purl": "pkg:oci/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821?arch=amd64\u0026repository_url=registry.redhat.io/quay3/clair-jwt\u0026tag=v2.0.9-7" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64 as a component of Quay v3", "product_id": "7Server-RH7-Quay-3:quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64" }, "product_reference": "quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64", "relates_to_product_reference": "7Server-RH7-Quay-3" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-9511", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741860" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker can request a large amount of data by manipulating window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this queue can consume excess CPU, memory, or both, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: large amount of data requests leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "There are no mitigations available for nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-Quay-3:quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "RHBZ#1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9511", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-03T18:57:22+00:00", "details": "Please download the release images via:\n\nquay.io/redhat/quay:v3.1.1\nquay.io/redhat/clair-jwt:v3.1.1\nquay.io/redhat/quay-builder:v3.1.1", "product_ids": [ "7Server-RH7-Quay-3:quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2966" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "7Server-RH7-Quay-3:quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-Quay-3:quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: large amount of data requests leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-Quay-3:quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-03T18:57:22+00:00", "details": "Please download the release images via:\n\nquay.io/redhat/quay:v3.1.1\nquay.io/redhat/clair-jwt:v3.1.1\nquay.io/redhat/quay-builder:v3.1.1", "product_ids": [ "7Server-RH7-Quay-3:quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2966" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-Quay-3:quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9513", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735741" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker, using PRIORITY frames to flood the system, could cause excessive CPU usage and starvation of other clients. The largest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PRIORITY frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for packages nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-Quay-3:quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9513" }, { "category": "external", "summary": "RHBZ#1735741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735741" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9513", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9513" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9513", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9513" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nghttp2.org/blog/2019/08/19/nghttp2-v1-39-2/", "url": "https://nghttp2.org/blog/2019/08/19/nghttp2-v1-39-2/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-03T18:57:22+00:00", "details": "Please download the release images via:\n\nquay.io/redhat/quay:v3.1.1\nquay.io/redhat/clair-jwt:v3.1.1\nquay.io/redhat/quay-builder:v3.1.1", "product_ids": [ "7Server-RH7-Quay-3:quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2966" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "7Server-RH7-Quay-3:quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-Quay-3:quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PRIORITY frames results in excessive resource consumption" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-Quay-3:quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-03T18:57:22+00:00", "details": "Please download the release images via:\n\nquay.io/redhat/quay:v3.1.1\nquay.io/redhat/clair-jwt:v3.1.1\nquay.io/redhat/quay-builder:v3.1.1", "product_ids": [ "7Server-RH7-Quay-3:quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2966" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-Quay-3:quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "cve": "CVE-2019-9516", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741864" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker, sending a stream of header with a 0-length header name and a 0-length header value, could cause some implementations to allocate memory for these headers and keep the allocations alive until the session dies. The can consume excess memory, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: 0-length headers lead to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-Quay-3:quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9516" }, { "category": "external", "summary": "RHBZ#1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9516", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9516" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://github.com/nghttp2/nghttp2/issues/1382#", "url": "https://github.com/nghttp2/nghttp2/issues/1382#" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-03T18:57:22+00:00", "details": "Please download the release images via:\n\nquay.io/redhat/quay:v3.1.1\nquay.io/redhat/clair-jwt:v3.1.1\nquay.io/redhat/quay-builder:v3.1.1", "product_ids": [ "7Server-RH7-Quay-3:quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2966" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "7Server-RH7-Quay-3:quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-Quay-3:quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: 0-length headers lead to denial of service" } ] }
RHSA-2019:4040
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "New Red Hat Single Sign-On 7.3.5 packages are now available for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Single Sign-On 7.3 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications.\n\nThis release of Red Hat Single Sign-On 7.3.5 on RHEL 6 serves as a replacement for Red Hat Single Sign-On 7.3.4, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* keycloak: Service accounts reset password flow not using placeholder.org domain anymore (CVE-2019-14837)\n\n* undertow: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* undertow: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* undertow: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default (CVE-2019-14838)\n\n* wildfly: wildfly-security-manager: security manager authorization bypass (CVE-2019-14843)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:4040", "url": "https://access.redhat.com/errata/RHSA-2019:4040" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.3/", "url": "https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.3/" }, { "category": "external", "summary": "1730227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1730227" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1751227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751227" }, { "category": "external", "summary": "1752980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752980" }, { "category": "external", "summary": "KEYCLOAK-11815", "url": "https://issues.redhat.com/browse/KEYCLOAK-11815" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_4040.json" } ], "title": "Red Hat Security Advisory: Red Hat Single Sign-On 7.3.5 security update on RHEL 6", "tracking": { "current_release_date": "2025-03-15T19:44:39+00:00", "generator": { "date": "2025-03-15T19:44:39+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.1" } }, "id": "RHSA-2019:4040", "initial_release_date": "2019-12-02T17:04:39+00:00", "revision_history": [ { "date": "2019-12-02T17:04:39+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-12-02T17:04:39+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-03-15T19:44:39+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Single Sign-On 7.3 for RHEL 6 Server", "product": { "name": "Red Hat Single Sign-On 7.3 for RHEL 6 Server", "product_id": "6Server-RHSSO-7.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:red_hat_single_sign_on:7::el6" } } } ], "category": "product_family", "name": "Red Hat Single Sign-On" }, { "branches": [ { "category": "product_version", "name": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "product": { "name": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "product_id": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6sso?arch=noarch" } } }, { "category": "product_version", "name": "rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "product": { "name": "rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "product_id": "rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6sso?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "product": { "name": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "product_id": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6sso?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch as a component of Red Hat Single Sign-On 7.3 for RHEL 6 Server", "product_id": "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" }, "product_reference": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "relates_to_product_reference": "6Server-RHSSO-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src as a component of Red Hat Single Sign-On 7.3 for RHEL 6 Server", "product_id": "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src" }, "product_reference": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "relates_to_product_reference": "6Server-RHSSO-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch as a component of Red Hat Single Sign-On 7.3 for RHEL 6 Server", "product_id": "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" }, "product_reference": "rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "relates_to_product_reference": "6Server-RHSSO-7.3" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:04:39+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4040" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:04:39+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4040" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:04:39+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4040" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "Vadim Ashikhman" ] } ], "cve": "CVE-2019-14837", "cwe": { "id": "CWE-547", "name": "Use of Hard-coded, Security-relevant Constants" }, "discovery_date": "2019-07-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1730227" } ], "notes": [ { "category": "description", "text": "A flaw was found in Keycloak. The use of an open hard-coded domain can allow an unauthorized login by setting up a mail server and resetting the user credentials, enabling information disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak: keycloak uses hardcoded open dummy domain for new accounts enabling information disclosure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14837" }, { "category": "external", "summary": "RHBZ#1730227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1730227" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14837", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14837" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14837", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14837" } ], "release_date": "2019-12-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:04:39+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4040" }, { "category": "workaround", "details": "It is not a very straight forward workaround but it is possible to mitigate this by manually editing the default Email ID ([email protected]) to some valid email ID ([email protected]) in the USER_ENTITY table in the RHSSO database used.", "product_ids": [ "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "keycloak: keycloak uses hardcoded open dummy domain for new accounts enabling information disclosure" }, { "acknowledgments": [ { "names": [ "F\u00e1bio Magalh\u00e3es de Andrade" ], "organization": "Sonda Ativas" }, { "names": [ "Juliano de Castro Santos", "Leonard Lunardi" ], "organization": "UnimedBH" } ], "cve": "CVE-2019-14838", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2019-08-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1751227" } ], "notes": [ { "category": "description", "text": "It was found that Wildfly users had default user permissions set incorrectly. A malicious user could use this flaw to access unauthorized controls for the application server.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14838" }, { "category": "external", "summary": "RHBZ#1751227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751227" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14838", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14838" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14838", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14838" }, { "category": "external", "summary": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14838", "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14838" } ], "release_date": "2019-10-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:04:39+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4040" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default" }, { "cve": "CVE-2019-14843", "cwe": { "id": "CWE-592", "name": "CWE-592" }, "discovery_date": "2019-09-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1752980" } ], "notes": [ { "category": "description", "text": "A flaw was found in Wildfly Security Manager, running under JDK 11 or 8, that authorized requests for any requester. This flaw could be used by a malicious app deployed on the app server to access unauthorized information and possibly conduct further attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-security-manager: security manager authorization bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14843" }, { "category": "external", "summary": "RHBZ#1752980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752980" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14843", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14843" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14843", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14843" } ], "release_date": "2019-09-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:04:39+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4040" }, { "category": "workaround", "details": "This flaw only affects the Security Manager running under JDK 11 or 8. To mitigate exposure to this flaw, do not run under those JDK versions.", "product_ids": [ "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "wildfly-security-manager: security manager authorization bypass" } ] }
RHSA-2020:2565
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "This is a security update for JBoss EAP Continuous Delivery 18.0.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Enterprise Application Platform CD18 is a platform for Java applications based on the WildFly application runtime.\n\nThis release of Red Hat JBoss Enterprise Application Platform CD18 includes bug fixes and enhancements. \n\nSecurity Fix(es):\n\n* jackson-databind: Serialization gadgets in org.springframework:spring-aop (CVE-2020-11619)\n* jackson-databind: Serialization gadgets in commons-jelly:commons-jelly (CVE-2020-11620)\n* wildfly: Race condition on PID file allows for termination of arbitrary processes by local users (CVE-2019-3805)\n* undertow: HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511)\n* undertow: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n* undertow: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n* undertow: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n* wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default (CVE-2019-14838)\n* undertow: Memory Leak in Undertow HttpOpenListener due to holding remoting connections indefinitely (CVE-2019-19343)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:2565", "url": "https://access.redhat.com/errata/RHSA-2020:2565" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1660263", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1660263" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "1751227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751227" }, { "category": "external", "summary": "1780445", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1780445" }, { "category": "external", "summary": "1826798", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1826798" }, { "category": "external", "summary": "1826805", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1826805" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_2565.json" } ], "title": "Red Hat Security Advisory: EAP Continuous Delivery Technical Preview Release 18 security update", "tracking": { "current_release_date": "2025-04-09T17:28:47+00:00", "generator": { "date": "2025-04-09T17:28:47+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.2" } }, "id": "RHSA-2020:2565", "initial_release_date": "2020-06-15T16:17:24+00:00", "revision_history": [ { "date": "2020-06-15T16:17:24+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-06-15T16:17:24+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-04-09T17:28:47+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform Continuous Delivery", "product": { "name": "Red Hat JBoss Enterprise Application Platform Continuous Delivery", "product_id": "Red Hat JBoss Enterprise Application Platform Continuous Delivery", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform_cd:18" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Daniel Le Gall" ], "organization": "SCRT Information Security" } ], "cve": "CVE-2019-3805", "cwe": { "id": "CWE-364", "name": "Signal Handler Race Condition" }, "discovery_date": "2018-11-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1660263" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in wildfly that would allow local users, who are able to execute init.d script, to terminate arbitrary processes on the system. An attacker could exploit this by modifying the PID file in /var/run/jboss-eap/ allowing the init.d script to terminate any process as root.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly: Race condition on PID file allows for termination of arbitrary processes by local users", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-3805" }, { "category": "external", "summary": "RHBZ#1660263", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1660263" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-3805", "url": "https://www.cve.org/CVERecord?id=CVE-2019-3805" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3805", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3805" } ], "release_date": "2019-04-30T17:12:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-15T16:17:24+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nYou must restart the JBoss server process for the update to take effect.\n\nThe References section of this erratum contains a download link (you must log in to download the update)", "product_ids": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2565" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wildfly: Race condition on PID file allows for termination of arbitrary processes by local users" }, { "cve": "CVE-2019-9511", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741860" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker can request a large amount of data by manipulating window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this queue can consume excess CPU, memory, or both, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: large amount of data requests leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "There are no mitigations available for nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "RHBZ#1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9511", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-15T16:17:24+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nYou must restart the JBoss server process for the update to take effect.\n\nThe References section of this erratum contains a download link (you must log in to download the update)", "product_ids": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2565" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: large amount of data requests leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-15T16:17:24+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nYou must restart the JBoss server process for the update to take effect.\n\nThe References section of this erratum contains a download link (you must log in to download the update)", "product_ids": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2565" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-15T16:17:24+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nYou must restart the JBoss server process for the update to take effect.\n\nThe References section of this erratum contains a download link (you must log in to download the update)", "product_ids": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2565" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-15T16:17:24+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nYou must restart the JBoss server process for the update to take effect.\n\nThe References section of this erratum contains a download link (you must log in to download the update)", "product_ids": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2565" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "F\u00e1bio Magalh\u00e3es de Andrade" ], "organization": "Sonda Ativas" }, { "names": [ "Juliano de Castro Santos", "Leonard Lunardi" ], "organization": "UnimedBH" } ], "cve": "CVE-2019-14838", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2019-08-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1751227" } ], "notes": [ { "category": "description", "text": "It was found that Wildfly users had default user permissions set incorrectly. A malicious user could use this flaw to access unauthorized controls for the application server.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14838" }, { "category": "external", "summary": "RHBZ#1751227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751227" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14838", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14838" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14838", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14838" }, { "category": "external", "summary": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14838", "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14838" } ], "release_date": "2019-10-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-15T16:17:24+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nYou must restart the JBoss server process for the update to take effect.\n\nThe References section of this erratum contains a download link (you must log in to download the update)", "product_ids": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2565" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default" }, { "cve": "CVE-2019-19343", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-12-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1780445" } ], "notes": [ { "category": "description", "text": "A flaw was found in Undertow when using Remoting as shipped in Red Hat Jboss EAP before version 7.2.4. A memory leak in HttpOpenListener due to holding remote connections indefinitely may lead to denial of service. Versions before undertow 2.0.25.SP1 and jboss-remoting 5.0.14.SP1 are believed to be vulnerable.", "title": "Vulnerability description" }, { "category": "summary", "text": "Undertow: Memory Leak in Undertow HttpOpenListener due to holding remoting connections indefinitely", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19343" }, { "category": "external", "summary": "RHBZ#1780445", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1780445" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19343", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19343" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19343", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19343" } ], "release_date": "2019-12-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-15T16:17:24+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nYou must restart the JBoss server process for the update to take effect.\n\nThe References section of this erratum contains a download link (you must log in to download the update)", "product_ids": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2565" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Undertow: Memory Leak in Undertow HttpOpenListener due to holding remoting connections indefinitely" }, { "cve": "CVE-2020-11619", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-04-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1826805" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.springframework:spring-aop", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11619" }, { "category": "external", "summary": "RHBZ#1826805", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1826805" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11619", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11619" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11619", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11619" } ], "release_date": "2020-04-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-15T16:17:24+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nYou must restart the JBoss server process for the update to take effect.\n\nThe References section of this erratum contains a download link (you must log in to download the update)", "product_ids": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2565" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in org.springframework:spring-aop" }, { "cve": "CVE-2020-11620", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-04-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1826798" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in commons-jelly:commons-jelly", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11620" }, { "category": "external", "summary": "RHBZ#1826798", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1826798" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11620", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11620" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11620", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11620" } ], "release_date": "2020-04-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-15T16:17:24+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nYou must restart the JBoss server process for the update to take effect.\n\nThe References section of this erratum contains a download link (you must log in to download the update)", "product_ids": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2565" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in commons-jelly:commons-jelly" } ] }
rhsa-2020:3197
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat Process Automation Manager.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Process Automation Manager is an open source business process management suite that combines process management and decision service management and enables business and IT users to create, manage, validate, and deploy process applications and decision services.\n\nThis release of Red Hat Process Automation Manager 7.8.0 serves as an update to Red Hat Process Automation Manager 7.7.1, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* commons-beanutils: apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default (CVE-2019-10086)\n\n* netty: HTTP request smuggling (CVE-2019-20444)\n\n* netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers (CVE-2019-16869)\n\n* netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling (CVE-2020-7238)\n\n* netty: HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)\n\n* netty: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* netty: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* netty: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header (CVE-2019-20445)\n\n* cxf-core: cxf: does not restrict the number of message attachments (CVE-2019-12406)\n\n* cxf-core: cxf: OpenId Connect token service does not properly validate the clientId (CVE-2019-12423)\n\n* cxf-core: cxf: reflected XSS in the services listing page (CVE-2019-17573)\n\n* jackson-databind: lacks certain net.sf.ehcache blocking (CVE-2019-20330)\n\n* jackson-databind: Lacks certain xbean-reflect/JNDI blocking (CVE-2020-8840)\n\n* jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution (CVE-2020-10672)\n\n* jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution (CVE-2020-10673)\n\n* jackson-databind: Serialization gadgets in anteros-core (CVE-2020-9548)\n\n* jackson-databind: Serialization gadgets in commons-jelly:commons-jelly (CVE-2020-11620)\n\n* jackson-databind: Serialization gadgets in ibatis-sqlmap (CVE-2020-9547)\n\n* jackson-databind: Serialization gadgets in javax.swing.JEditorPane (CVE-2020-10969)\n\n* jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider (CVE-2020-10968)\n\n* jackson-databind: Serialization gadgets in org.apache.activemq.jms.pool.XaPooledConnectionFactory (CVE-2020-11111)\n\n* jackson-databind: Serialization gadgets in org.apache.commons.proxy.provider.remoting.RmiProvider (CVE-2020-11112)\n\n* jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime (CVE-2020-11113)\n\n* jackson-databind: Serialization gadgets in org.springframework:spring-aop (CVE-2020-11619)\n\n* jackson-databind: Serialization gadgets in shaded-hikari-config (CVE-2020-9546)\n\n* jackson-databind: serialization in com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool (CVE-2020-14062)\n\n* jackson-databind: serialization in weblogic/oracle-aqjms (CVE-2020-14061)\n\n* jackson-databind: serialization in oadd.org.apache.xalan.lib.sql.JNDIConnectionPool (CVE-2020-14060)\n\n* netty: compression/decompression codecs don\u0027t enforce limits on buffer allocation sizes (CVE-2020-11612)\n\n* quartz: libquartz: XXE attacks via job description (CVE-2019-13990)\n\n* keycloak: security issue on reset credential flow (CVE-2020-1718)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:3197", "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=rhpam\u0026version=7.8.0", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=rhpam\u0026version=7.8.0" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_process_automation_manager/7.8/html/release_notes_for_red_hat_process_automation_manager_7.8/index", "url": "https://access.redhat.com/documentation/en-us/red_hat_process_automation_manager/7.8/html/release_notes_for_red_hat_process_automation_manager_7.8/index" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "1758619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758619" }, { "category": "external", "summary": "1767483", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767483" }, { "category": "external", "summary": "1793154", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793154" }, { "category": "external", "summary": "1796225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796225" }, { "category": "external", "summary": "1796756", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796756" }, { "category": "external", "summary": "1797006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1797006" }, { "category": "external", "summary": "1797011", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1797011" }, { "category": "external", "summary": "1798509", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798509" }, { "category": "external", "summary": "1798524", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798524" }, { "category": "external", "summary": "1801149", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1801149" }, { "category": "external", "summary": "1815470", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1815470" }, { "category": "external", "summary": "1815495", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1815495" }, { "category": "external", "summary": "1816170", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816170" }, { "category": "external", "summary": "1816216", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816216" }, { "category": "external", "summary": "1816330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816330" }, { "category": "external", "summary": "1816332", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816332" }, { "category": "external", "summary": "1816337", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816337" }, { "category": "external", "summary": "1816340", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816340" }, { "category": "external", "summary": "1819208", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819208" }, { "category": "external", "summary": "1819212", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819212" }, { "category": "external", "summary": "1821304", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821304" }, { "category": "external", "summary": "1821311", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821311" }, { "category": "external", "summary": "1821315", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821315" }, { "category": "external", "summary": "1826798", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1826798" }, { "category": "external", "summary": "1826805", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1826805" }, { "category": "external", "summary": "1848960", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848960" }, { "category": "external", "summary": "1848962", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848962" }, { "category": "external", "summary": "1848966", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848966" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_3197.json" } ], "title": "Red Hat Security Advisory: Red Hat Process Automation Manager 7.8.0 Security Update", "tracking": { "current_release_date": "2025-04-09T17:54:09+00:00", "generator": { "date": "2025-04-09T17:54:09+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.2" } }, "id": "RHSA-2020:3197", "initial_release_date": "2020-07-29T06:21:49+00:00", "revision_history": [ { "date": "2020-07-29T06:21:49+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-07-29T06:21:49+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-04-09T17:54:09+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Process Automation 7", "product": { "name": "Red Hat Process Automation 7", "product_id": "Red Hat Process Automation 7", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_bpms_platform:7.8" } } } ], "category": "product_family", "name": "Red Hat Process Automation Manager" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9518", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735749" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using frames with an empty payload, a flood could occur that results in excessive CPU usage and starvation of other clients. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using empty frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9518" }, { "category": "external", "summary": "RHBZ#1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9518", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using empty frames results in excessive resource consumption" }, { "cve": "CVE-2019-10086", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-10-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1767483" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Apache Commons BeanUtils, where the class property in PropertyUtilsBean is not suppressed by default. This flaw allows an attacker to access the classloader.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10086" }, { "category": "external", "summary": "RHBZ#1767483", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767483" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10086", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10086" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10086", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10086" }, { "category": "external", "summary": "https://commons.apache.org/proper/commons-beanutils/javadocs/v1.9.4/RELEASE-NOTES.txt", "url": "https://commons.apache.org/proper/commons-beanutils/javadocs/v1.9.4/RELEASE-NOTES.txt" } ], "release_date": "2019-08-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "There is no currently known mitigation for this flaw.", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default" }, { "cve": "CVE-2019-12406", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-03-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816170" } ], "notes": [ { "category": "description", "text": "Apache CXF before 3.3.4 and 3.2.11 does not restrict the number of message attachments present in a given message. This leaves open the possibility of a denial of service type attack, where a malicious user crafts a message containing a very large number of message attachments. From the 3.3.4 and 3.2.11 releases, a default limit of 50 message attachments is enforced. This is configurable via the message property \"attachment-max-count\".", "title": "Vulnerability description" }, { "category": "summary", "text": "cxf: does not restrict the number of message attachments", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-12406" }, { "category": "external", "summary": "RHBZ#1816170", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816170" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-12406", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12406" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-12406", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12406" } ], "release_date": "2019-11-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "cxf: does not restrict the number of message attachments" }, { "cve": "CVE-2019-12423", "cwe": { "id": "CWE-522", "name": "Insufficiently Protected Credentials" }, "discovery_date": "2020-01-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1797006" } ], "notes": [ { "category": "description", "text": "Apache CXF ships with a OpenId Connect JWK Keys service, which allows a client to obtain the public keys in JWK format, which can then be used to verify the signature of tokens issued by the service. Typically, the service obtains the public key from a local keystore (JKS/PKCS12) by specifing the path of the keystore and the alias of the keystore entry. This case is not vulnerable. However it is also possible to obtain the keys from a JWK keystore file, by setting the configuration parameter \"rs.security.keystore.type\" to \"jwk\". For this case all keys are returned in this file \"as is\", including all private key and secret key credentials. This is an obvious security risk if the user has configured the signature keystore file with private or secret key credentials. From CXF 3.3.5 and 3.2.12, it is mandatory to specify an alias corresponding to the id of the key in the JWK file, and only this key is returned. In addition, any private key information is omitted by default. \"oct\" keys, which contain secret keys, are not returned at all.", "title": "Vulnerability description" }, { "category": "summary", "text": "cxf: OpenId Connect token service does not properly validate the clientId", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-12423" }, { "category": "external", "summary": "RHBZ#1797006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1797006" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-12423", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12423" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-12423", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12423" } ], "release_date": "2020-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "cxf: OpenId Connect token service does not properly validate the clientId" }, { "cve": "CVE-2019-13990", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "discovery_date": "2019-07-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1801149" } ], "notes": [ { "category": "description", "text": "The Terracotta Quartz Scheduler is susceptible to an XML external entity attack (XXE) through a job description. This issue stems from inadequate handling of XML external entity (XXE) declarations in the initDocumentParser function within xml/XMLSchedulingDataProcessor.java. By enticing a victim to access a maliciously crafted job description (containing XML content), a remote attacker could exploit this vulnerability to execute an XXE attack on the targeted system.", "title": "Vulnerability description" }, { "category": "summary", "text": "libquartz: XXE attacks via job description", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 uses a vulnerable version of libquartz as a dependency for Candlepin. However, the \u003cjob\u003e\u003cdescrition\u003e entry is not used, and the vulnerability can not be triggered. An update may fix the code in the future.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-13990" }, { "category": "external", "summary": "RHBZ#1801149", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1801149" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-13990", "url": "https://www.cve.org/CVERecord?id=CVE-2019-13990" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-13990", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-13990" } ], "release_date": "2019-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libquartz: XXE attacks via job description" }, { "cve": "CVE-2019-16869", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2019-09-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1758619" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty, where whitespace before the colon in HTTP headers is mishandled. This flaw allows an attacker to cause HTTP request smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that this vulnerability does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships vulnerable netty version embedded in Candlepin, however, is not directly vulnerable since HTTP requests are handled by Tomcat and not netty.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-16869" }, { "category": "external", "summary": "RHBZ#1758619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758619" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16869", "url": "https://www.cve.org/CVERecord?id=CVE-2019-16869" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16869", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16869" } ], "release_date": "2019-09-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers" }, { "cve": "CVE-2019-17573", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2020-01-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1797011" } ], "notes": [ { "category": "description", "text": "By default, Apache CXF creates a /services page containing a listing of the available endpoint names and addresses. This webpage is vulnerable to a reflected Cross-Site Scripting (XSS) attack, which allows a malicious actor to inject javascript into the web page. Please note that the attack exploits a feature which is not typically not present in modern browsers, who remove dot segments before sending the request. However, Mobile applications may be vulnerable.", "title": "Vulnerability description" }, { "category": "summary", "text": "cxf: reflected XSS in the services listing page", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-17573" }, { "category": "external", "summary": "RHBZ#1797011", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1797011" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-17573", "url": "https://www.cve.org/CVERecord?id=CVE-2019-17573" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-17573", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17573" } ], "release_date": "2020-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "Mitigate this flaw by disabling the service listing altogether; via setting the \"hide-service-list-page\" servlet parameter to \"true\".", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "cxf: reflected XSS in the services listing page" }, { "cve": "CVE-2019-20330", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-01-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1793154" } ], "notes": [ { "category": "description", "text": "FasterXML jackson-databind 2.x before 2.9.10.2 lacks certain net.sf.ehcache blocking.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: lacks certain net.sf.ehcache blocking", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20330" }, { "category": "external", "summary": "RHBZ#1793154", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793154" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20330", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20330" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20330", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20330" } ], "release_date": "2020-01-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: lacks certain net.sf.ehcache blocking" }, { "cve": "CVE-2019-20444", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1798524" } ], "notes": [ { "category": "description", "text": "A HTTP smuggling flaw was found in HttpObjectDecoder.java in Netty in versions prior to version 4.1.44. HTTP headers with an invalid fold, in this case CRLF (carriage return, line feed) without being followed by SP (space) or HTAB (horizontal tab), result in situations where headers can be misread. Data integrity is the highest threat with this vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP request smuggling", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that the previous vulnerability, CVE-2019-16869, does not pose a substantial practical threat to ElasticSearch 6. We agree that these issues would be difficult to exploit on OpenShift Container Platform so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships a vulnerable version of netty embedded in Candlepin. However, the flaw can not be triggered in that context, because HTTP requests are handled by Tomcat, not by netty. A future release may fix this.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20444" }, { "category": "external", "summary": "RHBZ#1798524", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798524" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20444", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20444" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20444", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20444" }, { "category": "external", "summary": "https://github.com/elastic/elasticsearch/issues/49396", "url": "https://github.com/elastic/elasticsearch/issues/49396" } ], "release_date": "2020-01-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP request smuggling" }, { "cve": "CVE-2019-20445", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1798509" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty before version 4.1.44, where it accepted multiple Content-Length headers and also accepted both Transfer-Encoding, as well as Content-Length headers where it should reject the message under such circumstances. In circumstances where Netty is used in the context of a server, it could result in a viable HTTP smuggling vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that the previous vulnerability, CVE-2019-16869, does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit both these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships a vulnerable version of netty embedded in Candlepin. However, the flaw can not be triggered in that context, because HTTP requests are handled by Tomcat, not by netty. A future release may fix this.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20445" }, { "category": "external", "summary": "RHBZ#1798509", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798509" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20445", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20445" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20445", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20445" } ], "release_date": "2020-01-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header" }, { "cve": "CVE-2020-1718", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2020-01-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1796756" } ], "notes": [ { "category": "description", "text": "A flaw was found in the reset credential flow in Keycloak. This flaw allows an attacker to gain unauthorized access to the application.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak: security issue on reset credential flow", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-1718" }, { "category": "external", "summary": "RHBZ#1796756", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796756" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-1718", "url": "https://www.cve.org/CVERecord?id=CVE-2020-1718" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1718", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1718" } ], "release_date": "2020-05-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "Disable reset credential flow.", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "keycloak: security issue on reset credential flow" }, { "cve": "CVE-2020-7238", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1796225" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty, where it mishandles Transfer-Encoding whitespace. This flaw allows HTTP Request Smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that the previous vulnerability, CVE-2019-16869, does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit both these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships vulnerable netty version embedded in Candlepin, however, is not directly vulnerable since HTTP requests are handled by Tomcat and not netty.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-7238" }, { "category": "external", "summary": "RHBZ#1796225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796225" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-7238", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7238" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7238", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7238" }, { "category": "external", "summary": "https://netty.io/news/2019/12/18/4-1-44-Final.html", "url": "https://netty.io/news/2019/12/18/4-1-44-Final.html" } ], "release_date": "2020-01-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling" }, { "cve": "CVE-2020-8840", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816330" } ], "notes": [ { "category": "description", "text": "A flaw was found in FasterXML jackson-databind in versions 2.0.0 through 2.9.10.2. A \"gadget\" exploit is possible due to a lack of a Java object being blocking from being deserialized. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Lacks certain xbean-reflect/JNDI blocking", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8840" }, { "category": "external", "summary": "RHBZ#1816330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816330" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8840", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8840" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8840", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8840" } ], "release_date": "2020-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Lacks certain xbean-reflect/JNDI blocking" }, { "cve": "CVE-2020-9546", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816332" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in shaded-hikari-config", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9546" }, { "category": "external", "summary": "RHBZ#1816332", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816332" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9546", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9546" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9546", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9546" } ], "release_date": "2020-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in shaded-hikari-config" }, { "cve": "CVE-2020-9547", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816337" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in ibatis-sqlmap", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9547" }, { "category": "external", "summary": "RHBZ#1816337", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816337" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9547", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9547" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9547", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9547" } ], "release_date": "2020-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in ibatis-sqlmap" }, { "cve": "CVE-2020-9548", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816340" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in anteros-core", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9548" }, { "category": "external", "summary": "RHBZ#1816340", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816340" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9548", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9548" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9548", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9548" } ], "release_date": "2020-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in anteros-core" }, { "cve": "CVE-2020-10672", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2020-03-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1815495" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10672" }, { "category": "external", "summary": "RHBZ#1815495", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1815495" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10672", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10672" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10672", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10672" } ], "release_date": "2020-03-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution" }, { "cve": "CVE-2020-10673", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2020-03-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1815470" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time. Additionally, the gadget is not available within Red Hat Openstack Platform\u0027s OpenDaylight.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10673" }, { "category": "external", "summary": "RHBZ#1815470", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1815470" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10673", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10673" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10673", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10673" } ], "release_date": "2020-03-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution" }, { "cve": "CVE-2020-10968", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1819208" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x prior to version 2.9.10.4. The interaction between serialization gadgets and typing is mishandled in the bus-proxy. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10968" }, { "category": "external", "summary": "RHBZ#1819208", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819208" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10968", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10968" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10968", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10968" } ], "release_date": "2020-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider" }, { "cve": "CVE-2020-10969", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1819212" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in javax.swing.JEditorPane", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10969" }, { "category": "external", "summary": "RHBZ#1819212", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819212" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10969", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10969" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10969", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10969" } ], "release_date": "2020-03-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in javax.swing.JEditorPane" }, { "cve": "CVE-2020-11111", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2020-03-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1821304" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.apache.activemq.jms.pool.XaPooledConnectionFactory", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11111" }, { "category": "external", "summary": "RHBZ#1821304", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821304" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11111", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11111" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11111", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11111" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/2664", "url": "https://github.com/FasterXML/jackson-databind/issues/2664" } ], "release_date": "2020-03-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in org.apache.activemq.jms.pool.XaPooledConnectionFactory" }, { "cve": "CVE-2020-11112", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2020-03-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1821311" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.apache.commons.proxy.provider.remoting.RmiProvider", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11112" }, { "category": "external", "summary": "RHBZ#1821311", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821311" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11112", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11112" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11112", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11112" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/2666", "url": "https://github.com/FasterXML/jackson-databind/issues/2666" } ], "release_date": "2020-03-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in org.apache.commons.proxy.provider.remoting.RmiProvider" }, { "cve": "CVE-2020-11113", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2020-03-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1821315" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11113" }, { "category": "external", "summary": "RHBZ#1821315", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821315" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11113", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11113" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11113", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11113" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/2670", "url": "https://github.com/FasterXML/jackson-databind/issues/2670" } ], "release_date": "2020-03-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime" }, { "cve": "CVE-2020-11612", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-03-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816216" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty in the way it handles the amount of data it compresses and decompresses. The Compression/Decompression codecs should enforce memory allocation size limits to avoid an Out of Memory Error (OOME) or exhaustion of the memory pool.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: compression/decompression codecs don\u0027t enforce limits on buffer allocation sizes", "title": "Vulnerability summary" }, { "category": "other", "text": "In OpenShift Container Platform end users don\u0027t have direct access to send requests to ElasticSearch. A user could need access to the ElasticSearch service on the internal cluster network in order to be able to send malicious requests to it.\n\n\nThird party scanners flagging Red Hat Satellite due to availability of the higher version packages in Red Hat AMQ Clients (through errata RHSA-2020:2605) compare to the qpid packages from Satellite Tools repository. qpid dependency fixed in errata RHSA-2020:2605 was for Red Hat AMQ Clients and it doesn\u0027t necessarily mean that packages from Satellite Tools are affected. These are two different products with different architecture and code-base. Updating the packages from any other repository than the Satellite-tools repository is not recommended for Satellite Customers. \n\nRed Hat Satellite 6.7 and earlier ship affected version of netty, however, there is no external connection being exposed and it is used by only Artemis to open an internal connection within the JVM. Since netty does not come into contact with untrusted data, vulnerability is not exposed in product code and there is no breach of Confidentiality, Integrity or Availability expected from this vulnerability. We may update the netty and its dependency in a future release.\n\nMore information regarding Satellite related packages can be found on KCS: https://access.redhat.com/solutions/5200591", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11612" }, { "category": "external", "summary": "RHBZ#1816216", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816216" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11612", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11612" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11612", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11612" } ], "release_date": "2020-01-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "netty: compression/decompression codecs don\u0027t enforce limits on buffer allocation sizes" }, { "cve": "CVE-2020-11619", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-04-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1826805" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.springframework:spring-aop", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11619" }, { "category": "external", "summary": "RHBZ#1826805", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1826805" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11619", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11619" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11619", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11619" } ], "release_date": "2020-04-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in org.springframework:spring-aop" }, { "cve": "CVE-2020-11620", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-04-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1826798" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in commons-jelly:commons-jelly", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11620" }, { "category": "external", "summary": "RHBZ#1826798", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1826798" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11620", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11620" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11620", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11620" } ], "release_date": "2020-04-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in commons-jelly:commons-jelly" }, { "cve": "CVE-2020-14060", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-06-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1848960" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.5. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: serialization in oadd.org.apache.xalan.lib.sql.JNDIConnectionPool", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 and Red Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.\n\nThe version of jackson-databind as shipped in Red Hat Software Collections rh-maven35 is used only while building maven, thus it does not deserialize data coming from untrusted sources, lowering the impact of the vulnerability for the Product.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14060" }, { "category": "external", "summary": "RHBZ#1848960", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848960" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14060", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14060" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14060", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14060" } ], "release_date": "2020-05-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* enableDefaultTyping()\n* @JsonTypeInfo using id.CLASS or id.MINIMAL_CLASS\n* oadd.org.apache.xalan.lib.sql.JNDIConnectionPool in classpath", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: serialization in oadd.org.apache.xalan.lib.sql.JNDIConnectionPool" }, { "cve": "CVE-2020-14061", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-06-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1848966" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.5. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: serialization in weblogic/oracle-aqjms", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 and Red Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.\n\nThe version of jackson-databind as shipped in Red Hat Software Collections rh-maven35 is used only while building maven, thus it does not deserialize data coming from untrusted sources, lowering the impact of the vulnerability for the Product.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14061" }, { "category": "external", "summary": "RHBZ#1848966", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848966" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14061", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14061" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14061", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14061" } ], "release_date": "2020-05-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* enableDefaultTyping()\n* @JsonTypeInfo using id.CLASS or id.MINIMAL_CLASS\n* oracle.jms.AQjms*ConnectionFactory in classpath", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: serialization in weblogic/oracle-aqjms" }, { "cve": "CVE-2020-14062", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-06-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1848962" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.5. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: serialization in com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 and Red Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.\n\nThe version of jackson-databind as shipped in Red Hat Software Collections rh-maven35 is used only while building maven, thus it does not deserialize data coming from untrusted sources, lowering the impact of the vulnerability for the Product.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14062" }, { "category": "external", "summary": "RHBZ#1848962", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848962" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14062", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14062" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14062", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14062" } ], "release_date": "2020-05-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* enableDefaultTyping()\n* @JsonTypeInfo using id.CLASS or id.MINIMAL_CLASS\n* com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool in classpath", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: serialization in com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool" } ] }
rhsa-2019:2769
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An security update is now available for Red Hat OpenShift Container Platform 3.9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private cloud deployments.\n\nThis advisory contains RPM packages for Red Hat OpenShift Container\nPlatform 3.9, which have been rebuilt with an updated version of golang.\n\nSecurity Fix(es):\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* kubernetes: API server allows access to cluster-scoped custom resources as if resources were namespaced (CVE-2019-11247)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:2769", "url": "https://access.redhat.com/errata/RHSA-2019:2769" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1732192", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1732192" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2769.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 3.9 security update", "tracking": { "current_release_date": "2025-03-15T19:44:42+00:00", "generator": { "date": "2025-03-15T19:44:42+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.1" } }, "id": "RHSA-2019:2769", "initial_release_date": "2019-10-24T21:31:32+00:00", "revision_history": [ { "date": "2019-10-24T21:31:32+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-10-24T21:31:32+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-03-15T19:44:42+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 3.9", "product": { "name": "Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:3.9::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "cri-o-0:1.9.16-3.git858756d.el7.x86_64", "product": { "name": "cri-o-0:1.9.16-3.git858756d.el7.x86_64", "product_id": "cri-o-0:1.9.16-3.git858756d.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.9.16-3.git858756d.el7.x86_64", "product": { "name": "cri-o-debuginfo-0:1.9.16-3.git858756d.el7.x86_64", "product_id": "cri-o-debuginfo-0:1.9.16-3.git858756d.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.x86_64", "product": { "name": "golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.x86_64", "product_id": "golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-external-storage-efs-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "product": { "name": "openshift-external-storage-efs-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "product_id": "openshift-external-storage-efs-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-efs-provisioner@0.0.1-9.git78d6339.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-external-storage-local-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "product": { "name": "openshift-external-storage-local-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "product_id": "openshift-external-storage-local-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-local-provisioner@0.0.1-9.git78d6339.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-external-storage-snapshot-controller-0:0.0.1-9.git78d6339.el7.x86_64", "product": { "name": "openshift-external-storage-snapshot-controller-0:0.0.1-9.git78d6339.el7.x86_64", "product_id": "openshift-external-storage-snapshot-controller-0:0.0.1-9.git78d6339.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-snapshot-controller@0.0.1-9.git78d6339.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-external-storage-snapshot-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "product": { "name": "openshift-external-storage-snapshot-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "product_id": "openshift-external-storage-snapshot-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-snapshot-provisioner@0.0.1-9.git78d6339.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-external-storage-debuginfo-0:0.0.1-9.git78d6339.el7.x86_64", "product": { "name": "openshift-external-storage-debuginfo-0:0.0.1-9.git78d6339.el7.x86_64", "product_id": "openshift-external-storage-debuginfo-0:0.0.1-9.git78d6339.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-0:3.9.101-1.git.0.150f595.el7.x86_64", "product": { "name": "atomic-openshift-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_id": "atomic-openshift-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-clients-0:3.9.101-1.git.0.150f595.el7.x86_64", "product": { "name": "atomic-openshift-clients-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_id": "atomic-openshift-clients-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-clients-redistributable-0:3.9.101-1.git.0.150f595.el7.x86_64", "product": { "name": "atomic-openshift-clients-redistributable-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_id": "atomic-openshift-clients-redistributable-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-clients-redistributable@3.9.101-1.git.0.150f595.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-cluster-capacity-0:3.9.101-1.git.0.150f595.el7.x86_64", "product": { "name": "atomic-openshift-cluster-capacity-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_id": "atomic-openshift-cluster-capacity-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-federation-services-0:3.9.101-1.git.0.150f595.el7.x86_64", "product": { "name": "atomic-openshift-federation-services-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_id": "atomic-openshift-federation-services-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-master-0:3.9.101-1.git.0.150f595.el7.x86_64", "product": { "name": "atomic-openshift-master-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_id": "atomic-openshift-master-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-node-0:3.9.101-1.git.0.150f595.el7.x86_64", "product": { "name": "atomic-openshift-node-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_id": "atomic-openshift-node-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-pod-0:3.9.101-1.git.0.150f595.el7.x86_64", "product": { "name": "atomic-openshift-pod-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_id": "atomic-openshift-pod-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-sdn-ovs-0:3.9.101-1.git.0.150f595.el7.x86_64", "product": { "name": "atomic-openshift-sdn-ovs-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_id": "atomic-openshift-sdn-ovs-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-service-catalog-0:3.9.101-1.git.0.150f595.el7.x86_64", "product": { "name": "atomic-openshift-service-catalog-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_id": "atomic-openshift-service-catalog-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-template-service-broker-0:3.9.101-1.git.0.150f595.el7.x86_64", "product": { "name": "atomic-openshift-template-service-broker-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_id": "atomic-openshift-template-service-broker-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-template-service-broker@3.9.101-1.git.0.150f595.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-tests-0:3.9.101-1.git.0.150f595.el7.x86_64", "product": { "name": "atomic-openshift-tests-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_id": "atomic-openshift-tests-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.x86_64", "product": { "name": "atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.x86_64", "product_id": "atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-dockerregistry-0:3.9.101-1.git.1.13625cf.el7.x86_64", "product": { "name": "atomic-openshift-dockerregistry-0:3.9.101-1.git.1.13625cf.el7.x86_64", "product_id": "atomic-openshift-dockerregistry-0:3.9.101-1.git.1.13625cf.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "prometheus-node-exporter-0:3.9.101-1.git.1.8295224.el7.x86_64", "product": { "name": "prometheus-node-exporter-0:3.9.101-1.git.1.8295224.el7.x86_64", "product_id": "prometheus-node-exporter-0:3.9.101-1.git.1.8295224.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "product": { "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "product_id": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-openshift-prometheus-alert-buffer@0-3.gitceca8c1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "ansible-service-broker-0:1.1.20-2.el7.x86_64", "product": { "name": "ansible-service-broker-0:1.1.20-2.el7.x86_64", "product_id": "ansible-service-broker-0:1.1.20-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "heapster-0:1.3.0-4.el7.x86_64", "product": { "name": "heapster-0:1.3.0-4.el7.x86_64", "product_id": "heapster-0:1.3.0-4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "product": { "name": "hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "product_id": "hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-eventrouter-0:0.1-3.git5bd9251.el7.x86_64", "product": { "name": "openshift-eventrouter-0:0.1-3.git5bd9251.el7.x86_64", "product_id": "openshift-eventrouter-0:0.1-3.git5bd9251.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-eventrouter-debuginfo-0:0.1-3.git5bd9251.el7.x86_64", "product": { "name": "openshift-eventrouter-debuginfo-0:0.1-3.git5bd9251.el7.x86_64", "product_id": "openshift-eventrouter-debuginfo-0:0.1-3.git5bd9251.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "product": { "name": "cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "product_id": "cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "cri-tools-debuginfo-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "product": { "name": "cri-tools-debuginfo-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "product_id": "cri-tools-debuginfo-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.5.2-6.el7.x86_64", "product": { "name": "containernetworking-plugins-0:0.5.2-6.el7.x86_64", "product_id": "containernetworking-plugins-0:0.5.2-6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.5.2-6.el7.x86_64", "product": { "name": "containernetworking-plugins-debuginfo-0:0.5.2-6.el7.x86_64", "product_id": "containernetworking-plugins-debuginfo-0:0.5.2-6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "product": { "name": "golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "product_id": "golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "product": { "name": "prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "product_id": "prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "image-inspector-0:2.1.3-2.el7.x86_64", "product": { "name": "image-inspector-0:2.1.3-2.el7.x86_64", "product_id": "image-inspector-0:2.1.3-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "openvswitch-ovn-kubernetes-0:0.1.0-3.el7.x86_64", "product": { "name": "openvswitch-ovn-kubernetes-0:0.1.0-3.el7.x86_64", "product_id": "openvswitch-ovn-kubernetes-0:0.1.0-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.x86_64", "product": { "name": "openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.x86_64", "product_id": "openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.x86_64", "product": { "name": "atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.x86_64", "product_id": "atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.x86_64", "product": { "name": "atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.x86_64", "product_id": "atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-node-problem-detector@3.9.13-2.git.167.5d6b0d4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.x86_64", "product": { "name": "prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.x86_64", "product_id": "prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "prometheus-0:2.2.1-2.gitbc6058c.el7.x86_64", "product": { "name": "prometheus-0:2.2.1-2.gitbc6058c.el7.x86_64", "product_id": "prometheus-0:2.2.1-2.gitbc6058c.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "product": { "name": "cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "product_id": "cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "product": { "name": "cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "product_id": "cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "cri-o-0:1.9.16-3.git858756d.el7.src", "product": { "name": "cri-o-0:1.9.16-3.git858756d.el7.src", "product_id": "cri-o-0:1.9.16-3.git858756d.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.src", "product": { "name": "golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.src", "product_id": "golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "openshift-external-storage-0:0.0.1-9.git78d6339.el7.src", "product": { "name": "openshift-external-storage-0:0.0.1-9.git78d6339.el7.src", "product_id": "openshift-external-storage-0:0.0.1-9.git78d6339.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-0:3.9.101-1.git.0.150f595.el7.src", "product": { "name": "atomic-openshift-0:3.9.101-1.git.0.150f595.el7.src", "product_id": "atomic-openshift-0:3.9.101-1.git.0.150f595.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.src", "product": { "name": "atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.src", "product_id": "atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "golang-github-prometheus-node_exporter-0:3.9.101-1.git.1.8295224.el7.src", "product": { "name": "golang-github-prometheus-node_exporter-0:3.9.101-1.git.1.8295224.el7.src", "product_id": "golang-github-prometheus-node_exporter-0:3.9.101-1.git.1.8295224.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-prometheus-node_exporter@3.9.101-1.git.1.8295224.el7?arch=src" } } }, { "category": "product_version", "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "product": { "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "product_id": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-openshift-prometheus-alert-buffer@0-3.gitceca8c1.el7?arch=src" } } }, { "category": "product_version", "name": "ansible-service-broker-0:1.1.20-2.el7.src", "product": { "name": "ansible-service-broker-0:1.1.20-2.el7.src", "product_id": "ansible-service-broker-0:1.1.20-2.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "heapster-0:1.3.0-4.el7.src", "product": { "name": "heapster-0:1.3.0-4.el7.src", "product_id": "heapster-0:1.3.0-4.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "hawkular-openshift-agent-0:1.2.2-3.el7.src", "product": { "name": "hawkular-openshift-agent-0:1.2.2-3.el7.src", "product_id": "hawkular-openshift-agent-0:1.2.2-3.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "openshift-eventrouter-0:0.1-3.git5bd9251.el7.src", "product": { "name": "openshift-eventrouter-0:0.1-3.git5bd9251.el7.src", "product_id": "openshift-eventrouter-0:0.1-3.git5bd9251.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.src", "product": { "name": "cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.src", "product_id": "cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.5.2-6.el7.src", "product": { "name": "containernetworking-plugins-0:0.5.2-6.el7.src", "product_id": "containernetworking-plugins-0:0.5.2-6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "product": { "name": "golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "product_id": "golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "image-inspector-0:2.1.3-2.el7.src", "product": { "name": "image-inspector-0:2.1.3-2.el7.src", "product_id": "image-inspector-0:2.1.3-2.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "openvswitch-ovn-kubernetes-0:0.1.0-3.el7.src", "product": { "name": "openvswitch-ovn-kubernetes-0:0.1.0-3.el7.src", "product_id": "openvswitch-ovn-kubernetes-0:0.1.0-3.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.src", "product": { "name": "openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.src", "product_id": "openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.src", "product": { "name": "atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.src", "product_id": "atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.src", "product": { "name": "atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.src", "product_id": "atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-node-problem-detector@3.9.13-2.git.167.5d6b0d4.el7?arch=src" } } }, { "category": "product_version", "name": "golang-github-prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.src", "product": { "name": "golang-github-prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.src", "product_id": "golang-github-prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "golang-github-prometheus-prometheus-0:2.2.1-2.gitbc6058c.el7.src", "product": { "name": "golang-github-prometheus-prometheus-0:2.2.1-2.gitbc6058c.el7.src", "product_id": "golang-github-prometheus-prometheus-0:2.2.1-2.gitbc6058c.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "cockpit-0:195-2.rhaos.el7.src", "product": { "name": "cockpit-0:195-2.rhaos.el7.src", "product_id": "cockpit-0:195-2.rhaos.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "atomic-openshift-docker-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "product": { "name": "atomic-openshift-docker-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "product_id": "atomic-openshift-docker-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } }, { "category": "product_version", "name": "atomic-openshift-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "product": { "name": "atomic-openshift-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "product_id": "atomic-openshift-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } }, { "category": "product_version", "name": "ansible-service-broker-container-scripts-0:1.1.20-2.el7.noarch", "product": { "name": "ansible-service-broker-container-scripts-0:1.1.20-2.el7.noarch", "product_id": "ansible-service-broker-container-scripts-0:1.1.20-2.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } }, { "category": "product_version", "name": "ansible-service-broker-selinux-0:1.1.20-2.el7.noarch", "product": { "name": "ansible-service-broker-selinux-0:1.1.20-2.el7.noarch", "product_id": "ansible-service-broker-selinux-0:1.1.20-2.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ansible-service-broker-0:1.1.20-2.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-2.el7.src" }, "product_reference": "ansible-service-broker-0:1.1.20-2.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-service-broker-0:1.1.20-2.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-2.el7.x86_64" }, "product_reference": "ansible-service-broker-0:1.1.20-2.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-service-broker-container-scripts-0:1.1.20-2.el7.noarch as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:ansible-service-broker-container-scripts-0:1.1.20-2.el7.noarch" }, "product_reference": "ansible-service-broker-container-scripts-0:1.1.20-2.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-service-broker-selinux-0:1.1.20-2.el7.noarch as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:ansible-service-broker-selinux-0:1.1.20-2.el7.noarch" }, "product_reference": "ansible-service-broker-selinux-0:1.1.20-2.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-0:3.9.101-1.git.0.150f595.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.101-1.git.0.150f595.el7.src" }, "product_reference": "atomic-openshift-0:3.9.101-1.git.0.150f595.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-0:3.9.101-1.git.0.150f595.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.101-1.git.0.150f595.el7.x86_64" }, "product_reference": "atomic-openshift-0:3.9.101-1.git.0.150f595.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-clients-0:3.9.101-1.git.0.150f595.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-0:3.9.101-1.git.0.150f595.el7.x86_64" }, "product_reference": "atomic-openshift-clients-0:3.9.101-1.git.0.150f595.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-clients-redistributable-0:3.9.101-1.git.0.150f595.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-redistributable-0:3.9.101-1.git.0.150f595.el7.x86_64" }, "product_reference": "atomic-openshift-clients-redistributable-0:3.9.101-1.git.0.150f595.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-cluster-capacity-0:3.9.101-1.git.0.150f595.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-cluster-capacity-0:3.9.101-1.git.0.150f595.el7.x86_64" }, "product_reference": "atomic-openshift-cluster-capacity-0:3.9.101-1.git.0.150f595.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.src" }, "product_reference": "atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.x86_64" }, "product_reference": "atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-docker-excluder-0:3.9.101-1.git.0.150f595.el7.noarch as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-docker-excluder-0:3.9.101-1.git.0.150f595.el7.noarch" }, "product_reference": "atomic-openshift-docker-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-dockerregistry-0:3.9.101-1.git.1.13625cf.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-dockerregistry-0:3.9.101-1.git.1.13625cf.el7.x86_64" }, "product_reference": "atomic-openshift-dockerregistry-0:3.9.101-1.git.1.13625cf.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-excluder-0:3.9.101-1.git.0.150f595.el7.noarch as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-excluder-0:3.9.101-1.git.0.150f595.el7.noarch" }, "product_reference": "atomic-openshift-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-federation-services-0:3.9.101-1.git.0.150f595.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-federation-services-0:3.9.101-1.git.0.150f595.el7.x86_64" }, "product_reference": "atomic-openshift-federation-services-0:3.9.101-1.git.0.150f595.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-master-0:3.9.101-1.git.0.150f595.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-master-0:3.9.101-1.git.0.150f595.el7.x86_64" }, "product_reference": "atomic-openshift-master-0:3.9.101-1.git.0.150f595.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-node-0:3.9.101-1.git.0.150f595.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-node-0:3.9.101-1.git.0.150f595.el7.x86_64" }, "product_reference": "atomic-openshift-node-0:3.9.101-1.git.0.150f595.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.src" }, "product_reference": "atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.x86_64" }, "product_reference": "atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-pod-0:3.9.101-1.git.0.150f595.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-pod-0:3.9.101-1.git.0.150f595.el7.x86_64" }, "product_reference": "atomic-openshift-pod-0:3.9.101-1.git.0.150f595.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-sdn-ovs-0:3.9.101-1.git.0.150f595.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-sdn-ovs-0:3.9.101-1.git.0.150f595.el7.x86_64" }, "product_reference": "atomic-openshift-sdn-ovs-0:3.9.101-1.git.0.150f595.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-catalog-0:3.9.101-1.git.0.150f595.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-service-catalog-0:3.9.101-1.git.0.150f595.el7.x86_64" }, "product_reference": "atomic-openshift-service-catalog-0:3.9.101-1.git.0.150f595.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-template-service-broker-0:3.9.101-1.git.0.150f595.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-template-service-broker-0:3.9.101-1.git.0.150f595.el7.x86_64" }, "product_reference": "atomic-openshift-template-service-broker-0:3.9.101-1.git.0.150f595.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-tests-0:3.9.101-1.git.0.150f595.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-tests-0:3.9.101-1.git.0.150f595.el7.x86_64" }, "product_reference": "atomic-openshift-tests-0:3.9.101-1.git.0.150f595.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.src" }, "product_reference": "atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.x86_64" }, "product_reference": "atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "cockpit-0:195-2.rhaos.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:cockpit-0:195-2.rhaos.el7.src" }, "product_reference": "cockpit-0:195-2.rhaos.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "cockpit-debuginfo-0:195-2.rhaos.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:cockpit-debuginfo-0:195-2.rhaos.el7.x86_64" }, "product_reference": "cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "cockpit-kubernetes-0:195-2.rhaos.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:cockpit-kubernetes-0:195-2.rhaos.el7.x86_64" }, "product_reference": "cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.5.2-6.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:containernetworking-plugins-0:0.5.2-6.el7.src" }, "product_reference": "containernetworking-plugins-0:0.5.2-6.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.5.2-6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:containernetworking-plugins-0:0.5.2-6.el7.x86_64" }, "product_reference": "containernetworking-plugins-0:0.5.2-6.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.5.2-6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:containernetworking-plugins-debuginfo-0:0.5.2-6.el7.x86_64" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.5.2-6.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.9.16-3.git858756d.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-3.git858756d.el7.src" }, "product_reference": "cri-o-0:1.9.16-3.git858756d.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.9.16-3.git858756d.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-3.git858756d.el7.x86_64" }, "product_reference": "cri-o-0:1.9.16-3.git858756d.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.9.16-3.git858756d.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:cri-o-debuginfo-0:1.9.16-3.git858756d.el7.x86_64" }, "product_reference": "cri-o-debuginfo-0:1.9.16-3.git858756d.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.src" }, "product_reference": "cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64" }, "product_reference": "cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debuginfo-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:cri-tools-debuginfo-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64" }, "product_reference": "cri-tools-debuginfo-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.src" }, "product_reference": "golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.x86_64" }, "product_reference": "golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src" }, "product_reference": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64" }, "product_reference": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:golang-github-prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.src" }, "product_reference": "golang-github-prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-node_exporter-0:3.9.101-1.git.1.8295224.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:golang-github-prometheus-node_exporter-0:3.9.101-1.git.1.8295224.el7.src" }, "product_reference": "golang-github-prometheus-node_exporter-0:3.9.101-1.git.1.8295224.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-prometheus-0:2.2.1-2.gitbc6058c.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:golang-github-prometheus-prometheus-0:2.2.1-2.gitbc6058c.el7.src" }, "product_reference": "golang-github-prometheus-prometheus-0:2.2.1-2.gitbc6058c.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src" }, "product_reference": "golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64" }, "product_reference": "golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "hawkular-openshift-agent-0:1.2.2-3.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:hawkular-openshift-agent-0:1.2.2-3.el7.src" }, "product_reference": "hawkular-openshift-agent-0:1.2.2-3.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "hawkular-openshift-agent-0:1.2.2-3.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:hawkular-openshift-agent-0:1.2.2-3.el7.x86_64" }, "product_reference": "hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "heapster-0:1.3.0-4.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:heapster-0:1.3.0-4.el7.src" }, "product_reference": "heapster-0:1.3.0-4.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "heapster-0:1.3.0-4.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:heapster-0:1.3.0-4.el7.x86_64" }, "product_reference": "heapster-0:1.3.0-4.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "image-inspector-0:2.1.3-2.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:image-inspector-0:2.1.3-2.el7.src" }, "product_reference": "image-inspector-0:2.1.3-2.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "image-inspector-0:2.1.3-2.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:image-inspector-0:2.1.3-2.el7.x86_64" }, "product_reference": "image-inspector-0:2.1.3-2.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.src" }, "product_reference": "openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.x86_64" }, "product_reference": "openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-eventrouter-0:0.1-3.git5bd9251.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:openshift-eventrouter-0:0.1-3.git5bd9251.el7.src" }, "product_reference": "openshift-eventrouter-0:0.1-3.git5bd9251.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-eventrouter-0:0.1-3.git5bd9251.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:openshift-eventrouter-0:0.1-3.git5bd9251.el7.x86_64" }, "product_reference": "openshift-eventrouter-0:0.1-3.git5bd9251.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-eventrouter-debuginfo-0:0.1-3.git5bd9251.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:openshift-eventrouter-debuginfo-0:0.1-3.git5bd9251.el7.x86_64" }, "product_reference": "openshift-eventrouter-debuginfo-0:0.1-3.git5bd9251.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-0:0.0.1-9.git78d6339.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:openshift-external-storage-0:0.0.1-9.git78d6339.el7.src" }, "product_reference": "openshift-external-storage-0:0.0.1-9.git78d6339.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-debuginfo-0:0.0.1-9.git78d6339.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:openshift-external-storage-debuginfo-0:0.0.1-9.git78d6339.el7.x86_64" }, "product_reference": "openshift-external-storage-debuginfo-0:0.0.1-9.git78d6339.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-efs-provisioner-0:0.0.1-9.git78d6339.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:openshift-external-storage-efs-provisioner-0:0.0.1-9.git78d6339.el7.x86_64" }, "product_reference": "openshift-external-storage-efs-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-local-provisioner-0:0.0.1-9.git78d6339.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:openshift-external-storage-local-provisioner-0:0.0.1-9.git78d6339.el7.x86_64" }, "product_reference": "openshift-external-storage-local-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-snapshot-controller-0:0.0.1-9.git78d6339.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:openshift-external-storage-snapshot-controller-0:0.0.1-9.git78d6339.el7.x86_64" }, "product_reference": "openshift-external-storage-snapshot-controller-0:0.0.1-9.git78d6339.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-snapshot-provisioner-0:0.0.1-9.git78d6339.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:openshift-external-storage-snapshot-provisioner-0:0.0.1-9.git78d6339.el7.x86_64" }, "product_reference": "openshift-external-storage-snapshot-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-kubernetes-0:0.1.0-3.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:openvswitch-ovn-kubernetes-0:0.1.0-3.el7.src" }, "product_reference": "openvswitch-ovn-kubernetes-0:0.1.0-3.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-kubernetes-0:0.1.0-3.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:openvswitch-ovn-kubernetes-0:0.1.0-3.el7.x86_64" }, "product_reference": "openvswitch-ovn-kubernetes-0:0.1.0-3.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-0:2.2.1-2.gitbc6058c.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:prometheus-0:2.2.1-2.gitbc6058c.el7.x86_64" }, "product_reference": "prometheus-0:2.2.1-2.gitbc6058c.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.x86_64" }, "product_reference": "prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-node-exporter-0:3.9.101-1.git.1.8295224.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:prometheus-node-exporter-0:3.9.101-1.git.1.8295224.el7.x86_64" }, "product_reference": "prometheus-node-exporter-0:3.9.101-1.git.1.8295224.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-promu-0:0-5.git85ceabc.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:prometheus-promu-0:0-5.git85ceabc.el7.x86_64" }, "product_reference": "prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-2.el7.src", "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-2.el7.x86_64", "7Server-RH7-RHOSE-3.9:ansible-service-broker-container-scripts-0:1.1.20-2.el7.noarch", "7Server-RH7-RHOSE-3.9:ansible-service-broker-selinux-0:1.1.20-2.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.101-1.git.0.150f595.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-redistributable-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-cluster-capacity-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-docker-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-dockerregistry-0:3.9.101-1.git.1.13625cf.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-federation-services-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-master-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-pod-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-sdn-ovs-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-service-catalog-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-template-service-broker-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-tests-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.x86_64", "7Server-RH7-RHOSE-3.9:cockpit-0:195-2.rhaos.el7.src", "7Server-RH7-RHOSE-3.9:cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.9:cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-0:0.5.2-6.el7.src", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-0:0.5.2-6.el7.x86_64", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-debuginfo-0:0.5.2-6.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-3.git858756d.el7.src", "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-3.git858756d.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-o-debuginfo-0:1.9.16-3.git858756d.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.src", "7Server-RH7-RHOSE-3.9:cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-tools-debuginfo-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-node_exporter-0:3.9.101-1.git.1.8295224.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-prometheus-0:2.2.1-2.gitbc6058c.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "7Server-RH7-RHOSE-3.9:hawkular-openshift-agent-0:1.2.2-3.el7.src", "7Server-RH7-RHOSE-3.9:hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "7Server-RH7-RHOSE-3.9:heapster-0:1.3.0-4.el7.src", "7Server-RH7-RHOSE-3.9:heapster-0:1.3.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.9:image-inspector-0:2.1.3-2.el7.src", "7Server-RH7-RHOSE-3.9:image-inspector-0:2.1.3-2.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.src", "7Server-RH7-RHOSE-3.9:openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-0:0.1-3.git5bd9251.el7.src", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-0:0.1-3.git5bd9251.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-debuginfo-0:0.1-3.git5bd9251.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-0:0.0.1-9.git78d6339.el7.src", "7Server-RH7-RHOSE-3.9:openshift-external-storage-debuginfo-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-efs-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-local-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-snapshot-controller-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-snapshot-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openvswitch-ovn-kubernetes-0:0.1.0-3.el7.src", "7Server-RH7-RHOSE-3.9:openvswitch-ovn-kubernetes-0:0.1.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-0:2.2.1-2.gitbc6058c.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-node-exporter-0:3.9.101-1.git.1.8295224.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-promu-0:0-5.git85ceabc.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-24T21:31:32+00:00", "details": "For OpenShift Container Platform 3.9 see the following documentation, which\nwill be updated shortly for release 3.9.100, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/3.9/release_notes/ocp_3_9_release_notes.html", "product_ids": [ "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-2.el7.src", "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-2.el7.x86_64", "7Server-RH7-RHOSE-3.9:ansible-service-broker-container-scripts-0:1.1.20-2.el7.noarch", "7Server-RH7-RHOSE-3.9:ansible-service-broker-selinux-0:1.1.20-2.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.101-1.git.0.150f595.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-redistributable-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-cluster-capacity-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-docker-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-dockerregistry-0:3.9.101-1.git.1.13625cf.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-federation-services-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-master-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-pod-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-sdn-ovs-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-service-catalog-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-template-service-broker-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-tests-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.x86_64", "7Server-RH7-RHOSE-3.9:cockpit-0:195-2.rhaos.el7.src", "7Server-RH7-RHOSE-3.9:cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.9:cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-0:0.5.2-6.el7.src", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-0:0.5.2-6.el7.x86_64", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-debuginfo-0:0.5.2-6.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-3.git858756d.el7.src", "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-3.git858756d.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-o-debuginfo-0:1.9.16-3.git858756d.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.src", "7Server-RH7-RHOSE-3.9:cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-tools-debuginfo-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-node_exporter-0:3.9.101-1.git.1.8295224.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-prometheus-0:2.2.1-2.gitbc6058c.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "7Server-RH7-RHOSE-3.9:hawkular-openshift-agent-0:1.2.2-3.el7.src", "7Server-RH7-RHOSE-3.9:hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "7Server-RH7-RHOSE-3.9:heapster-0:1.3.0-4.el7.src", "7Server-RH7-RHOSE-3.9:heapster-0:1.3.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.9:image-inspector-0:2.1.3-2.el7.src", "7Server-RH7-RHOSE-3.9:image-inspector-0:2.1.3-2.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.src", "7Server-RH7-RHOSE-3.9:openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-0:0.1-3.git5bd9251.el7.src", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-0:0.1-3.git5bd9251.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-debuginfo-0:0.1-3.git5bd9251.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-0:0.0.1-9.git78d6339.el7.src", "7Server-RH7-RHOSE-3.9:openshift-external-storage-debuginfo-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-efs-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-local-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-snapshot-controller-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-snapshot-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openvswitch-ovn-kubernetes-0:0.1.0-3.el7.src", "7Server-RH7-RHOSE-3.9:openvswitch-ovn-kubernetes-0:0.1.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-0:2.2.1-2.gitbc6058c.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-node-exporter-0:3.9.101-1.git.1.8295224.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-promu-0:0-5.git85ceabc.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2769" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-2.el7.src", "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-2.el7.x86_64", "7Server-RH7-RHOSE-3.9:ansible-service-broker-container-scripts-0:1.1.20-2.el7.noarch", "7Server-RH7-RHOSE-3.9:ansible-service-broker-selinux-0:1.1.20-2.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.101-1.git.0.150f595.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-redistributable-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-cluster-capacity-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-docker-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-dockerregistry-0:3.9.101-1.git.1.13625cf.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-federation-services-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-master-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-pod-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-sdn-ovs-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-service-catalog-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-template-service-broker-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-tests-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.x86_64", "7Server-RH7-RHOSE-3.9:cockpit-0:195-2.rhaos.el7.src", "7Server-RH7-RHOSE-3.9:cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.9:cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-0:0.5.2-6.el7.src", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-0:0.5.2-6.el7.x86_64", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-debuginfo-0:0.5.2-6.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-3.git858756d.el7.src", "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-3.git858756d.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-o-debuginfo-0:1.9.16-3.git858756d.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.src", "7Server-RH7-RHOSE-3.9:cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-tools-debuginfo-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-node_exporter-0:3.9.101-1.git.1.8295224.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-prometheus-0:2.2.1-2.gitbc6058c.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "7Server-RH7-RHOSE-3.9:hawkular-openshift-agent-0:1.2.2-3.el7.src", "7Server-RH7-RHOSE-3.9:hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "7Server-RH7-RHOSE-3.9:heapster-0:1.3.0-4.el7.src", "7Server-RH7-RHOSE-3.9:heapster-0:1.3.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.9:image-inspector-0:2.1.3-2.el7.src", "7Server-RH7-RHOSE-3.9:image-inspector-0:2.1.3-2.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.src", "7Server-RH7-RHOSE-3.9:openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-0:0.1-3.git5bd9251.el7.src", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-0:0.1-3.git5bd9251.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-debuginfo-0:0.1-3.git5bd9251.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-0:0.0.1-9.git78d6339.el7.src", "7Server-RH7-RHOSE-3.9:openshift-external-storage-debuginfo-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-efs-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-local-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-snapshot-controller-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-snapshot-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openvswitch-ovn-kubernetes-0:0.1.0-3.el7.src", "7Server-RH7-RHOSE-3.9:openvswitch-ovn-kubernetes-0:0.1.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-0:2.2.1-2.gitbc6058c.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-node-exporter-0:3.9.101-1.git.1.8295224.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-promu-0:0-5.git85ceabc.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-2.el7.src", "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-2.el7.x86_64", "7Server-RH7-RHOSE-3.9:ansible-service-broker-container-scripts-0:1.1.20-2.el7.noarch", "7Server-RH7-RHOSE-3.9:ansible-service-broker-selinux-0:1.1.20-2.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.101-1.git.0.150f595.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-redistributable-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-cluster-capacity-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-docker-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-dockerregistry-0:3.9.101-1.git.1.13625cf.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-federation-services-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-master-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-pod-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-sdn-ovs-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-service-catalog-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-template-service-broker-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-tests-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.x86_64", "7Server-RH7-RHOSE-3.9:cockpit-0:195-2.rhaos.el7.src", "7Server-RH7-RHOSE-3.9:cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.9:cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-0:0.5.2-6.el7.src", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-0:0.5.2-6.el7.x86_64", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-debuginfo-0:0.5.2-6.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-3.git858756d.el7.src", "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-3.git858756d.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-o-debuginfo-0:1.9.16-3.git858756d.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.src", "7Server-RH7-RHOSE-3.9:cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-tools-debuginfo-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-node_exporter-0:3.9.101-1.git.1.8295224.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-prometheus-0:2.2.1-2.gitbc6058c.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "7Server-RH7-RHOSE-3.9:hawkular-openshift-agent-0:1.2.2-3.el7.src", "7Server-RH7-RHOSE-3.9:hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "7Server-RH7-RHOSE-3.9:heapster-0:1.3.0-4.el7.src", "7Server-RH7-RHOSE-3.9:heapster-0:1.3.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.9:image-inspector-0:2.1.3-2.el7.src", "7Server-RH7-RHOSE-3.9:image-inspector-0:2.1.3-2.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.src", "7Server-RH7-RHOSE-3.9:openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-0:0.1-3.git5bd9251.el7.src", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-0:0.1-3.git5bd9251.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-debuginfo-0:0.1-3.git5bd9251.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-0:0.0.1-9.git78d6339.el7.src", "7Server-RH7-RHOSE-3.9:openshift-external-storage-debuginfo-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-efs-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-local-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-snapshot-controller-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-snapshot-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openvswitch-ovn-kubernetes-0:0.1.0-3.el7.src", "7Server-RH7-RHOSE-3.9:openvswitch-ovn-kubernetes-0:0.1.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-0:2.2.1-2.gitbc6058c.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-node-exporter-0:3.9.101-1.git.1.8295224.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-promu-0:0-5.git85ceabc.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-24T21:31:32+00:00", "details": "For OpenShift Container Platform 3.9 see the following documentation, which\nwill be updated shortly for release 3.9.100, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/3.9/release_notes/ocp_3_9_release_notes.html", "product_ids": [ "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-2.el7.src", "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-2.el7.x86_64", "7Server-RH7-RHOSE-3.9:ansible-service-broker-container-scripts-0:1.1.20-2.el7.noarch", "7Server-RH7-RHOSE-3.9:ansible-service-broker-selinux-0:1.1.20-2.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.101-1.git.0.150f595.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-redistributable-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-cluster-capacity-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-docker-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-dockerregistry-0:3.9.101-1.git.1.13625cf.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-federation-services-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-master-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-pod-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-sdn-ovs-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-service-catalog-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-template-service-broker-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-tests-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.x86_64", "7Server-RH7-RHOSE-3.9:cockpit-0:195-2.rhaos.el7.src", "7Server-RH7-RHOSE-3.9:cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.9:cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-0:0.5.2-6.el7.src", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-0:0.5.2-6.el7.x86_64", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-debuginfo-0:0.5.2-6.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-3.git858756d.el7.src", "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-3.git858756d.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-o-debuginfo-0:1.9.16-3.git858756d.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.src", "7Server-RH7-RHOSE-3.9:cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-tools-debuginfo-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-node_exporter-0:3.9.101-1.git.1.8295224.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-prometheus-0:2.2.1-2.gitbc6058c.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "7Server-RH7-RHOSE-3.9:hawkular-openshift-agent-0:1.2.2-3.el7.src", "7Server-RH7-RHOSE-3.9:hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "7Server-RH7-RHOSE-3.9:heapster-0:1.3.0-4.el7.src", "7Server-RH7-RHOSE-3.9:heapster-0:1.3.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.9:image-inspector-0:2.1.3-2.el7.src", "7Server-RH7-RHOSE-3.9:image-inspector-0:2.1.3-2.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.src", "7Server-RH7-RHOSE-3.9:openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-0:0.1-3.git5bd9251.el7.src", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-0:0.1-3.git5bd9251.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-debuginfo-0:0.1-3.git5bd9251.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-0:0.0.1-9.git78d6339.el7.src", "7Server-RH7-RHOSE-3.9:openshift-external-storage-debuginfo-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-efs-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-local-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-snapshot-controller-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-snapshot-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openvswitch-ovn-kubernetes-0:0.1.0-3.el7.src", "7Server-RH7-RHOSE-3.9:openvswitch-ovn-kubernetes-0:0.1.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-0:2.2.1-2.gitbc6058c.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-node-exporter-0:3.9.101-1.git.1.8295224.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-promu-0:0-5.git85ceabc.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2769" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-2.el7.src", "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-2.el7.x86_64", "7Server-RH7-RHOSE-3.9:ansible-service-broker-container-scripts-0:1.1.20-2.el7.noarch", "7Server-RH7-RHOSE-3.9:ansible-service-broker-selinux-0:1.1.20-2.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.101-1.git.0.150f595.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-redistributable-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-cluster-capacity-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-docker-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-dockerregistry-0:3.9.101-1.git.1.13625cf.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-federation-services-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-master-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-pod-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-sdn-ovs-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-service-catalog-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-template-service-broker-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-tests-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.x86_64", "7Server-RH7-RHOSE-3.9:cockpit-0:195-2.rhaos.el7.src", "7Server-RH7-RHOSE-3.9:cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.9:cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-0:0.5.2-6.el7.src", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-0:0.5.2-6.el7.x86_64", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-debuginfo-0:0.5.2-6.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-3.git858756d.el7.src", "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-3.git858756d.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-o-debuginfo-0:1.9.16-3.git858756d.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.src", "7Server-RH7-RHOSE-3.9:cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-tools-debuginfo-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-node_exporter-0:3.9.101-1.git.1.8295224.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-prometheus-0:2.2.1-2.gitbc6058c.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "7Server-RH7-RHOSE-3.9:hawkular-openshift-agent-0:1.2.2-3.el7.src", "7Server-RH7-RHOSE-3.9:hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "7Server-RH7-RHOSE-3.9:heapster-0:1.3.0-4.el7.src", "7Server-RH7-RHOSE-3.9:heapster-0:1.3.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.9:image-inspector-0:2.1.3-2.el7.src", "7Server-RH7-RHOSE-3.9:image-inspector-0:2.1.3-2.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.src", "7Server-RH7-RHOSE-3.9:openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-0:0.1-3.git5bd9251.el7.src", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-0:0.1-3.git5bd9251.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-debuginfo-0:0.1-3.git5bd9251.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-0:0.0.1-9.git78d6339.el7.src", "7Server-RH7-RHOSE-3.9:openshift-external-storage-debuginfo-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-efs-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-local-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-snapshot-controller-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-snapshot-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openvswitch-ovn-kubernetes-0:0.1.0-3.el7.src", "7Server-RH7-RHOSE-3.9:openvswitch-ovn-kubernetes-0:0.1.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-0:2.2.1-2.gitbc6058c.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-node-exporter-0:3.9.101-1.git.1.8295224.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-promu-0:0-5.git85ceabc.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Kubernetes Product Security Committee" ] } ], "cve": "CVE-2019-11247", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2019-07-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1732192" } ], "notes": [ { "category": "description", "text": "The Kubernetes kube-apiserver mistakenly allows access to a cluster-scoped custom resource if the request is made as if the resource were namespaced. Authorizations for the resource accessed in this manner are enforced using roles and role bindings within the namespace, meaning that a user with access only to a resource in one namespace could create, view update or delete the cluster-scoped resource (according to their namespace role privileges). Kubernetes affected versions include versions prior to 1.13.9, versions prior to 1.14.5, versions prior to 1.15.2, and versions 1.7, 1.8, 1.9, 1.10, 1.11, 1.12.", "title": "Vulnerability description" }, { "category": "summary", "text": "kubernetes: API server allows access to cluster-scoped custom resources as if resources were namespaced", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-2.el7.src", "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-2.el7.x86_64", "7Server-RH7-RHOSE-3.9:ansible-service-broker-container-scripts-0:1.1.20-2.el7.noarch", "7Server-RH7-RHOSE-3.9:ansible-service-broker-selinux-0:1.1.20-2.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.101-1.git.0.150f595.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-redistributable-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-cluster-capacity-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-docker-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-dockerregistry-0:3.9.101-1.git.1.13625cf.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-federation-services-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-master-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-pod-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-sdn-ovs-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-service-catalog-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-template-service-broker-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-tests-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.x86_64", "7Server-RH7-RHOSE-3.9:cockpit-0:195-2.rhaos.el7.src", "7Server-RH7-RHOSE-3.9:cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.9:cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-0:0.5.2-6.el7.src", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-0:0.5.2-6.el7.x86_64", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-debuginfo-0:0.5.2-6.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-3.git858756d.el7.src", "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-3.git858756d.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-o-debuginfo-0:1.9.16-3.git858756d.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.src", "7Server-RH7-RHOSE-3.9:cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-tools-debuginfo-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-node_exporter-0:3.9.101-1.git.1.8295224.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-prometheus-0:2.2.1-2.gitbc6058c.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "7Server-RH7-RHOSE-3.9:hawkular-openshift-agent-0:1.2.2-3.el7.src", "7Server-RH7-RHOSE-3.9:hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "7Server-RH7-RHOSE-3.9:heapster-0:1.3.0-4.el7.src", "7Server-RH7-RHOSE-3.9:heapster-0:1.3.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.9:image-inspector-0:2.1.3-2.el7.src", "7Server-RH7-RHOSE-3.9:image-inspector-0:2.1.3-2.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.src", "7Server-RH7-RHOSE-3.9:openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-0:0.1-3.git5bd9251.el7.src", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-0:0.1-3.git5bd9251.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-debuginfo-0:0.1-3.git5bd9251.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-0:0.0.1-9.git78d6339.el7.src", "7Server-RH7-RHOSE-3.9:openshift-external-storage-debuginfo-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-efs-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-local-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-snapshot-controller-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-snapshot-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openvswitch-ovn-kubernetes-0:0.1.0-3.el7.src", "7Server-RH7-RHOSE-3.9:openvswitch-ovn-kubernetes-0:0.1.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-0:2.2.1-2.gitbc6058c.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-node-exporter-0:3.9.101-1.git.1.8295224.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-promu-0:0-5.git85ceabc.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-11247" }, { "category": "external", "summary": "RHBZ#1732192", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1732192" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-11247", "url": "https://www.cve.org/CVERecord?id=CVE-2019-11247" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11247", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11247" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-discuss/Vf31dXp0EJc", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-discuss/Vf31dXp0EJc" } ], "release_date": "2019-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-24T21:31:32+00:00", "details": "For OpenShift Container Platform 3.9 see the following documentation, which\nwill be updated shortly for release 3.9.100, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/3.9/release_notes/ocp_3_9_release_notes.html", "product_ids": [ "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-2.el7.src", "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-2.el7.x86_64", "7Server-RH7-RHOSE-3.9:ansible-service-broker-container-scripts-0:1.1.20-2.el7.noarch", "7Server-RH7-RHOSE-3.9:ansible-service-broker-selinux-0:1.1.20-2.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.101-1.git.0.150f595.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-redistributable-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-cluster-capacity-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-docker-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-dockerregistry-0:3.9.101-1.git.1.13625cf.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-federation-services-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-master-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-pod-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-sdn-ovs-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-service-catalog-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-template-service-broker-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-tests-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.x86_64", "7Server-RH7-RHOSE-3.9:cockpit-0:195-2.rhaos.el7.src", "7Server-RH7-RHOSE-3.9:cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.9:cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-0:0.5.2-6.el7.src", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-0:0.5.2-6.el7.x86_64", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-debuginfo-0:0.5.2-6.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-3.git858756d.el7.src", "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-3.git858756d.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-o-debuginfo-0:1.9.16-3.git858756d.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.src", "7Server-RH7-RHOSE-3.9:cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-tools-debuginfo-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-node_exporter-0:3.9.101-1.git.1.8295224.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-prometheus-0:2.2.1-2.gitbc6058c.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "7Server-RH7-RHOSE-3.9:hawkular-openshift-agent-0:1.2.2-3.el7.src", "7Server-RH7-RHOSE-3.9:hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "7Server-RH7-RHOSE-3.9:heapster-0:1.3.0-4.el7.src", "7Server-RH7-RHOSE-3.9:heapster-0:1.3.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.9:image-inspector-0:2.1.3-2.el7.src", "7Server-RH7-RHOSE-3.9:image-inspector-0:2.1.3-2.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.src", "7Server-RH7-RHOSE-3.9:openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-0:0.1-3.git5bd9251.el7.src", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-0:0.1-3.git5bd9251.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-debuginfo-0:0.1-3.git5bd9251.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-0:0.0.1-9.git78d6339.el7.src", "7Server-RH7-RHOSE-3.9:openshift-external-storage-debuginfo-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-efs-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-local-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-snapshot-controller-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-snapshot-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openvswitch-ovn-kubernetes-0:0.1.0-3.el7.src", "7Server-RH7-RHOSE-3.9:openvswitch-ovn-kubernetes-0:0.1.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-0:2.2.1-2.gitbc6058c.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-node-exporter-0:3.9.101-1.git.1.8295224.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-promu-0:0-5.git85ceabc.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2769" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-2.el7.src", "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-2.el7.x86_64", "7Server-RH7-RHOSE-3.9:ansible-service-broker-container-scripts-0:1.1.20-2.el7.noarch", "7Server-RH7-RHOSE-3.9:ansible-service-broker-selinux-0:1.1.20-2.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.101-1.git.0.150f595.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-redistributable-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-cluster-capacity-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-docker-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-dockerregistry-0:3.9.101-1.git.1.13625cf.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-federation-services-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-master-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-pod-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-sdn-ovs-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-service-catalog-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-template-service-broker-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-tests-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.x86_64", "7Server-RH7-RHOSE-3.9:cockpit-0:195-2.rhaos.el7.src", "7Server-RH7-RHOSE-3.9:cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.9:cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-0:0.5.2-6.el7.src", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-0:0.5.2-6.el7.x86_64", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-debuginfo-0:0.5.2-6.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-3.git858756d.el7.src", "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-3.git858756d.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-o-debuginfo-0:1.9.16-3.git858756d.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.src", "7Server-RH7-RHOSE-3.9:cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-tools-debuginfo-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-node_exporter-0:3.9.101-1.git.1.8295224.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-prometheus-0:2.2.1-2.gitbc6058c.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "7Server-RH7-RHOSE-3.9:hawkular-openshift-agent-0:1.2.2-3.el7.src", "7Server-RH7-RHOSE-3.9:hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "7Server-RH7-RHOSE-3.9:heapster-0:1.3.0-4.el7.src", "7Server-RH7-RHOSE-3.9:heapster-0:1.3.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.9:image-inspector-0:2.1.3-2.el7.src", "7Server-RH7-RHOSE-3.9:image-inspector-0:2.1.3-2.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.src", "7Server-RH7-RHOSE-3.9:openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-0:0.1-3.git5bd9251.el7.src", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-0:0.1-3.git5bd9251.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-debuginfo-0:0.1-3.git5bd9251.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-0:0.0.1-9.git78d6339.el7.src", "7Server-RH7-RHOSE-3.9:openshift-external-storage-debuginfo-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-efs-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-local-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-snapshot-controller-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-snapshot-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openvswitch-ovn-kubernetes-0:0.1.0-3.el7.src", "7Server-RH7-RHOSE-3.9:openvswitch-ovn-kubernetes-0:0.1.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-0:2.2.1-2.gitbc6058c.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-node-exporter-0:3.9.101-1.git.1.8295224.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-promu-0:0-5.git85ceabc.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kubernetes: API server allows access to cluster-scoped custom resources as if resources were namespaced" } ] }
RHSA-2019:2769
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An security update is now available for Red Hat OpenShift Container Platform 3.9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private cloud deployments.\n\nThis advisory contains RPM packages for Red Hat OpenShift Container\nPlatform 3.9, which have been rebuilt with an updated version of golang.\n\nSecurity Fix(es):\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* kubernetes: API server allows access to cluster-scoped custom resources as if resources were namespaced (CVE-2019-11247)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:2769", "url": "https://access.redhat.com/errata/RHSA-2019:2769" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1732192", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1732192" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2769.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 3.9 security update", "tracking": { "current_release_date": "2025-03-15T19:44:42+00:00", "generator": { "date": "2025-03-15T19:44:42+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.1" } }, "id": "RHSA-2019:2769", "initial_release_date": "2019-10-24T21:31:32+00:00", "revision_history": [ { "date": "2019-10-24T21:31:32+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-10-24T21:31:32+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-03-15T19:44:42+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 3.9", "product": { "name": "Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:3.9::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "cri-o-0:1.9.16-3.git858756d.el7.x86_64", "product": { "name": "cri-o-0:1.9.16-3.git858756d.el7.x86_64", "product_id": "cri-o-0:1.9.16-3.git858756d.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.9.16-3.git858756d.el7.x86_64", "product": { "name": "cri-o-debuginfo-0:1.9.16-3.git858756d.el7.x86_64", "product_id": "cri-o-debuginfo-0:1.9.16-3.git858756d.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.x86_64", "product": { "name": "golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.x86_64", "product_id": "golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-external-storage-efs-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "product": { "name": "openshift-external-storage-efs-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "product_id": "openshift-external-storage-efs-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-efs-provisioner@0.0.1-9.git78d6339.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-external-storage-local-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "product": { "name": "openshift-external-storage-local-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "product_id": "openshift-external-storage-local-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-local-provisioner@0.0.1-9.git78d6339.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-external-storage-snapshot-controller-0:0.0.1-9.git78d6339.el7.x86_64", "product": { "name": "openshift-external-storage-snapshot-controller-0:0.0.1-9.git78d6339.el7.x86_64", "product_id": "openshift-external-storage-snapshot-controller-0:0.0.1-9.git78d6339.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-snapshot-controller@0.0.1-9.git78d6339.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-external-storage-snapshot-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "product": { "name": "openshift-external-storage-snapshot-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "product_id": "openshift-external-storage-snapshot-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-snapshot-provisioner@0.0.1-9.git78d6339.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-external-storage-debuginfo-0:0.0.1-9.git78d6339.el7.x86_64", "product": { "name": "openshift-external-storage-debuginfo-0:0.0.1-9.git78d6339.el7.x86_64", "product_id": "openshift-external-storage-debuginfo-0:0.0.1-9.git78d6339.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-0:3.9.101-1.git.0.150f595.el7.x86_64", "product": { "name": "atomic-openshift-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_id": "atomic-openshift-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-clients-0:3.9.101-1.git.0.150f595.el7.x86_64", "product": { "name": "atomic-openshift-clients-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_id": "atomic-openshift-clients-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-clients-redistributable-0:3.9.101-1.git.0.150f595.el7.x86_64", "product": { "name": "atomic-openshift-clients-redistributable-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_id": "atomic-openshift-clients-redistributable-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-clients-redistributable@3.9.101-1.git.0.150f595.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-cluster-capacity-0:3.9.101-1.git.0.150f595.el7.x86_64", "product": { "name": "atomic-openshift-cluster-capacity-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_id": "atomic-openshift-cluster-capacity-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-federation-services-0:3.9.101-1.git.0.150f595.el7.x86_64", "product": { "name": "atomic-openshift-federation-services-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_id": "atomic-openshift-federation-services-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-master-0:3.9.101-1.git.0.150f595.el7.x86_64", "product": { "name": "atomic-openshift-master-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_id": "atomic-openshift-master-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-node-0:3.9.101-1.git.0.150f595.el7.x86_64", "product": { "name": "atomic-openshift-node-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_id": "atomic-openshift-node-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-pod-0:3.9.101-1.git.0.150f595.el7.x86_64", "product": { "name": "atomic-openshift-pod-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_id": "atomic-openshift-pod-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-sdn-ovs-0:3.9.101-1.git.0.150f595.el7.x86_64", "product": { "name": "atomic-openshift-sdn-ovs-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_id": "atomic-openshift-sdn-ovs-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-service-catalog-0:3.9.101-1.git.0.150f595.el7.x86_64", "product": { "name": "atomic-openshift-service-catalog-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_id": "atomic-openshift-service-catalog-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-template-service-broker-0:3.9.101-1.git.0.150f595.el7.x86_64", "product": { "name": "atomic-openshift-template-service-broker-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_id": "atomic-openshift-template-service-broker-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-template-service-broker@3.9.101-1.git.0.150f595.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-tests-0:3.9.101-1.git.0.150f595.el7.x86_64", "product": { "name": "atomic-openshift-tests-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_id": "atomic-openshift-tests-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.x86_64", "product": { "name": "atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.x86_64", "product_id": "atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-dockerregistry-0:3.9.101-1.git.1.13625cf.el7.x86_64", "product": { "name": "atomic-openshift-dockerregistry-0:3.9.101-1.git.1.13625cf.el7.x86_64", "product_id": "atomic-openshift-dockerregistry-0:3.9.101-1.git.1.13625cf.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "prometheus-node-exporter-0:3.9.101-1.git.1.8295224.el7.x86_64", "product": { "name": "prometheus-node-exporter-0:3.9.101-1.git.1.8295224.el7.x86_64", "product_id": "prometheus-node-exporter-0:3.9.101-1.git.1.8295224.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "product": { "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "product_id": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-openshift-prometheus-alert-buffer@0-3.gitceca8c1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "ansible-service-broker-0:1.1.20-2.el7.x86_64", "product": { "name": "ansible-service-broker-0:1.1.20-2.el7.x86_64", "product_id": "ansible-service-broker-0:1.1.20-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "heapster-0:1.3.0-4.el7.x86_64", "product": { "name": "heapster-0:1.3.0-4.el7.x86_64", "product_id": "heapster-0:1.3.0-4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "product": { "name": "hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "product_id": "hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-eventrouter-0:0.1-3.git5bd9251.el7.x86_64", "product": { "name": "openshift-eventrouter-0:0.1-3.git5bd9251.el7.x86_64", "product_id": "openshift-eventrouter-0:0.1-3.git5bd9251.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-eventrouter-debuginfo-0:0.1-3.git5bd9251.el7.x86_64", "product": { "name": "openshift-eventrouter-debuginfo-0:0.1-3.git5bd9251.el7.x86_64", "product_id": "openshift-eventrouter-debuginfo-0:0.1-3.git5bd9251.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "product": { "name": "cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "product_id": "cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "cri-tools-debuginfo-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "product": { "name": "cri-tools-debuginfo-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "product_id": "cri-tools-debuginfo-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.5.2-6.el7.x86_64", "product": { "name": "containernetworking-plugins-0:0.5.2-6.el7.x86_64", "product_id": "containernetworking-plugins-0:0.5.2-6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.5.2-6.el7.x86_64", "product": { "name": "containernetworking-plugins-debuginfo-0:0.5.2-6.el7.x86_64", "product_id": "containernetworking-plugins-debuginfo-0:0.5.2-6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "product": { "name": "golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "product_id": "golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "product": { "name": "prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "product_id": "prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "image-inspector-0:2.1.3-2.el7.x86_64", "product": { "name": "image-inspector-0:2.1.3-2.el7.x86_64", "product_id": "image-inspector-0:2.1.3-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "openvswitch-ovn-kubernetes-0:0.1.0-3.el7.x86_64", "product": { "name": "openvswitch-ovn-kubernetes-0:0.1.0-3.el7.x86_64", "product_id": "openvswitch-ovn-kubernetes-0:0.1.0-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.x86_64", "product": { "name": "openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.x86_64", "product_id": "openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.x86_64", "product": { "name": "atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.x86_64", "product_id": "atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.x86_64", "product": { "name": "atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.x86_64", "product_id": "atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-node-problem-detector@3.9.13-2.git.167.5d6b0d4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.x86_64", "product": { "name": "prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.x86_64", "product_id": "prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "prometheus-0:2.2.1-2.gitbc6058c.el7.x86_64", "product": { "name": "prometheus-0:2.2.1-2.gitbc6058c.el7.x86_64", "product_id": "prometheus-0:2.2.1-2.gitbc6058c.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "product": { "name": "cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "product_id": "cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "product": { "name": "cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "product_id": "cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "cri-o-0:1.9.16-3.git858756d.el7.src", "product": { "name": "cri-o-0:1.9.16-3.git858756d.el7.src", "product_id": "cri-o-0:1.9.16-3.git858756d.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.src", "product": { "name": "golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.src", "product_id": "golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "openshift-external-storage-0:0.0.1-9.git78d6339.el7.src", "product": { "name": "openshift-external-storage-0:0.0.1-9.git78d6339.el7.src", "product_id": "openshift-external-storage-0:0.0.1-9.git78d6339.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-0:3.9.101-1.git.0.150f595.el7.src", "product": { "name": "atomic-openshift-0:3.9.101-1.git.0.150f595.el7.src", "product_id": "atomic-openshift-0:3.9.101-1.git.0.150f595.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.src", "product": { "name": "atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.src", "product_id": "atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "golang-github-prometheus-node_exporter-0:3.9.101-1.git.1.8295224.el7.src", "product": { "name": "golang-github-prometheus-node_exporter-0:3.9.101-1.git.1.8295224.el7.src", "product_id": "golang-github-prometheus-node_exporter-0:3.9.101-1.git.1.8295224.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-prometheus-node_exporter@3.9.101-1.git.1.8295224.el7?arch=src" } } }, { "category": "product_version", "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "product": { "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "product_id": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-openshift-prometheus-alert-buffer@0-3.gitceca8c1.el7?arch=src" } } }, { "category": "product_version", "name": "ansible-service-broker-0:1.1.20-2.el7.src", "product": { "name": "ansible-service-broker-0:1.1.20-2.el7.src", "product_id": "ansible-service-broker-0:1.1.20-2.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "heapster-0:1.3.0-4.el7.src", "product": { "name": "heapster-0:1.3.0-4.el7.src", "product_id": "heapster-0:1.3.0-4.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "hawkular-openshift-agent-0:1.2.2-3.el7.src", "product": { "name": "hawkular-openshift-agent-0:1.2.2-3.el7.src", "product_id": "hawkular-openshift-agent-0:1.2.2-3.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "openshift-eventrouter-0:0.1-3.git5bd9251.el7.src", "product": { "name": "openshift-eventrouter-0:0.1-3.git5bd9251.el7.src", "product_id": "openshift-eventrouter-0:0.1-3.git5bd9251.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.src", "product": { "name": "cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.src", "product_id": "cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.5.2-6.el7.src", "product": { "name": "containernetworking-plugins-0:0.5.2-6.el7.src", "product_id": "containernetworking-plugins-0:0.5.2-6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "product": { "name": "golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "product_id": "golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "image-inspector-0:2.1.3-2.el7.src", "product": { "name": "image-inspector-0:2.1.3-2.el7.src", "product_id": "image-inspector-0:2.1.3-2.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "openvswitch-ovn-kubernetes-0:0.1.0-3.el7.src", "product": { "name": "openvswitch-ovn-kubernetes-0:0.1.0-3.el7.src", "product_id": "openvswitch-ovn-kubernetes-0:0.1.0-3.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.src", "product": { "name": "openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.src", "product_id": "openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.src", "product": { "name": "atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.src", "product_id": "atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.src", "product": { "name": "atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.src", "product_id": "atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-node-problem-detector@3.9.13-2.git.167.5d6b0d4.el7?arch=src" } } }, { "category": "product_version", "name": "golang-github-prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.src", "product": { "name": "golang-github-prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.src", "product_id": "golang-github-prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "golang-github-prometheus-prometheus-0:2.2.1-2.gitbc6058c.el7.src", "product": { "name": "golang-github-prometheus-prometheus-0:2.2.1-2.gitbc6058c.el7.src", "product_id": "golang-github-prometheus-prometheus-0:2.2.1-2.gitbc6058c.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "cockpit-0:195-2.rhaos.el7.src", "product": { "name": "cockpit-0:195-2.rhaos.el7.src", "product_id": "cockpit-0:195-2.rhaos.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "atomic-openshift-docker-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "product": { "name": "atomic-openshift-docker-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "product_id": "atomic-openshift-docker-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } }, { "category": "product_version", "name": "atomic-openshift-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "product": { "name": "atomic-openshift-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "product_id": "atomic-openshift-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } }, { "category": "product_version", "name": "ansible-service-broker-container-scripts-0:1.1.20-2.el7.noarch", "product": { "name": "ansible-service-broker-container-scripts-0:1.1.20-2.el7.noarch", "product_id": "ansible-service-broker-container-scripts-0:1.1.20-2.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } }, { "category": "product_version", "name": "ansible-service-broker-selinux-0:1.1.20-2.el7.noarch", "product": { "name": "ansible-service-broker-selinux-0:1.1.20-2.el7.noarch", "product_id": "ansible-service-broker-selinux-0:1.1.20-2.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ansible-service-broker-0:1.1.20-2.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-2.el7.src" }, "product_reference": "ansible-service-broker-0:1.1.20-2.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-service-broker-0:1.1.20-2.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-2.el7.x86_64" }, "product_reference": "ansible-service-broker-0:1.1.20-2.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-service-broker-container-scripts-0:1.1.20-2.el7.noarch as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:ansible-service-broker-container-scripts-0:1.1.20-2.el7.noarch" }, "product_reference": "ansible-service-broker-container-scripts-0:1.1.20-2.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-service-broker-selinux-0:1.1.20-2.el7.noarch as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:ansible-service-broker-selinux-0:1.1.20-2.el7.noarch" }, "product_reference": "ansible-service-broker-selinux-0:1.1.20-2.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-0:3.9.101-1.git.0.150f595.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.101-1.git.0.150f595.el7.src" }, "product_reference": "atomic-openshift-0:3.9.101-1.git.0.150f595.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-0:3.9.101-1.git.0.150f595.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.101-1.git.0.150f595.el7.x86_64" }, "product_reference": "atomic-openshift-0:3.9.101-1.git.0.150f595.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-clients-0:3.9.101-1.git.0.150f595.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-0:3.9.101-1.git.0.150f595.el7.x86_64" }, "product_reference": "atomic-openshift-clients-0:3.9.101-1.git.0.150f595.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-clients-redistributable-0:3.9.101-1.git.0.150f595.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-redistributable-0:3.9.101-1.git.0.150f595.el7.x86_64" }, "product_reference": "atomic-openshift-clients-redistributable-0:3.9.101-1.git.0.150f595.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-cluster-capacity-0:3.9.101-1.git.0.150f595.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-cluster-capacity-0:3.9.101-1.git.0.150f595.el7.x86_64" }, "product_reference": "atomic-openshift-cluster-capacity-0:3.9.101-1.git.0.150f595.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.src" }, "product_reference": "atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.x86_64" }, "product_reference": "atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-docker-excluder-0:3.9.101-1.git.0.150f595.el7.noarch as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-docker-excluder-0:3.9.101-1.git.0.150f595.el7.noarch" }, "product_reference": "atomic-openshift-docker-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-dockerregistry-0:3.9.101-1.git.1.13625cf.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-dockerregistry-0:3.9.101-1.git.1.13625cf.el7.x86_64" }, "product_reference": "atomic-openshift-dockerregistry-0:3.9.101-1.git.1.13625cf.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-excluder-0:3.9.101-1.git.0.150f595.el7.noarch as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-excluder-0:3.9.101-1.git.0.150f595.el7.noarch" }, "product_reference": "atomic-openshift-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-federation-services-0:3.9.101-1.git.0.150f595.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-federation-services-0:3.9.101-1.git.0.150f595.el7.x86_64" }, "product_reference": "atomic-openshift-federation-services-0:3.9.101-1.git.0.150f595.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-master-0:3.9.101-1.git.0.150f595.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-master-0:3.9.101-1.git.0.150f595.el7.x86_64" }, "product_reference": "atomic-openshift-master-0:3.9.101-1.git.0.150f595.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-node-0:3.9.101-1.git.0.150f595.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-node-0:3.9.101-1.git.0.150f595.el7.x86_64" }, "product_reference": "atomic-openshift-node-0:3.9.101-1.git.0.150f595.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.src" }, "product_reference": "atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.x86_64" }, "product_reference": "atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-pod-0:3.9.101-1.git.0.150f595.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-pod-0:3.9.101-1.git.0.150f595.el7.x86_64" }, "product_reference": "atomic-openshift-pod-0:3.9.101-1.git.0.150f595.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-sdn-ovs-0:3.9.101-1.git.0.150f595.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-sdn-ovs-0:3.9.101-1.git.0.150f595.el7.x86_64" }, "product_reference": "atomic-openshift-sdn-ovs-0:3.9.101-1.git.0.150f595.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-catalog-0:3.9.101-1.git.0.150f595.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-service-catalog-0:3.9.101-1.git.0.150f595.el7.x86_64" }, "product_reference": "atomic-openshift-service-catalog-0:3.9.101-1.git.0.150f595.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-template-service-broker-0:3.9.101-1.git.0.150f595.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-template-service-broker-0:3.9.101-1.git.0.150f595.el7.x86_64" }, "product_reference": "atomic-openshift-template-service-broker-0:3.9.101-1.git.0.150f595.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-tests-0:3.9.101-1.git.0.150f595.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-tests-0:3.9.101-1.git.0.150f595.el7.x86_64" }, "product_reference": "atomic-openshift-tests-0:3.9.101-1.git.0.150f595.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.src" }, "product_reference": "atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.x86_64" }, "product_reference": "atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "cockpit-0:195-2.rhaos.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:cockpit-0:195-2.rhaos.el7.src" }, "product_reference": "cockpit-0:195-2.rhaos.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "cockpit-debuginfo-0:195-2.rhaos.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:cockpit-debuginfo-0:195-2.rhaos.el7.x86_64" }, "product_reference": "cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "cockpit-kubernetes-0:195-2.rhaos.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:cockpit-kubernetes-0:195-2.rhaos.el7.x86_64" }, "product_reference": "cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.5.2-6.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:containernetworking-plugins-0:0.5.2-6.el7.src" }, "product_reference": "containernetworking-plugins-0:0.5.2-6.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.5.2-6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:containernetworking-plugins-0:0.5.2-6.el7.x86_64" }, "product_reference": "containernetworking-plugins-0:0.5.2-6.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.5.2-6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:containernetworking-plugins-debuginfo-0:0.5.2-6.el7.x86_64" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.5.2-6.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.9.16-3.git858756d.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-3.git858756d.el7.src" }, "product_reference": "cri-o-0:1.9.16-3.git858756d.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.9.16-3.git858756d.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-3.git858756d.el7.x86_64" }, "product_reference": "cri-o-0:1.9.16-3.git858756d.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.9.16-3.git858756d.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:cri-o-debuginfo-0:1.9.16-3.git858756d.el7.x86_64" }, "product_reference": "cri-o-debuginfo-0:1.9.16-3.git858756d.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.src" }, "product_reference": "cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64" }, "product_reference": "cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debuginfo-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:cri-tools-debuginfo-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64" }, "product_reference": "cri-tools-debuginfo-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.src" }, "product_reference": "golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.x86_64" }, "product_reference": "golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src" }, "product_reference": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64" }, "product_reference": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:golang-github-prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.src" }, "product_reference": "golang-github-prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-node_exporter-0:3.9.101-1.git.1.8295224.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:golang-github-prometheus-node_exporter-0:3.9.101-1.git.1.8295224.el7.src" }, "product_reference": "golang-github-prometheus-node_exporter-0:3.9.101-1.git.1.8295224.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-prometheus-0:2.2.1-2.gitbc6058c.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:golang-github-prometheus-prometheus-0:2.2.1-2.gitbc6058c.el7.src" }, "product_reference": "golang-github-prometheus-prometheus-0:2.2.1-2.gitbc6058c.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src" }, "product_reference": "golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64" }, "product_reference": "golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "hawkular-openshift-agent-0:1.2.2-3.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:hawkular-openshift-agent-0:1.2.2-3.el7.src" }, "product_reference": "hawkular-openshift-agent-0:1.2.2-3.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "hawkular-openshift-agent-0:1.2.2-3.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:hawkular-openshift-agent-0:1.2.2-3.el7.x86_64" }, "product_reference": "hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "heapster-0:1.3.0-4.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:heapster-0:1.3.0-4.el7.src" }, "product_reference": "heapster-0:1.3.0-4.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "heapster-0:1.3.0-4.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:heapster-0:1.3.0-4.el7.x86_64" }, "product_reference": "heapster-0:1.3.0-4.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "image-inspector-0:2.1.3-2.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:image-inspector-0:2.1.3-2.el7.src" }, "product_reference": "image-inspector-0:2.1.3-2.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "image-inspector-0:2.1.3-2.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:image-inspector-0:2.1.3-2.el7.x86_64" }, "product_reference": "image-inspector-0:2.1.3-2.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.src" }, "product_reference": "openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.x86_64" }, "product_reference": "openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-eventrouter-0:0.1-3.git5bd9251.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:openshift-eventrouter-0:0.1-3.git5bd9251.el7.src" }, "product_reference": "openshift-eventrouter-0:0.1-3.git5bd9251.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-eventrouter-0:0.1-3.git5bd9251.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:openshift-eventrouter-0:0.1-3.git5bd9251.el7.x86_64" }, "product_reference": "openshift-eventrouter-0:0.1-3.git5bd9251.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-eventrouter-debuginfo-0:0.1-3.git5bd9251.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:openshift-eventrouter-debuginfo-0:0.1-3.git5bd9251.el7.x86_64" }, "product_reference": "openshift-eventrouter-debuginfo-0:0.1-3.git5bd9251.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-0:0.0.1-9.git78d6339.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:openshift-external-storage-0:0.0.1-9.git78d6339.el7.src" }, "product_reference": "openshift-external-storage-0:0.0.1-9.git78d6339.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-debuginfo-0:0.0.1-9.git78d6339.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:openshift-external-storage-debuginfo-0:0.0.1-9.git78d6339.el7.x86_64" }, "product_reference": "openshift-external-storage-debuginfo-0:0.0.1-9.git78d6339.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-efs-provisioner-0:0.0.1-9.git78d6339.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:openshift-external-storage-efs-provisioner-0:0.0.1-9.git78d6339.el7.x86_64" }, "product_reference": "openshift-external-storage-efs-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-local-provisioner-0:0.0.1-9.git78d6339.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:openshift-external-storage-local-provisioner-0:0.0.1-9.git78d6339.el7.x86_64" }, "product_reference": "openshift-external-storage-local-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-snapshot-controller-0:0.0.1-9.git78d6339.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:openshift-external-storage-snapshot-controller-0:0.0.1-9.git78d6339.el7.x86_64" }, "product_reference": "openshift-external-storage-snapshot-controller-0:0.0.1-9.git78d6339.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-snapshot-provisioner-0:0.0.1-9.git78d6339.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:openshift-external-storage-snapshot-provisioner-0:0.0.1-9.git78d6339.el7.x86_64" }, "product_reference": "openshift-external-storage-snapshot-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-kubernetes-0:0.1.0-3.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:openvswitch-ovn-kubernetes-0:0.1.0-3.el7.src" }, "product_reference": "openvswitch-ovn-kubernetes-0:0.1.0-3.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-kubernetes-0:0.1.0-3.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:openvswitch-ovn-kubernetes-0:0.1.0-3.el7.x86_64" }, "product_reference": "openvswitch-ovn-kubernetes-0:0.1.0-3.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-0:2.2.1-2.gitbc6058c.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:prometheus-0:2.2.1-2.gitbc6058c.el7.x86_64" }, "product_reference": "prometheus-0:2.2.1-2.gitbc6058c.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.x86_64" }, "product_reference": "prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-node-exporter-0:3.9.101-1.git.1.8295224.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:prometheus-node-exporter-0:3.9.101-1.git.1.8295224.el7.x86_64" }, "product_reference": "prometheus-node-exporter-0:3.9.101-1.git.1.8295224.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-promu-0:0-5.git85ceabc.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:prometheus-promu-0:0-5.git85ceabc.el7.x86_64" }, "product_reference": "prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-2.el7.src", "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-2.el7.x86_64", "7Server-RH7-RHOSE-3.9:ansible-service-broker-container-scripts-0:1.1.20-2.el7.noarch", "7Server-RH7-RHOSE-3.9:ansible-service-broker-selinux-0:1.1.20-2.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.101-1.git.0.150f595.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-redistributable-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-cluster-capacity-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-docker-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-dockerregistry-0:3.9.101-1.git.1.13625cf.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-federation-services-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-master-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-pod-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-sdn-ovs-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-service-catalog-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-template-service-broker-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-tests-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.x86_64", "7Server-RH7-RHOSE-3.9:cockpit-0:195-2.rhaos.el7.src", "7Server-RH7-RHOSE-3.9:cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.9:cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-0:0.5.2-6.el7.src", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-0:0.5.2-6.el7.x86_64", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-debuginfo-0:0.5.2-6.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-3.git858756d.el7.src", "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-3.git858756d.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-o-debuginfo-0:1.9.16-3.git858756d.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.src", "7Server-RH7-RHOSE-3.9:cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-tools-debuginfo-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-node_exporter-0:3.9.101-1.git.1.8295224.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-prometheus-0:2.2.1-2.gitbc6058c.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "7Server-RH7-RHOSE-3.9:hawkular-openshift-agent-0:1.2.2-3.el7.src", "7Server-RH7-RHOSE-3.9:hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "7Server-RH7-RHOSE-3.9:heapster-0:1.3.0-4.el7.src", "7Server-RH7-RHOSE-3.9:heapster-0:1.3.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.9:image-inspector-0:2.1.3-2.el7.src", "7Server-RH7-RHOSE-3.9:image-inspector-0:2.1.3-2.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.src", "7Server-RH7-RHOSE-3.9:openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-0:0.1-3.git5bd9251.el7.src", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-0:0.1-3.git5bd9251.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-debuginfo-0:0.1-3.git5bd9251.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-0:0.0.1-9.git78d6339.el7.src", "7Server-RH7-RHOSE-3.9:openshift-external-storage-debuginfo-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-efs-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-local-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-snapshot-controller-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-snapshot-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openvswitch-ovn-kubernetes-0:0.1.0-3.el7.src", "7Server-RH7-RHOSE-3.9:openvswitch-ovn-kubernetes-0:0.1.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-0:2.2.1-2.gitbc6058c.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-node-exporter-0:3.9.101-1.git.1.8295224.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-promu-0:0-5.git85ceabc.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-24T21:31:32+00:00", "details": "For OpenShift Container Platform 3.9 see the following documentation, which\nwill be updated shortly for release 3.9.100, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/3.9/release_notes/ocp_3_9_release_notes.html", "product_ids": [ "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-2.el7.src", "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-2.el7.x86_64", "7Server-RH7-RHOSE-3.9:ansible-service-broker-container-scripts-0:1.1.20-2.el7.noarch", "7Server-RH7-RHOSE-3.9:ansible-service-broker-selinux-0:1.1.20-2.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.101-1.git.0.150f595.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-redistributable-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-cluster-capacity-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-docker-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-dockerregistry-0:3.9.101-1.git.1.13625cf.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-federation-services-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-master-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-pod-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-sdn-ovs-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-service-catalog-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-template-service-broker-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-tests-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.x86_64", "7Server-RH7-RHOSE-3.9:cockpit-0:195-2.rhaos.el7.src", "7Server-RH7-RHOSE-3.9:cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.9:cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-0:0.5.2-6.el7.src", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-0:0.5.2-6.el7.x86_64", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-debuginfo-0:0.5.2-6.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-3.git858756d.el7.src", "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-3.git858756d.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-o-debuginfo-0:1.9.16-3.git858756d.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.src", "7Server-RH7-RHOSE-3.9:cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-tools-debuginfo-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-node_exporter-0:3.9.101-1.git.1.8295224.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-prometheus-0:2.2.1-2.gitbc6058c.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "7Server-RH7-RHOSE-3.9:hawkular-openshift-agent-0:1.2.2-3.el7.src", "7Server-RH7-RHOSE-3.9:hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "7Server-RH7-RHOSE-3.9:heapster-0:1.3.0-4.el7.src", "7Server-RH7-RHOSE-3.9:heapster-0:1.3.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.9:image-inspector-0:2.1.3-2.el7.src", "7Server-RH7-RHOSE-3.9:image-inspector-0:2.1.3-2.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.src", "7Server-RH7-RHOSE-3.9:openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-0:0.1-3.git5bd9251.el7.src", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-0:0.1-3.git5bd9251.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-debuginfo-0:0.1-3.git5bd9251.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-0:0.0.1-9.git78d6339.el7.src", "7Server-RH7-RHOSE-3.9:openshift-external-storage-debuginfo-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-efs-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-local-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-snapshot-controller-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-snapshot-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openvswitch-ovn-kubernetes-0:0.1.0-3.el7.src", "7Server-RH7-RHOSE-3.9:openvswitch-ovn-kubernetes-0:0.1.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-0:2.2.1-2.gitbc6058c.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-node-exporter-0:3.9.101-1.git.1.8295224.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-promu-0:0-5.git85ceabc.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2769" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-2.el7.src", "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-2.el7.x86_64", "7Server-RH7-RHOSE-3.9:ansible-service-broker-container-scripts-0:1.1.20-2.el7.noarch", "7Server-RH7-RHOSE-3.9:ansible-service-broker-selinux-0:1.1.20-2.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.101-1.git.0.150f595.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-redistributable-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-cluster-capacity-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-docker-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-dockerregistry-0:3.9.101-1.git.1.13625cf.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-federation-services-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-master-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-pod-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-sdn-ovs-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-service-catalog-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-template-service-broker-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-tests-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.x86_64", "7Server-RH7-RHOSE-3.9:cockpit-0:195-2.rhaos.el7.src", "7Server-RH7-RHOSE-3.9:cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.9:cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-0:0.5.2-6.el7.src", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-0:0.5.2-6.el7.x86_64", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-debuginfo-0:0.5.2-6.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-3.git858756d.el7.src", "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-3.git858756d.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-o-debuginfo-0:1.9.16-3.git858756d.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.src", "7Server-RH7-RHOSE-3.9:cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-tools-debuginfo-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-node_exporter-0:3.9.101-1.git.1.8295224.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-prometheus-0:2.2.1-2.gitbc6058c.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "7Server-RH7-RHOSE-3.9:hawkular-openshift-agent-0:1.2.2-3.el7.src", "7Server-RH7-RHOSE-3.9:hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "7Server-RH7-RHOSE-3.9:heapster-0:1.3.0-4.el7.src", "7Server-RH7-RHOSE-3.9:heapster-0:1.3.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.9:image-inspector-0:2.1.3-2.el7.src", "7Server-RH7-RHOSE-3.9:image-inspector-0:2.1.3-2.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.src", "7Server-RH7-RHOSE-3.9:openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-0:0.1-3.git5bd9251.el7.src", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-0:0.1-3.git5bd9251.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-debuginfo-0:0.1-3.git5bd9251.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-0:0.0.1-9.git78d6339.el7.src", "7Server-RH7-RHOSE-3.9:openshift-external-storage-debuginfo-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-efs-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-local-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-snapshot-controller-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-snapshot-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openvswitch-ovn-kubernetes-0:0.1.0-3.el7.src", "7Server-RH7-RHOSE-3.9:openvswitch-ovn-kubernetes-0:0.1.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-0:2.2.1-2.gitbc6058c.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-node-exporter-0:3.9.101-1.git.1.8295224.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-promu-0:0-5.git85ceabc.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-2.el7.src", "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-2.el7.x86_64", "7Server-RH7-RHOSE-3.9:ansible-service-broker-container-scripts-0:1.1.20-2.el7.noarch", "7Server-RH7-RHOSE-3.9:ansible-service-broker-selinux-0:1.1.20-2.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.101-1.git.0.150f595.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-redistributable-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-cluster-capacity-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-docker-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-dockerregistry-0:3.9.101-1.git.1.13625cf.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-federation-services-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-master-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-pod-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-sdn-ovs-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-service-catalog-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-template-service-broker-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-tests-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.x86_64", "7Server-RH7-RHOSE-3.9:cockpit-0:195-2.rhaos.el7.src", "7Server-RH7-RHOSE-3.9:cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.9:cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-0:0.5.2-6.el7.src", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-0:0.5.2-6.el7.x86_64", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-debuginfo-0:0.5.2-6.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-3.git858756d.el7.src", "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-3.git858756d.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-o-debuginfo-0:1.9.16-3.git858756d.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.src", "7Server-RH7-RHOSE-3.9:cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-tools-debuginfo-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-node_exporter-0:3.9.101-1.git.1.8295224.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-prometheus-0:2.2.1-2.gitbc6058c.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "7Server-RH7-RHOSE-3.9:hawkular-openshift-agent-0:1.2.2-3.el7.src", "7Server-RH7-RHOSE-3.9:hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "7Server-RH7-RHOSE-3.9:heapster-0:1.3.0-4.el7.src", "7Server-RH7-RHOSE-3.9:heapster-0:1.3.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.9:image-inspector-0:2.1.3-2.el7.src", "7Server-RH7-RHOSE-3.9:image-inspector-0:2.1.3-2.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.src", "7Server-RH7-RHOSE-3.9:openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-0:0.1-3.git5bd9251.el7.src", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-0:0.1-3.git5bd9251.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-debuginfo-0:0.1-3.git5bd9251.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-0:0.0.1-9.git78d6339.el7.src", "7Server-RH7-RHOSE-3.9:openshift-external-storage-debuginfo-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-efs-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-local-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-snapshot-controller-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-snapshot-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openvswitch-ovn-kubernetes-0:0.1.0-3.el7.src", "7Server-RH7-RHOSE-3.9:openvswitch-ovn-kubernetes-0:0.1.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-0:2.2.1-2.gitbc6058c.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-node-exporter-0:3.9.101-1.git.1.8295224.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-promu-0:0-5.git85ceabc.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-24T21:31:32+00:00", "details": "For OpenShift Container Platform 3.9 see the following documentation, which\nwill be updated shortly for release 3.9.100, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/3.9/release_notes/ocp_3_9_release_notes.html", "product_ids": [ "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-2.el7.src", "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-2.el7.x86_64", "7Server-RH7-RHOSE-3.9:ansible-service-broker-container-scripts-0:1.1.20-2.el7.noarch", "7Server-RH7-RHOSE-3.9:ansible-service-broker-selinux-0:1.1.20-2.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.101-1.git.0.150f595.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-redistributable-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-cluster-capacity-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-docker-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-dockerregistry-0:3.9.101-1.git.1.13625cf.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-federation-services-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-master-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-pod-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-sdn-ovs-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-service-catalog-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-template-service-broker-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-tests-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.x86_64", "7Server-RH7-RHOSE-3.9:cockpit-0:195-2.rhaos.el7.src", "7Server-RH7-RHOSE-3.9:cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.9:cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-0:0.5.2-6.el7.src", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-0:0.5.2-6.el7.x86_64", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-debuginfo-0:0.5.2-6.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-3.git858756d.el7.src", "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-3.git858756d.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-o-debuginfo-0:1.9.16-3.git858756d.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.src", "7Server-RH7-RHOSE-3.9:cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-tools-debuginfo-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-node_exporter-0:3.9.101-1.git.1.8295224.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-prometheus-0:2.2.1-2.gitbc6058c.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "7Server-RH7-RHOSE-3.9:hawkular-openshift-agent-0:1.2.2-3.el7.src", "7Server-RH7-RHOSE-3.9:hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "7Server-RH7-RHOSE-3.9:heapster-0:1.3.0-4.el7.src", "7Server-RH7-RHOSE-3.9:heapster-0:1.3.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.9:image-inspector-0:2.1.3-2.el7.src", "7Server-RH7-RHOSE-3.9:image-inspector-0:2.1.3-2.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.src", "7Server-RH7-RHOSE-3.9:openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-0:0.1-3.git5bd9251.el7.src", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-0:0.1-3.git5bd9251.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-debuginfo-0:0.1-3.git5bd9251.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-0:0.0.1-9.git78d6339.el7.src", "7Server-RH7-RHOSE-3.9:openshift-external-storage-debuginfo-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-efs-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-local-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-snapshot-controller-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-snapshot-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openvswitch-ovn-kubernetes-0:0.1.0-3.el7.src", "7Server-RH7-RHOSE-3.9:openvswitch-ovn-kubernetes-0:0.1.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-0:2.2.1-2.gitbc6058c.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-node-exporter-0:3.9.101-1.git.1.8295224.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-promu-0:0-5.git85ceabc.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2769" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-2.el7.src", "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-2.el7.x86_64", "7Server-RH7-RHOSE-3.9:ansible-service-broker-container-scripts-0:1.1.20-2.el7.noarch", "7Server-RH7-RHOSE-3.9:ansible-service-broker-selinux-0:1.1.20-2.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.101-1.git.0.150f595.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-redistributable-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-cluster-capacity-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-docker-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-dockerregistry-0:3.9.101-1.git.1.13625cf.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-federation-services-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-master-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-pod-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-sdn-ovs-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-service-catalog-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-template-service-broker-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-tests-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.x86_64", "7Server-RH7-RHOSE-3.9:cockpit-0:195-2.rhaos.el7.src", "7Server-RH7-RHOSE-3.9:cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.9:cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-0:0.5.2-6.el7.src", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-0:0.5.2-6.el7.x86_64", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-debuginfo-0:0.5.2-6.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-3.git858756d.el7.src", "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-3.git858756d.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-o-debuginfo-0:1.9.16-3.git858756d.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.src", "7Server-RH7-RHOSE-3.9:cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-tools-debuginfo-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-node_exporter-0:3.9.101-1.git.1.8295224.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-prometheus-0:2.2.1-2.gitbc6058c.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "7Server-RH7-RHOSE-3.9:hawkular-openshift-agent-0:1.2.2-3.el7.src", "7Server-RH7-RHOSE-3.9:hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "7Server-RH7-RHOSE-3.9:heapster-0:1.3.0-4.el7.src", "7Server-RH7-RHOSE-3.9:heapster-0:1.3.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.9:image-inspector-0:2.1.3-2.el7.src", "7Server-RH7-RHOSE-3.9:image-inspector-0:2.1.3-2.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.src", "7Server-RH7-RHOSE-3.9:openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-0:0.1-3.git5bd9251.el7.src", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-0:0.1-3.git5bd9251.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-debuginfo-0:0.1-3.git5bd9251.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-0:0.0.1-9.git78d6339.el7.src", "7Server-RH7-RHOSE-3.9:openshift-external-storage-debuginfo-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-efs-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-local-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-snapshot-controller-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-snapshot-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openvswitch-ovn-kubernetes-0:0.1.0-3.el7.src", "7Server-RH7-RHOSE-3.9:openvswitch-ovn-kubernetes-0:0.1.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-0:2.2.1-2.gitbc6058c.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-node-exporter-0:3.9.101-1.git.1.8295224.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-promu-0:0-5.git85ceabc.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Kubernetes Product Security Committee" ] } ], "cve": "CVE-2019-11247", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2019-07-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1732192" } ], "notes": [ { "category": "description", "text": "The Kubernetes kube-apiserver mistakenly allows access to a cluster-scoped custom resource if the request is made as if the resource were namespaced. Authorizations for the resource accessed in this manner are enforced using roles and role bindings within the namespace, meaning that a user with access only to a resource in one namespace could create, view update or delete the cluster-scoped resource (according to their namespace role privileges). Kubernetes affected versions include versions prior to 1.13.9, versions prior to 1.14.5, versions prior to 1.15.2, and versions 1.7, 1.8, 1.9, 1.10, 1.11, 1.12.", "title": "Vulnerability description" }, { "category": "summary", "text": "kubernetes: API server allows access to cluster-scoped custom resources as if resources were namespaced", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-2.el7.src", "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-2.el7.x86_64", "7Server-RH7-RHOSE-3.9:ansible-service-broker-container-scripts-0:1.1.20-2.el7.noarch", "7Server-RH7-RHOSE-3.9:ansible-service-broker-selinux-0:1.1.20-2.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.101-1.git.0.150f595.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-redistributable-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-cluster-capacity-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-docker-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-dockerregistry-0:3.9.101-1.git.1.13625cf.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-federation-services-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-master-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-pod-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-sdn-ovs-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-service-catalog-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-template-service-broker-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-tests-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.x86_64", "7Server-RH7-RHOSE-3.9:cockpit-0:195-2.rhaos.el7.src", "7Server-RH7-RHOSE-3.9:cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.9:cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-0:0.5.2-6.el7.src", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-0:0.5.2-6.el7.x86_64", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-debuginfo-0:0.5.2-6.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-3.git858756d.el7.src", "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-3.git858756d.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-o-debuginfo-0:1.9.16-3.git858756d.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.src", "7Server-RH7-RHOSE-3.9:cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-tools-debuginfo-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-node_exporter-0:3.9.101-1.git.1.8295224.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-prometheus-0:2.2.1-2.gitbc6058c.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "7Server-RH7-RHOSE-3.9:hawkular-openshift-agent-0:1.2.2-3.el7.src", "7Server-RH7-RHOSE-3.9:hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "7Server-RH7-RHOSE-3.9:heapster-0:1.3.0-4.el7.src", "7Server-RH7-RHOSE-3.9:heapster-0:1.3.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.9:image-inspector-0:2.1.3-2.el7.src", "7Server-RH7-RHOSE-3.9:image-inspector-0:2.1.3-2.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.src", "7Server-RH7-RHOSE-3.9:openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-0:0.1-3.git5bd9251.el7.src", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-0:0.1-3.git5bd9251.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-debuginfo-0:0.1-3.git5bd9251.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-0:0.0.1-9.git78d6339.el7.src", "7Server-RH7-RHOSE-3.9:openshift-external-storage-debuginfo-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-efs-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-local-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-snapshot-controller-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-snapshot-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openvswitch-ovn-kubernetes-0:0.1.0-3.el7.src", "7Server-RH7-RHOSE-3.9:openvswitch-ovn-kubernetes-0:0.1.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-0:2.2.1-2.gitbc6058c.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-node-exporter-0:3.9.101-1.git.1.8295224.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-promu-0:0-5.git85ceabc.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-11247" }, { "category": "external", "summary": "RHBZ#1732192", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1732192" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-11247", "url": "https://www.cve.org/CVERecord?id=CVE-2019-11247" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11247", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11247" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-discuss/Vf31dXp0EJc", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-discuss/Vf31dXp0EJc" } ], "release_date": "2019-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-24T21:31:32+00:00", "details": "For OpenShift Container Platform 3.9 see the following documentation, which\nwill be updated shortly for release 3.9.100, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/3.9/release_notes/ocp_3_9_release_notes.html", "product_ids": [ "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-2.el7.src", "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-2.el7.x86_64", "7Server-RH7-RHOSE-3.9:ansible-service-broker-container-scripts-0:1.1.20-2.el7.noarch", "7Server-RH7-RHOSE-3.9:ansible-service-broker-selinux-0:1.1.20-2.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.101-1.git.0.150f595.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-redistributable-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-cluster-capacity-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-docker-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-dockerregistry-0:3.9.101-1.git.1.13625cf.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-federation-services-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-master-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-pod-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-sdn-ovs-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-service-catalog-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-template-service-broker-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-tests-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.x86_64", "7Server-RH7-RHOSE-3.9:cockpit-0:195-2.rhaos.el7.src", "7Server-RH7-RHOSE-3.9:cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.9:cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-0:0.5.2-6.el7.src", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-0:0.5.2-6.el7.x86_64", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-debuginfo-0:0.5.2-6.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-3.git858756d.el7.src", "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-3.git858756d.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-o-debuginfo-0:1.9.16-3.git858756d.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.src", "7Server-RH7-RHOSE-3.9:cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-tools-debuginfo-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-node_exporter-0:3.9.101-1.git.1.8295224.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-prometheus-0:2.2.1-2.gitbc6058c.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "7Server-RH7-RHOSE-3.9:hawkular-openshift-agent-0:1.2.2-3.el7.src", "7Server-RH7-RHOSE-3.9:hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "7Server-RH7-RHOSE-3.9:heapster-0:1.3.0-4.el7.src", "7Server-RH7-RHOSE-3.9:heapster-0:1.3.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.9:image-inspector-0:2.1.3-2.el7.src", "7Server-RH7-RHOSE-3.9:image-inspector-0:2.1.3-2.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.src", "7Server-RH7-RHOSE-3.9:openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-0:0.1-3.git5bd9251.el7.src", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-0:0.1-3.git5bd9251.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-debuginfo-0:0.1-3.git5bd9251.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-0:0.0.1-9.git78d6339.el7.src", "7Server-RH7-RHOSE-3.9:openshift-external-storage-debuginfo-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-efs-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-local-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-snapshot-controller-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-snapshot-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openvswitch-ovn-kubernetes-0:0.1.0-3.el7.src", "7Server-RH7-RHOSE-3.9:openvswitch-ovn-kubernetes-0:0.1.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-0:2.2.1-2.gitbc6058c.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-node-exporter-0:3.9.101-1.git.1.8295224.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-promu-0:0-5.git85ceabc.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2769" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-2.el7.src", "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-2.el7.x86_64", "7Server-RH7-RHOSE-3.9:ansible-service-broker-container-scripts-0:1.1.20-2.el7.noarch", "7Server-RH7-RHOSE-3.9:ansible-service-broker-selinux-0:1.1.20-2.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.101-1.git.0.150f595.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-redistributable-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-cluster-capacity-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-docker-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-dockerregistry-0:3.9.101-1.git.1.13625cf.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-federation-services-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-master-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-pod-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-sdn-ovs-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-service-catalog-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-template-service-broker-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-tests-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.x86_64", "7Server-RH7-RHOSE-3.9:cockpit-0:195-2.rhaos.el7.src", "7Server-RH7-RHOSE-3.9:cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.9:cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-0:0.5.2-6.el7.src", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-0:0.5.2-6.el7.x86_64", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-debuginfo-0:0.5.2-6.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-3.git858756d.el7.src", "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-3.git858756d.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-o-debuginfo-0:1.9.16-3.git858756d.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.src", "7Server-RH7-RHOSE-3.9:cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-tools-debuginfo-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-node_exporter-0:3.9.101-1.git.1.8295224.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-prometheus-0:2.2.1-2.gitbc6058c.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "7Server-RH7-RHOSE-3.9:hawkular-openshift-agent-0:1.2.2-3.el7.src", "7Server-RH7-RHOSE-3.9:hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "7Server-RH7-RHOSE-3.9:heapster-0:1.3.0-4.el7.src", "7Server-RH7-RHOSE-3.9:heapster-0:1.3.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.9:image-inspector-0:2.1.3-2.el7.src", "7Server-RH7-RHOSE-3.9:image-inspector-0:2.1.3-2.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.src", "7Server-RH7-RHOSE-3.9:openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-0:0.1-3.git5bd9251.el7.src", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-0:0.1-3.git5bd9251.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-debuginfo-0:0.1-3.git5bd9251.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-0:0.0.1-9.git78d6339.el7.src", "7Server-RH7-RHOSE-3.9:openshift-external-storage-debuginfo-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-efs-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-local-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-snapshot-controller-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-snapshot-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openvswitch-ovn-kubernetes-0:0.1.0-3.el7.src", "7Server-RH7-RHOSE-3.9:openvswitch-ovn-kubernetes-0:0.1.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-0:2.2.1-2.gitbc6058c.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-node-exporter-0:3.9.101-1.git.1.8295224.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-promu-0:0-5.git85ceabc.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kubernetes: API server allows access to cluster-scoped custom resources as if resources were namespaced" } ] }
rhsa-2019_2939
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for rh-nodejs10-nodejs is now available for Red Hat Software Collections.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.\n\nThe following packages have been upgraded to a later upstream version: rh-nodejs10-nodejs (10.16.3).\n\nSecurity Fix(es):\n\n* HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511)\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using PRIORITY frames results in excessive resource consumption (CVE-2019-9513)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* HTTP/2: 0-length headers lead to denial of service (CVE-2019-9516)\n\n* HTTP/2: request for large response leads to denial of service (CVE-2019-9517)\n\n* HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:2939", "url": "https://access.redhat.com/errata/RHSA-2019:2939" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735741" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2939.json" } ], "title": "Red Hat Security Advisory: rh-nodejs10-nodejs security update", "tracking": { "current_release_date": "2024-12-15T18:55:08+00:00", "generator": { "date": "2024-12-15T18:55:08+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2019:2939", "initial_release_date": "2019-10-01T10:03:49+00:00", "revision_history": [ { "date": "2019-10-01T10:03:49+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-10-01T10:03:49+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-15T18:55:08+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } } ], "category": "product_family", "name": "Red Hat Software Collections" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "product": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "product_id": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "product": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "product_id": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "product": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "product_id": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "product": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "product_id": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs10-0:3.2-3.el7.ppc64le", "product": { "name": "rh-nodejs10-0:3.2-3.el7.ppc64le", "product_id": "rh-nodejs10-0:3.2-3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "product": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "product_id": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "product": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "product_id": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "product": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "product_id": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "product": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "product_id": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "product": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "product_id": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "product": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "product_id": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs10-0:3.2-3.el7.s390x", "product": { "name": "rh-nodejs10-0:3.2-3.el7.s390x", "product_id": "rh-nodejs10-0:3.2-3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs10-runtime-0:3.2-3.el7.s390x", "product": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.s390x", "product_id": "rh-nodejs10-runtime-0:3.2-3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "product": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "product_id": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "product": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "product_id": "rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=aarch64" } } }, { "category": "product_version", "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "product": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "product_id": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=aarch64" } } }, { "category": "product_version", "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "product": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "product_id": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=aarch64" } } }, { "category": "product_version", "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "product": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "product_id": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=aarch64" } } }, { "category": "product_version", "name": "rh-nodejs10-0:3.2-3.el7.aarch64", "product": { "name": "rh-nodejs10-0:3.2-3.el7.aarch64", "product_id": "rh-nodejs10-0:3.2-3.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=aarch64" } } }, { "category": "product_version", "name": "rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "product": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "product_id": "rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=aarch64" } } }, { "category": "product_version", "name": "rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "product": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "product_id": "rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "product": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "product_id": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "rh-nodejs10-0:3.2-3.el7.src", "product": { "name": "rh-nodejs10-0:3.2-3.el7.src", "product_id": "rh-nodejs10-0:3.2-3.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "product": { "name": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "product_id": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "product": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "product_id": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "product": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "product_id": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "product": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "product_id": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "product": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "product_id": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs10-0:3.2-3.el7.x86_64", "product": { "name": "rh-nodejs10-0:3.2-3.el7.x86_64", "product_id": "rh-nodejs10-0:3.2-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "product": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "product_id": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "product": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "product_id": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.src", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch" }, "product_reference": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch" }, "product_reference": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch" }, "product_reference": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch" }, "product_reference": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch" }, "product_reference": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.src", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch" }, "product_reference": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-12121", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2018-11-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1661002" } ], "notes": [ { "category": "description", "text": "Node.js: All versions prior to Node.js 6.15.0, 8.14.0, 10.14.0 and 11.3.0: Denial of Service with large HTTP headers: By using a combination of many requests with maximum sized headers (almost 80 KB per connection), and carefully timed completion of the headers, it is possible to cause the HTTP server to abort from heap allocation failure. Attack potential is mitigated by the use of a load balancer or other proxy layer.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Denial of Service with large HTTP headers", "title": "Vulnerability summary" }, { "category": "other", "text": "The nodejs RPMs shipped in Red Hat OpenShift Container Platform (OCP) versions 3.6 through 3.10 are vulnerable to this flaw because they contain the affected code. Later versions of OCP used nodejs RPMs delivered from Red Hat Software Collections and Red Hat Enterprise Linux channels.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-12121" }, { "category": "external", "summary": "RHBZ#1661002", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1661002" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-12121", "url": "https://www.cve.org/CVERecord?id=CVE-2018-12121" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12121", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12121" } ], "release_date": "2018-11-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-01T10:03:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2939" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs: Denial of Service with large HTTP headers" }, { "cve": "CVE-2018-12122", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2018-11-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1661005" } ], "notes": [ { "category": "description", "text": "It was found that Node.js HTTP server was vulnerable to a Slowloris type attack. An attacker could make long lived connections by sending bytes very slowly to the server, saturating its resource and possibly resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Slowloris HTTP Denial of Service", "title": "Vulnerability summary" }, { "category": "other", "text": "The nodejs RPMs shipped in Red Hat OpenShift Container Platform (OCP) versions 3.6 through 3.10 are vulnerable to this flaw because they contain the affected code. Later versions of OCP used nodejs RPMs delivered from Red Hat Software Collections and Red Hat Enterprise Linux channels.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-12122" }, { "category": "external", "summary": "RHBZ#1661005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1661005" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-12122", "url": "https://www.cve.org/CVERecord?id=CVE-2018-12122" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12122", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12122" } ], "release_date": "2018-11-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-01T10:03:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2939" }, { "category": "workaround", "details": "The use of a Load Balancer or a Reverse Proxy will increase the difficulty of the attack.", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs: Slowloris HTTP Denial of Service" }, { "cve": "CVE-2018-12123", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2018-11-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1661010" } ], "notes": [ { "category": "description", "text": "Node.js: All versions prior to Node.js 6.15.0, 8.14.0, 10.14.0 and 11.3.0: Hostname spoofing in URL parser for javascript protocol: If a Node.js application is using url.parse() to determine the URL hostname, that hostname can be spoofed by using a mixed case \"javascript:\" (e.g. \"javAscript:\") protocol (other protocols are not affected). If security decisions are made about the URL based on the hostname, they may be incorrect.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Hostname spoofing in URL parser for javascript protocol", "title": "Vulnerability summary" }, { "category": "other", "text": "The nodejs RPMs shipped in Red Hat OpenShift Container Platform (OCP) versions 3.6 through 3.10 are vulnerable to this flaw because they contain the affected code. Later versions of OCP used nodejs RPMs delivered from Red Hat Software Collections and Red Hat Enterprise Linux channels.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-12123" }, { "category": "external", "summary": "RHBZ#1661010", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1661010" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-12123", "url": "https://www.cve.org/CVERecord?id=CVE-2018-12123" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12123", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12123" } ], "release_date": "2018-11-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-01T10:03:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2939" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs: Hostname spoofing in URL parser for javascript protocol" }, { "cve": "CVE-2019-5737", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-03-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1690808" } ], "notes": [ { "category": "description", "text": "It was found that the original fix for Slowloris, CVE-2018-12122, was insufficient. It is possible to bypass the server\u0027s headersTimeout by sending two specially crafted HTTP requests in the same connection. An attacker could use this flaw to bypass Slowloris protection, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Insufficient Slowloris fix causing DoS via server.headersTimeout bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-5737" }, { "category": "external", "summary": "RHBZ#1690808", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1690808" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-5737", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5737" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5737", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5737" }, { "category": "external", "summary": "https://nodejs.org/ja/blog/vulnerability/february-2019-security-releases/", "url": "https://nodejs.org/ja/blog/vulnerability/february-2019-security-releases/" } ], "release_date": "2019-02-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-01T10:03:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2939" }, { "category": "workaround", "details": "The use of a Load Balancer or a Reverse Proxy will increase the difficulty of the attack.", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs: Insufficient Slowloris fix causing DoS via server.headersTimeout bypass" }, { "cve": "CVE-2019-9511", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741860" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker can request a large amount of data by manipulating window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this queue can consume excess CPU, memory, or both, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: large amount of data requests leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "There are no mitigations available for nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "RHBZ#1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9511", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-01T10:03:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2939" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: large amount of data requests leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-01T10:03:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2939" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9513", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735741" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker, using PRIORITY frames to flood the system, could cause excessive CPU usage and starvation of other clients. The largest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PRIORITY frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for packages nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9513" }, { "category": "external", "summary": "RHBZ#1735741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735741" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9513", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9513" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9513", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9513" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nghttp2.org/blog/2019/08/19/nghttp2-v1-39-2/", "url": "https://nghttp2.org/blog/2019/08/19/nghttp2-v1-39-2/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-01T10:03:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2939" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PRIORITY frames results in excessive resource consumption" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-01T10:03:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2939" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-01T10:03:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2939" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "cve": "CVE-2019-9516", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741864" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker, sending a stream of header with a 0-length header name and a 0-length header value, could cause some implementations to allocate memory for these headers and keep the allocations alive until the session dies. The can consume excess memory, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: 0-length headers lead to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9516" }, { "category": "external", "summary": "RHBZ#1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9516", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9516" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://github.com/nghttp2/nghttp2/issues/1382#", "url": "https://github.com/nghttp2/nghttp2/issues/1382#" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-01T10:03:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2939" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: 0-length headers lead to denial of service" }, { "cve": "CVE-2019-9517", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741868" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in HTTP/2. An attacker can open a HTTP/2 window so the peer can send without constraint. The TCP window remains closed so the peer cannot write the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the server\u0027s queue is setup, the responses can consume excess memory, CPU, or both, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: request for large response leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "The package httpd versions as shipped with Red Hat Enterprise Linux 5, 6 and 7 are not affected by this issue as HTTP/2 support is not provided.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9517" }, { "category": "external", "summary": "RHBZ#1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9517", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9517" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-01T10:03:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2939" }, { "category": "workaround", "details": "The httpd version shipped with Red Hat Enterprise Linux 8 provides HTTP/2 support through mod_http2 package. While mod_http2 package is not updated, users can disable HTTP/2 support as mitigation action by executing the following steps:\n\n1. Stop httpd service:\n$ systemctl stop httpd\n\n2. Remove http/2 protocol support from configuration files:\n$ sed -i \u0027s/\\(h2\\)\\|\\(h2c\\)//g\u0027 \u003chttpd_config_file\u003e\n\n3. Validate configuration files to make sure all syntax is valid:\n$ apachectl configtest\n\n4. Restart httpd service:\n$ systemctl start httpd", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: request for large response leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9518", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735749" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using frames with an empty payload, a flood could occur that results in excessive CPU usage and starvation of other clients. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using empty frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9518" }, { "category": "external", "summary": "RHBZ#1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9518", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-01T10:03:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2939" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using empty frames results in excessive resource consumption" } ] }
rhsa-2019:3892
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "A minor version update (from 7.4 to 7.5) is now available for Red Hat Fuse. The purpose of this text-only errata is to inform you about the security issues fixed in this release.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.\n\n[2020-04-17 update: descriptions for mutiple components fixed for the same CVE added]", "title": "Topic" }, { "category": "general", "text": "This release of Red Hat Fuse 7.5.0 serves as a replacement for Red Hat Fuse 7.4, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-7525) (CVE-2017-15095)\n\n* jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-15095) (CVE-2017-17485)\n\n* infinispan: deserialization of data in XML and JSON transcoders (CVE-2018-1131)\n\n* hadoop: arbitrary file write vulnerability / arbitrary code execution using a specially crafted zip file (CVE-2018-8009)\n\n* jackson-databind: Potential information exfiltration with default typing, serialization gadget from MyBatis (CVE-2018-11307)\n\n* jackson-databind: improper polymorphic deserialization of types from Jodd-db library (CVE-2018-12022)\n\n* jackson-databind: improper polymorphic deserialization of types from Oracle JDBC driver (CVE-2018-12023)\n\n* jackson-databind: arbitrary code execution in slf4j-ext class (CVE-2018-14718)\n\n* jackson-databind: arbitrary code execution in blaze-ds-opt and blaze-ds-core classes (CVE-2018-14719)\n\n* jackson-databind: exfiltration/XXE in some JDK classes (CVE-2018-14720)\n\n* jackson-databind: improper polymorphic deserialization in axis2-transport-jms class (CVE-2018-19360)\n\n* jackson-databind: improper polymorphic deserialization in openjpa class (CVE-2018-19361)\n\n* jackson-databind: improper polymorphic deserialization in jboss-common-core class (CVE-2018-19362)\n\n* retrofit: Directory traversal in RequestBuilder allows manipulation of resources (CVE-2018-1000850)\n\n* zookeeper: Information disclosure in Apache ZooKeeper (CVE-2019-0201)\n\n* mesos: docker image code execution (CVE-2019-0204)\n\n* netty: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* grpc: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* netty: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* grpc: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* netty: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* grpc: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* netty: HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)\n\n* xstream: remote code execution due to insecure XML deserialization (regression of CVE-2013-7285) (CVE-2019-10173)\n\n* syndesis: default CORS configuration is allow all (CVE-2019-14860)\n\n* netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers (CVE-2019-16869)\n\n* activemq: ActiveMQ Client Missing TLS Hostname Verification (CVE-2018-11775)\n\n* tika: Incomplete fix allows for XML entity expansion resulting in denial of service (CVE-2018-11796)\n\n* jackson-databind: server-side request forgery (SSRF) in axis2-jaxws class (CVE-2018-14721)\n\n* tomcat: Host name verification missing in WebSocket client (CVE-2018-8034)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:3892", "url": "https://access.redhat.com/errata/RHSA-2019:3892" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=jboss.fuse\u0026version=7.5.0", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=jboss.fuse\u0026version=7.5.0" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "url": "https://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/" }, { "category": "external", "summary": "1506612", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1506612" }, { "category": "external", "summary": "1528565", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1528565" }, { "category": "external", "summary": "1576492", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1576492" }, { "category": "external", "summary": "1593018", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1593018" }, { "category": "external", "summary": "1607580", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1607580" }, { "category": "external", "summary": "1629083", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1629083" }, { "category": "external", "summary": "1639090", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1639090" }, { "category": "external", "summary": "1663904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1663904" }, { "category": "external", "summary": "1666415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666415" }, { "category": "external", "summary": "1666418", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666418" }, { "category": "external", "summary": "1666423", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666423" }, { "category": "external", "summary": "1666428", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666428" }, { "category": "external", "summary": "1666482", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666482" }, { "category": "external", "summary": "1666484", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666484" }, { "category": "external", "summary": "1666489", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666489" }, { "category": "external", "summary": "1671096", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1671096" }, { "category": "external", "summary": "1671097", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1671097" }, { "category": "external", "summary": "1677341", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1677341" }, { "category": "external", "summary": "1692755", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1692755" }, { "category": "external", "summary": "1715197", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1715197" }, { "category": "external", "summary": "1722971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1722971" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "1758619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758619" }, { "category": "external", "summary": "1761912", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1761912" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3892.json" } ], "title": "Red Hat Security Advisory: Red Hat Fuse 7.5.0 security update", "tracking": { "current_release_date": "2025-04-10T05:23:12+00:00", "generator": { "date": "2025-04-10T05:23:12+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.2" } }, "id": "RHSA-2019:3892", "initial_release_date": "2019-11-14T21:17:38+00:00", "revision_history": [ { "date": "2019-11-14T21:17:38+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-04-20T07:18:57+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-04-10T05:23:12+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Fuse 7.5.0", "product": { "name": "Red Hat Fuse 7.5.0", "product_id": "Red Hat Fuse 7.5.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_fuse:7" } } } ], "category": "product_family", "name": "Red Hat JBoss Fuse" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Liao Xinxi" ], "organization": "NSFOCUS" } ], "cve": "CVE-2017-15095", "cwe": { "id": "CWE-184", "name": "Incomplete List of Disallowed Inputs" }, "discovery_date": "2017-10-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1506612" } ], "notes": [ { "category": "description", "text": "A deserialization flaw was discovered in the jackson-databind which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readValue method of the ObjectMapper. This issue extends the previous flaw CVE-2017-7525 by blacklisting more classes that could be used maliciously.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-7525)", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of jackson-databind (in Satellite 6.0 and 6.1) and candlepin (which embeds a copy of jackson-databind in Satellite 6.2) as shipped with Red Hat Satellite 6.x. However the affected code is NOT used at this time:\n\nCandlepin currently uses the default type resolution configuration for the ObjectMappers it creates/uses. Nowhere in candlepin do we enable global polymorphic deserialization via enableDefaultTyping(...), therefore based on the documentation sited BZ 1462702 , candlepin should not be affected.\n\nHowever as the vulnerable software ships with the product we have marked them as vulnerable to ensure the issue is tracked.\n\nJBoss EAP 7.x only uses the vulnerable Jackson Databind library for marshalling and unmarshalling of JSON objects passed to JAX-RS webservices. Some advise about how to remain safe when using JAX-RS webservices on JBoss EAP 7.x is available here: \n\nhttps://access.redhat.com/solutions/3279231", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-15095" }, { "category": "external", "summary": "RHBZ#1506612", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1506612" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-15095", "url": "https://www.cve.org/CVERecord?id=CVE-2017-15095" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-15095", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15095" }, { "category": "external", "summary": "https://access.redhat.com/solutions/3442891", "url": "https://access.redhat.com/solutions/3442891" } ], "release_date": "2017-11-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" }, { "category": "workaround", "details": "Mitigation to this problem is to not trigger polymorphic desrialization globally by using: objectMapper.enableDefaultTyping() and rather use @JsonTypeInfo on the class property to explicitly define the type information. For more information on this issue please refer to https://www.github.com/mbechler/marshalsec/blob/master/marshalsec.pdf?raw=true", "product_ids": [ "Red Hat Fuse 7.5.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-7525)" }, { "acknowledgments": [ { "names": [ "0c0c0f from 360\u89c2\u661f\u5b9e\u9a8c\u5ba4" ] } ], "cve": "CVE-2017-17485", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2017-12-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1528565" } ], "notes": [ { "category": "description", "text": "A deserialization flaw was discovered in the jackson-databind which could allow an unauthenticated user to perform code execution by sending maliciously crafted input to the readValue method of ObjectMapper. This issue extends upon the previous flaws CVE-2017-7525 and CVE-2017-15095 by blacklisting more classes that could be used maliciously.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-15095)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-17485" }, { "category": "external", "summary": "RHBZ#1528565", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1528565" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-17485", "url": "https://www.cve.org/CVERecord?id=CVE-2017-17485" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-17485", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-17485" }, { "category": "external", "summary": "https://access.redhat.com/solutions/3442891", "url": "https://access.redhat.com/solutions/3442891" } ], "release_date": "2017-12-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-15095)" }, { "cve": "CVE-2018-1131", "cwe": { "id": "CWE-349", "name": "Acceptance of Extraneous Untrusted Data With Trusted Data" }, "discovery_date": "2018-05-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1576492" } ], "notes": [ { "category": "description", "text": "Infinispan permits improper deserialization of trusted data via XML and JSON transcoders under certain server configurations. A user with authenticated access to the server could send a malicious object to a cache configured to accept certain types of objects, achieving code execution and possible further attacks. Versions 9.0.3.Final, 9.1.7.Final, 8.2.10.Final, 9.2.2.Final, 9.3.0.Alpha1 are believed to be affected.", "title": "Vulnerability description" }, { "category": "summary", "text": "infinispan: deserialization of data in XML and JSON transcoders", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1131" }, { "category": "external", "summary": "RHBZ#1576492", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1576492" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1131", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1131" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1131", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1131" } ], "release_date": "2018-05-14T14:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "infinispan: deserialization of data in XML and JSON transcoders" }, { "cve": "CVE-2018-8009", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2018-06-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1593018" } ], "notes": [ { "category": "description", "text": "Apache Hadoop 3.1.0, 3.0.0-alpha to 3.0.2, 2.9.0 to 2.9.1, 2.8.0 to 2.8.4, 2.0.0-alpha to 2.7.6, 0.23.0 to 0.23.11 is exploitable via the zip slip vulnerability in places that accept a zip file.", "title": "Vulnerability description" }, { "category": "summary", "text": "hadoop: arbitrary file write vulnerability / arbitrary code execution using a specially crafted zip file", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of rhs-hadoop as shipped with Red Hat Gluster Storage 3. For JBoss Fuse 6.3 and 7 standalone, while they ship vulnerable artifact via camel-hbase, camel-hdfs2 (fuse 6.3) and camel-hdfs2 (fuse 7), there\u0027s no invocation on the flawed code that could lead to an unzip operation. So fuse 6.3, 7 standalone are not affected. However FIS 2.0 and Fuse 7 on OpenShift ship vulnerable artifact via maven BOM, so setting fuse as affected for this reason.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-8009" }, { "category": "external", "summary": "RHBZ#1593018", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1593018" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-8009", "url": "https://www.cve.org/CVERecord?id=CVE-2018-8009" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-8009", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-8009" } ], "release_date": "2018-06-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "hadoop: arbitrary file write vulnerability / arbitrary code execution using a specially crafted zip file" }, { "cve": "CVE-2018-8034", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2018-07-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1607580" } ], "notes": [ { "category": "description", "text": "The host name verification when using TLS with the WebSocket client was missing. It is now enabled by default. Versions Affected: Apache Tomcat 9.0.0.M1 to 9.0.9, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, and 7.0.35 to 7.0.88.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Host name verification missing in WebSocket client", "title": "Vulnerability summary" }, { "category": "other", "text": "Tomcat 6, and Red Hat products shipping it, are not affected by this CVE. Tomcat 7, 8, and 9, as well as Red Hat Products shipping them, are affected. Affected products, including Red Hat JBoss Web Server 3 and 5, Enterprise Application Server 6, and Fuse 7, may provide fixes for this issue in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-8034" }, { "category": "external", "summary": "RHBZ#1607580", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1607580" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-8034", "url": "https://www.cve.org/CVERecord?id=CVE-2018-8034" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-8034", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-8034" } ], "release_date": "2018-07-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "tomcat: Host name verification missing in WebSocket client" }, { "cve": "CVE-2018-11307", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-02-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1677341" } ], "notes": [ { "category": "description", "text": "A vulnerability was discovered in jackson-databind where it would permit deserialization of a malicious object using MyBatis classes when using DefaultTyping. An attacker could use this flaw to achieve content exfiltration and possibly conduct further attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Potential information exfiltration with default typing, serialization gadget from MyBatis", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 is not affected by this issue, since Candlepin\u0027s java runtime environment does not load MyBatis classes.\n\nRed Hat Virtualization 4 is not affected by this issue, since it does not include MyBatis classes.\n\nRed Hat Fuse 6 and 7 are not directly affected by this issue, as although they do ship the vulnerable jackson-databind component, they do not enable polymorphic deserialization or default typing which are required for exploitability. Their impacts have correspondingly been reduced to Moderate. Future updates may address this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-11307" }, { "category": "external", "summary": "RHBZ#1677341", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1677341" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-11307", "url": "https://www.cve.org/CVERecord?id=CVE-2018-11307" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-11307", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11307" } ], "release_date": "2018-05-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Potential information exfiltration with default typing, serialization gadget from MyBatis" }, { "cve": "CVE-2018-11775", "discovery_date": "2018-09-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1629083" } ], "notes": [ { "category": "description", "text": "TLS hostname verification when using the Apache ActiveMQ Client before 5.15.6 was missing which could make the client vulnerable to a MITM attack between a Java application using the ActiveMQ client and the ActiveMQ server. This is now enabled by default.", "title": "Vulnerability description" }, { "category": "summary", "text": "activemq: ActiveMQ Client Missing TLS Hostname Verification", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-11775" }, { "category": "external", "summary": "RHBZ#1629083", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1629083" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-11775", "url": "https://www.cve.org/CVERecord?id=CVE-2018-11775" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-11775", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11775" } ], "release_date": "2018-09-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "activemq: ActiveMQ Client Missing TLS Hostname Verification" }, { "cve": "CVE-2018-11796", "cwe": { "id": "CWE-776", "name": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)" }, "discovery_date": "2018-10-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1639090" } ], "notes": [ { "category": "description", "text": "In Apache Tika 1.19 (CVE-2018-11761), we added an entity expansion limit for XML parsing. However, Tika reuses SAXParsers and calls reset() after each parse, which, for Xerces2 parsers, as per the documentation, removes the user-specified SecurityManager and thus removes entity expansion limits after the first parse. Apache Tika versions from 0.1 to 1.19 are therefore still vulnerable to entity expansions which can lead to a denial of service attack. Users should upgrade to 1.19.1 or later.", "title": "Vulnerability description" }, { "category": "summary", "text": "tika: Incomplete fix allows for XML entity expansion resulting in denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of tika which is embedded in the nutch package as shipped with Red Hat Satellite 5. The tika server is not exposed, as such exploitation is difficult, Red Hat Product Security has rated this issue as having security impact of Low. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-11796" }, { "category": "external", "summary": "RHBZ#1639090", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1639090" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-11796", "url": "https://www.cve.org/CVERecord?id=CVE-2018-11796" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-11796", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11796" }, { "category": "external", "summary": "https://lists.apache.org/thread.html/88de8350cda9b184888ec294c813c5bd8a2081de8fd3666f8904bc05@%3Cdev.tika.apache.org%3E", "url": "https://lists.apache.org/thread.html/88de8350cda9b184888ec294c813c5bd8a2081de8fd3666f8904bc05@%3Cdev.tika.apache.org%3E" } ], "release_date": "2018-10-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "tika: Incomplete fix allows for XML entity expansion resulting in denial of service" }, { "cve": "CVE-2018-12022", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-01-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1671097" } ], "notes": [ { "category": "description", "text": "A vulnerability was discovered in jackson-databind where it would permit deserialization of a malicious object using Jodd DB connection classes when using DefaultTyping. An attacker could use this flaw to achieve remote code execution under certain circumstances.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: improper polymorphic deserialization of types from Jodd-db library", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 is not affected by this issue, since Candlepin\u0027s java runtime environment does not load Jodd classes.\n\nRed Hat Virtualization 4 is not affected by this issue, since it does not load Jodd classes.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-12022" }, { "category": "external", "summary": "RHBZ#1671097", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1671097" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-12022", "url": "https://www.cve.org/CVERecord?id=CVE-2018-12022" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12022", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12022" } ], "release_date": "2018-05-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: improper polymorphic deserialization of types from Jodd-db library" }, { "cve": "CVE-2018-12023", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-01-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1671096" } ], "notes": [ { "category": "description", "text": "A vulnerability was discovered in jackson-databind where it would permit deserialization of a malicious object using Oracle JDBC classes when using DefaultTyping. An attacker could use this flaw to achieve remote code execution under certain circumstances.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: improper polymorphic deserialization of types from Oracle JDBC driver", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 is not affected by this issue, since Candlepin\u0027s java runtime environment does not load Oracle\u0027s JDBC classes.\n\nRed Hat Virtualization 4 is not affected by this issue, since it does not load Oracle\u0027s JDBC classes.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-12023" }, { "category": "external", "summary": "RHBZ#1671096", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1671096" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-12023", "url": "https://www.cve.org/CVERecord?id=CVE-2018-12023" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12023", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12023" } ], "release_date": "2018-06-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: improper polymorphic deserialization of types from Oracle JDBC driver" }, { "cve": "CVE-2018-14718", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1666415" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in jackson-databind, where it would permit polymorphic deserialization of a malicious object using slf4j classes. An attacker could use this flaw to execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: arbitrary code execution in slf4j-ext class", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability in jackson-databind involves exploiting CVE-2018-1088 against slf4j, which was fixed in Red Hat products through the errata referenced at https://access.redhat.com/security/cve/cve-2018-8088. Applications that link only slf4j versions including that fix are not vulnerable to this vulnerability.\n\nRed Hat Satellite 6 is not affected by this issue, since its candlepin component doesn\u0027t bundle slf4j-ext jar.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-14718" }, { "category": "external", "summary": "RHBZ#1666415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666415" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-14718", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14718" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14718", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14718" } ], "release_date": "2018-07-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: arbitrary code execution in slf4j-ext class" }, { "cve": "CVE-2018-14719", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1666418" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in jackson-databind, where it would permit polymorphic deserialization of a malicious object using blaze classes. An attacker could use this flaw to execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: arbitrary code execution in blaze-ds-opt and blaze-ds-core classes", "title": "Vulnerability summary" }, { "category": "other", "text": "The following Red Hat products are not affected by this issue as they do not bundle or provide the requisite gadget jars to exploit this vulnerability:\nRed Hat Satellite 6\nRed Hat Enterprise Virtualization 4\nRed Hat Fuse 6, 7, and Fuse Integration Services 2\nRed Hat A-MQ 6", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-14719" }, { "category": "external", "summary": "RHBZ#1666418", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666418" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-14719", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14719" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14719", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14719" } ], "release_date": "2018-07-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: arbitrary code execution in blaze-ds-opt and blaze-ds-core classes" }, { "cve": "CVE-2018-14720", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "discovery_date": "2019-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1666423" } ], "notes": [ { "category": "description", "text": "FasterXML jackson-databind 2.x before 2.9.7 might allow attackers to conduct external XML entity (XXE) attacks by leveraging failure to block unspecified JDK classes from polymorphic deserialization.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: exfiltration/XXE in some JDK classes", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 is not affected by this issue, since its only supported Java runtime (openJDK) doesn\u0027t bundle the com.sun.deploy.security.ruleset.DRSHelper class.\n\nRed Hat Enterprise Virtualization 4 is not affected by this issue, since its only supported Java runtime (openJDK) doesn\u0027t bundle the com.sun.deploy.security.ruleset.DRSHelper class.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-14720" }, { "category": "external", "summary": "RHBZ#1666423", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666423" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-14720", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14720" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14720", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14720" } ], "release_date": "2018-07-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible \n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Fuse 7.5.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: exfiltration/XXE in some JDK classes" }, { "cve": "CVE-2018-14721", "cwe": { "id": "CWE-352", "name": "Cross-Site Request Forgery (CSRF)" }, "discovery_date": "2019-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1666428" } ], "notes": [ { "category": "description", "text": "FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to conduct server-side request forgery (SSRF) attacks by leveraging failure to block the axis2-jaxws class from polymorphic deserialization.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: server-side request forgery (SSRF) in axis2-jaxws class", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 is not affected by this issue, since its candlepin component doesn\u0027t bundle axis2-jaxws jar.\n\nRed Hat Virtualization is not affected by this issue, since its does not bundle axis2-jaxws jar.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-14721" }, { "category": "external", "summary": "RHBZ#1666428", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666428" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-14721", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14721" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14721", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14721" } ], "release_date": "2018-07-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: server-side request forgery (SSRF) in axis2-jaxws class" }, { "cve": "CVE-2018-19360", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1666482" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in jackson-databind, where it would permit polymorphic deserialization of a malicious object using the axis2-transport-jms class. An attacker could use this flaw to execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: improper polymorphic deserialization in axis2-transport-jms class", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 is not affected by this issue, since its candlepin component doesn\u0027t include axis2-transport-jms jar.\n\nRed Hat Virtualization 4 is not affected by this issue, since it does not include axis2-transport-jms jar.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-19360" }, { "category": "external", "summary": "RHBZ#1666482", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666482" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-19360", "url": "https://www.cve.org/CVERecord?id=CVE-2018-19360" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-19360", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-19360" } ], "release_date": "2018-11-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: improper polymorphic deserialization in axis2-transport-jms class" }, { "cve": "CVE-2018-19361", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1666484" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in jackson-databind, where it would permit polymorphic deserialization of a malicious object using the OpenJPA class. An attacker could use this flaw to execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: improper polymorphic deserialization in openjpa class", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 is not affected by this issue, since its candlepin component doesn\u0027t bundle openjpa jar.\n\nRed Hat Virtualization 4 is not affected by this issue, since its candlepin component doesn\u0027t bundle openjpa jar.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-19361" }, { "category": "external", "summary": "RHBZ#1666484", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666484" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-19361", "url": "https://www.cve.org/CVERecord?id=CVE-2018-19361" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-19361", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-19361" } ], "release_date": "2018-11-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: improper polymorphic deserialization in openjpa class" }, { "cve": "CVE-2018-19362", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1666489" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in jackson-databind, where it would permit polymorphic deserialization of a malicious object using the jboss-common-core class. An attacker could use this flaw to execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: improper polymorphic deserialization in jboss-common-core class", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 is not affected by this issue, since its candlepin component doesn\u0027t bundle jboss-common-core jar.\n\nRed Hat Virtualization 4 is not affected by this issue, since its candlepin component doesn\u0027t bundle jboss-common-core jar.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-19362" }, { "category": "external", "summary": "RHBZ#1666489", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666489" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-19362", "url": "https://www.cve.org/CVERecord?id=CVE-2018-19362" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-19362", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-19362" } ], "release_date": "2018-11-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: improper polymorphic deserialization in jboss-common-core class" }, { "cve": "CVE-2018-1000850", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2018-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1663904" } ], "notes": [ { "category": "description", "text": "A flaw was found in Retrofit, where it allowed directory traversal via its RequestBuilder class. An attacker could use this flaw to access information or commands outside of its set permissions.", "title": "Vulnerability description" }, { "category": "summary", "text": "retrofit: Directory traversal in RequestBuilder allows manipulation of resources", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1000850" }, { "category": "external", "summary": "RHBZ#1663904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1663904" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1000850", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1000850" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000850", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000850" } ], "release_date": "2018-10-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "retrofit: Directory traversal in RequestBuilder allows manipulation of resources" }, { "cve": "CVE-2019-0201", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "discovery_date": "2019-05-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1715197" } ], "notes": [ { "category": "description", "text": "A flaw was found in Apache ZooKeeper. A lack of permission checks while retrieving ACLs allows unsalted hash values to be disclosed for unauthenticated or unprivileged users.", "title": "Vulnerability description" }, { "category": "summary", "text": "zookeeper: Information disclosure in Apache ZooKeeper", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-0201" }, { "category": "external", "summary": "RHBZ#1715197", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1715197" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0201", "url": "https://www.cve.org/CVERecord?id=CVE-2019-0201" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0201", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0201" } ], "release_date": "2019-05-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" }, { "category": "workaround", "details": "Use an authentication method other than Digest (e.g. Kerberos) or upgrade to zookeeper 3.4.14 or later (3.5.5 or later if on the 3.5 branch). [https://zookeeper.apache.org/security.html#CVE-2019-0201]", "product_ids": [ "Red Hat Fuse 7.5.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "zookeeper: Information disclosure in Apache ZooKeeper" }, { "cve": "CVE-2019-0204", "cwe": { "id": "CWE-250", "name": "Execution with Unnecessary Privileges" }, "discovery_date": "2019-03-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1692755" } ], "notes": [ { "category": "description", "text": "A flaw was found in Docker image running under root user, where it is possible to overwrite the init helper binary of the container runtime or the command executor in Apache Mesos. A malicious user could use this flaw to gain root-level code execution on the host.", "title": "Vulnerability description" }, { "category": "summary", "text": "mesos: docker image code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-0204" }, { "category": "external", "summary": "RHBZ#1692755", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1692755" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0204", "url": "https://www.cve.org/CVERecord?id=CVE-2019-0204" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0204", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0204" } ], "release_date": "2019-03-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "mesos: docker image code execution" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9518", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735749" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using frames with an empty payload, a flood could occur that results in excessive CPU usage and starvation of other clients. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using empty frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9518" }, { "category": "external", "summary": "RHBZ#1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9518", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using empty frames results in excessive resource consumption" }, { "cve": "CVE-2019-10173", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "discovery_date": "2019-06-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1722971" } ], "notes": [ { "category": "description", "text": "It was found that xstream API version 1.4.10 introduced a regression for a previous deserialization flaw. If the security framework has not been initialized, it may allow a remote attacker to run arbitrary shell commands when unmarshalling XML or any supported format. This a regression of CVE-2013-7285 fixed in 1.4.7 (fixed) as of BPMS 6.0.1, the regression was introduced with xstream-1.4.10 implemented in RHPAM.", "title": "Vulnerability description" }, { "category": "summary", "text": "xstream: remote code execution due to insecure XML deserialization (regression of CVE-2013-7285)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10173" }, { "category": "external", "summary": "RHBZ#1722971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1722971" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10173", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10173" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10173", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10173" }, { "category": "external", "summary": "http://x-stream.github.io/changes.html#1.4.11", "url": "http://x-stream.github.io/changes.html#1.4.11" } ], "release_date": "2018-10-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xstream: remote code execution due to insecure XML deserialization (regression of CVE-2013-7285)" }, { "acknowledgments": [ { "names": [ "Jeremy Choi" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2019-14860", "cwe": { "id": "CWE-942", "name": "Permissive Cross-domain Policy with Untrusted Domains" }, "discovery_date": "2019-10-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1761912" } ], "notes": [ { "category": "description", "text": "It was found that the Syndesis configuration for Cross-Origin Resource Sharing was set to allow all origins. An attacker could use this lack of protection to conduct phishing attacks and further access unauthorized information.", "title": "Vulnerability description" }, { "category": "summary", "text": "syndesis: default CORS configuration is allow all", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14860" }, { "category": "external", "summary": "RHBZ#1761912", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1761912" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14860", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14860" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14860", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14860" } ], "release_date": "2019-10-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "syndesis: default CORS configuration is allow all" }, { "cve": "CVE-2019-16869", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2019-09-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1758619" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty, where whitespace before the colon in HTTP headers is mishandled. This flaw allows an attacker to cause HTTP request smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that this vulnerability does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships vulnerable netty version embedded in Candlepin, however, is not directly vulnerable since HTTP requests are handled by Tomcat and not netty.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-16869" }, { "category": "external", "summary": "RHBZ#1758619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758619" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16869", "url": "https://www.cve.org/CVERecord?id=CVE-2019-16869" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16869", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16869" } ], "release_date": "2019-09-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat Fuse 7.5.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers" } ] }
RHSA-2020:3196
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat Decision Manager.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Decision Manager is an open source decision management platform that combines business rules management, complex event processing, Decision Model \u0026 Notation (DMN) execution, and Business Optimizer for solving planning problems. It automates business decisions and makes that logic available to the entire business. \n\nThis release of Red Hat Decision Manager 7.8.0 serves as an update to Red Hat Decision Manager 7.7.1, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* netty: HTTP request smuggling (CVE-2019-20444)\n\n* netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers (CVE-2019-16869)\n\n* netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling (CVE-2020-7238)\n\n* netty: HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)\n\n* netty: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* netty: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* netty: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header (CVE-2019-20445)\n\n* cxf-core: cxf: does not restrict the number of message attachments (CVE-2019-12406)\n\n* cxf-core: cxf: OpenId Connect token service does not properly validate the clientId (CVE-2019-12423)\n\n* cxf-core: cxf: reflected XSS in the services listing page (CVE-2019-17573)\n\n* jackson-databind: lacks certain net.sf.ehcache blocking (CVE-2019-20330)\n\n* jackson-databind: Lacks certain xbean-reflect/JNDI blocking (CVE-2020-8840)\n\n* jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution (CVE-2020-10672)\n\n* jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution (CVE-2020-10673)\n\n* jackson-databind: Serialization gadgets in anteros-core (CVE-2020-9548)\n\n* jackson-databind: Serialization gadgets in commons-jelly:commons-jelly (CVE-2020-11620)\n\n* jackson-databind: Serialization gadgets in ibatis-sqlmap (CVE-2020-9547)\n\n* jackson-databind: Serialization gadgets in javax.swing.JEditorPane (CVE-2020-10969)\n\n* jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider (CVE-2020-10968)\n\n* jackson-databind: Serialization gadgets in org.apache.activemq.jms.pool.XaPooledConnectionFactory (CVE-2020-11111)\n\n* jackson-databind: Serialization gadgets in org.apache.commons.proxy.provider.remoting.RmiProvider (CVE-2020-11112)\n\n* jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime (CVE-2020-11113)\n\n* jackson-databind: Serialization gadgets in org.springframework:spring-aop (CVE-2020-11619)\n\n* jackson-databind: Serialization gadgets in shaded-hikari-config (CVE-2020-9546)\n\n* jackson-databind: serialization in oadd.org.apache.xalan.lib.sql.JNDIConnectionPool (CVE-2020-14060)\n\n* jackson-databind: serialization in weblogic/oracle-aqjms (CVE-2020-14061)\n\n* jackson-databind: serialization in com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool (CVE-2020-14062)\n\n* netty: compression/decompression codecs don\u0027t enforce limits on buffer allocation sizes (CVE-2020-11612)\n\n* quartz: libquartz: XXE attacks via job description (CVE-2019-13990)\n\n* keycloak: security issue on reset credential flow (CVE-2020-1718)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:3196", "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=rhdm\u0026version=7.8.0", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=rhdm\u0026version=7.8.0" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_decision_manager/7.8/html/release_notes_for_red_hat_decision_manager_7.8/index", "url": "https://access.redhat.com/documentation/en-us/red_hat_decision_manager/7.8/html/release_notes_for_red_hat_decision_manager_7.8/index" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "1758619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758619" }, { "category": "external", "summary": "1793154", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793154" }, { "category": "external", "summary": "1796225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796225" }, { "category": "external", "summary": "1796756", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796756" }, { "category": "external", "summary": "1797006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1797006" }, { "category": "external", "summary": "1797011", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1797011" }, { "category": "external", "summary": "1798509", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798509" }, { "category": "external", "summary": "1798524", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798524" }, { "category": "external", "summary": "1801149", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1801149" }, { "category": "external", "summary": "1815470", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1815470" }, { "category": "external", "summary": "1815495", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1815495" }, { "category": "external", "summary": "1816170", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816170" }, { "category": "external", "summary": "1816216", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816216" }, { "category": "external", "summary": "1816330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816330" }, { "category": "external", "summary": "1816332", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816332" }, { "category": "external", "summary": "1816337", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816337" }, { "category": "external", "summary": "1816340", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816340" }, { "category": "external", "summary": "1819208", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819208" }, { "category": "external", "summary": "1819212", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819212" }, { "category": "external", "summary": "1821304", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821304" }, { "category": "external", "summary": "1821311", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821311" }, { "category": "external", "summary": "1821315", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821315" }, { "category": "external", "summary": "1826798", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1826798" }, { "category": "external", "summary": "1826805", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1826805" }, { "category": "external", "summary": "1848960", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848960" }, { "category": "external", "summary": "1848962", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848962" }, { "category": "external", "summary": "1848966", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848966" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_3196.json" } ], "title": "Red Hat Security Advisory: Red Hat Decision Manager 7.8.0 Security Update", "tracking": { "current_release_date": "2025-04-09T17:54:17+00:00", "generator": { "date": "2025-04-09T17:54:17+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.2" } }, "id": "RHSA-2020:3196", "initial_release_date": "2020-07-29T06:06:57+00:00", "revision_history": [ { "date": "2020-07-29T06:06:57+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-07-29T06:06:57+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-04-09T17:54:17+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Decision Manager 7", "product": { "name": "Red Hat Decision Manager 7", "product_id": "Red Hat Decision Manager 7", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_brms_platform:7.8" } } } ], "category": "product_family", "name": "Red Hat Decision Manager" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9518", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735749" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using frames with an empty payload, a flood could occur that results in excessive CPU usage and starvation of other clients. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using empty frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9518" }, { "category": "external", "summary": "RHBZ#1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9518", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using empty frames results in excessive resource consumption" }, { "cve": "CVE-2019-12406", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-03-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816170" } ], "notes": [ { "category": "description", "text": "Apache CXF before 3.3.4 and 3.2.11 does not restrict the number of message attachments present in a given message. This leaves open the possibility of a denial of service type attack, where a malicious user crafts a message containing a very large number of message attachments. From the 3.3.4 and 3.2.11 releases, a default limit of 50 message attachments is enforced. This is configurable via the message property \"attachment-max-count\".", "title": "Vulnerability description" }, { "category": "summary", "text": "cxf: does not restrict the number of message attachments", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-12406" }, { "category": "external", "summary": "RHBZ#1816170", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816170" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-12406", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12406" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-12406", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12406" } ], "release_date": "2019-11-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "cxf: does not restrict the number of message attachments" }, { "cve": "CVE-2019-12423", "cwe": { "id": "CWE-522", "name": "Insufficiently Protected Credentials" }, "discovery_date": "2020-01-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1797006" } ], "notes": [ { "category": "description", "text": "Apache CXF ships with a OpenId Connect JWK Keys service, which allows a client to obtain the public keys in JWK format, which can then be used to verify the signature of tokens issued by the service. Typically, the service obtains the public key from a local keystore (JKS/PKCS12) by specifing the path of the keystore and the alias of the keystore entry. This case is not vulnerable. However it is also possible to obtain the keys from a JWK keystore file, by setting the configuration parameter \"rs.security.keystore.type\" to \"jwk\". For this case all keys are returned in this file \"as is\", including all private key and secret key credentials. This is an obvious security risk if the user has configured the signature keystore file with private or secret key credentials. From CXF 3.3.5 and 3.2.12, it is mandatory to specify an alias corresponding to the id of the key in the JWK file, and only this key is returned. In addition, any private key information is omitted by default. \"oct\" keys, which contain secret keys, are not returned at all.", "title": "Vulnerability description" }, { "category": "summary", "text": "cxf: OpenId Connect token service does not properly validate the clientId", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-12423" }, { "category": "external", "summary": "RHBZ#1797006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1797006" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-12423", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12423" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-12423", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12423" } ], "release_date": "2020-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "cxf: OpenId Connect token service does not properly validate the clientId" }, { "cve": "CVE-2019-13990", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "discovery_date": "2019-07-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1801149" } ], "notes": [ { "category": "description", "text": "The Terracotta Quartz Scheduler is susceptible to an XML external entity attack (XXE) through a job description. This issue stems from inadequate handling of XML external entity (XXE) declarations in the initDocumentParser function within xml/XMLSchedulingDataProcessor.java. By enticing a victim to access a maliciously crafted job description (containing XML content), a remote attacker could exploit this vulnerability to execute an XXE attack on the targeted system.", "title": "Vulnerability description" }, { "category": "summary", "text": "libquartz: XXE attacks via job description", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 uses a vulnerable version of libquartz as a dependency for Candlepin. However, the \u003cjob\u003e\u003cdescrition\u003e entry is not used, and the vulnerability can not be triggered. An update may fix the code in the future.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-13990" }, { "category": "external", "summary": "RHBZ#1801149", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1801149" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-13990", "url": "https://www.cve.org/CVERecord?id=CVE-2019-13990" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-13990", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-13990" } ], "release_date": "2019-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libquartz: XXE attacks via job description" }, { "cve": "CVE-2019-16869", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2019-09-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1758619" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty, where whitespace before the colon in HTTP headers is mishandled. This flaw allows an attacker to cause HTTP request smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that this vulnerability does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships vulnerable netty version embedded in Candlepin, however, is not directly vulnerable since HTTP requests are handled by Tomcat and not netty.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-16869" }, { "category": "external", "summary": "RHBZ#1758619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758619" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16869", "url": "https://www.cve.org/CVERecord?id=CVE-2019-16869" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16869", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16869" } ], "release_date": "2019-09-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers" }, { "cve": "CVE-2019-17573", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2020-01-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1797011" } ], "notes": [ { "category": "description", "text": "By default, Apache CXF creates a /services page containing a listing of the available endpoint names and addresses. This webpage is vulnerable to a reflected Cross-Site Scripting (XSS) attack, which allows a malicious actor to inject javascript into the web page. Please note that the attack exploits a feature which is not typically not present in modern browsers, who remove dot segments before sending the request. However, Mobile applications may be vulnerable.", "title": "Vulnerability description" }, { "category": "summary", "text": "cxf: reflected XSS in the services listing page", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-17573" }, { "category": "external", "summary": "RHBZ#1797011", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1797011" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-17573", "url": "https://www.cve.org/CVERecord?id=CVE-2019-17573" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-17573", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17573" } ], "release_date": "2020-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "Mitigate this flaw by disabling the service listing altogether; via setting the \"hide-service-list-page\" servlet parameter to \"true\".", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "cxf: reflected XSS in the services listing page" }, { "cve": "CVE-2019-20330", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-01-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1793154" } ], "notes": [ { "category": "description", "text": "FasterXML jackson-databind 2.x before 2.9.10.2 lacks certain net.sf.ehcache blocking.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: lacks certain net.sf.ehcache blocking", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20330" }, { "category": "external", "summary": "RHBZ#1793154", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793154" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20330", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20330" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20330", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20330" } ], "release_date": "2020-01-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: lacks certain net.sf.ehcache blocking" }, { "cve": "CVE-2019-20444", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1798524" } ], "notes": [ { "category": "description", "text": "A HTTP smuggling flaw was found in HttpObjectDecoder.java in Netty in versions prior to version 4.1.44. HTTP headers with an invalid fold, in this case CRLF (carriage return, line feed) without being followed by SP (space) or HTAB (horizontal tab), result in situations where headers can be misread. Data integrity is the highest threat with this vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP request smuggling", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that the previous vulnerability, CVE-2019-16869, does not pose a substantial practical threat to ElasticSearch 6. We agree that these issues would be difficult to exploit on OpenShift Container Platform so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships a vulnerable version of netty embedded in Candlepin. However, the flaw can not be triggered in that context, because HTTP requests are handled by Tomcat, not by netty. A future release may fix this.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20444" }, { "category": "external", "summary": "RHBZ#1798524", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798524" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20444", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20444" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20444", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20444" }, { "category": "external", "summary": "https://github.com/elastic/elasticsearch/issues/49396", "url": "https://github.com/elastic/elasticsearch/issues/49396" } ], "release_date": "2020-01-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP request smuggling" }, { "cve": "CVE-2019-20445", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1798509" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty before version 4.1.44, where it accepted multiple Content-Length headers and also accepted both Transfer-Encoding, as well as Content-Length headers where it should reject the message under such circumstances. In circumstances where Netty is used in the context of a server, it could result in a viable HTTP smuggling vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that the previous vulnerability, CVE-2019-16869, does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit both these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships a vulnerable version of netty embedded in Candlepin. However, the flaw can not be triggered in that context, because HTTP requests are handled by Tomcat, not by netty. A future release may fix this.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20445" }, { "category": "external", "summary": "RHBZ#1798509", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798509" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20445", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20445" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20445", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20445" } ], "release_date": "2020-01-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header" }, { "cve": "CVE-2020-1718", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2020-01-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1796756" } ], "notes": [ { "category": "description", "text": "A flaw was found in the reset credential flow in Keycloak. This flaw allows an attacker to gain unauthorized access to the application.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak: security issue on reset credential flow", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-1718" }, { "category": "external", "summary": "RHBZ#1796756", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796756" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-1718", "url": "https://www.cve.org/CVERecord?id=CVE-2020-1718" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1718", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1718" } ], "release_date": "2020-05-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "Disable reset credential flow.", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "keycloak: security issue on reset credential flow" }, { "cve": "CVE-2020-7238", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1796225" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty, where it mishandles Transfer-Encoding whitespace. This flaw allows HTTP Request Smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that the previous vulnerability, CVE-2019-16869, does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit both these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships vulnerable netty version embedded in Candlepin, however, is not directly vulnerable since HTTP requests are handled by Tomcat and not netty.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-7238" }, { "category": "external", "summary": "RHBZ#1796225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796225" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-7238", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7238" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7238", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7238" }, { "category": "external", "summary": "https://netty.io/news/2019/12/18/4-1-44-Final.html", "url": "https://netty.io/news/2019/12/18/4-1-44-Final.html" } ], "release_date": "2020-01-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling" }, { "cve": "CVE-2020-8840", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816330" } ], "notes": [ { "category": "description", "text": "A flaw was found in FasterXML jackson-databind in versions 2.0.0 through 2.9.10.2. A \"gadget\" exploit is possible due to a lack of a Java object being blocking from being deserialized. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Lacks certain xbean-reflect/JNDI blocking", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8840" }, { "category": "external", "summary": "RHBZ#1816330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816330" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8840", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8840" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8840", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8840" } ], "release_date": "2020-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Lacks certain xbean-reflect/JNDI blocking" }, { "cve": "CVE-2020-9546", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816332" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in shaded-hikari-config", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9546" }, { "category": "external", "summary": "RHBZ#1816332", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816332" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9546", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9546" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9546", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9546" } ], "release_date": "2020-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in shaded-hikari-config" }, { "cve": "CVE-2020-9547", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816337" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in ibatis-sqlmap", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9547" }, { "category": "external", "summary": "RHBZ#1816337", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816337" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9547", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9547" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9547", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9547" } ], "release_date": "2020-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in ibatis-sqlmap" }, { "cve": "CVE-2020-9548", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816340" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in anteros-core", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9548" }, { "category": "external", "summary": "RHBZ#1816340", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816340" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9548", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9548" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9548", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9548" } ], "release_date": "2020-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in anteros-core" }, { "cve": "CVE-2020-10672", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2020-03-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1815495" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10672" }, { "category": "external", "summary": "RHBZ#1815495", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1815495" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10672", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10672" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10672", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10672" } ], "release_date": "2020-03-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution" }, { "cve": "CVE-2020-10673", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2020-03-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1815470" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time. Additionally, the gadget is not available within Red Hat Openstack Platform\u0027s OpenDaylight.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10673" }, { "category": "external", "summary": "RHBZ#1815470", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1815470" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10673", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10673" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10673", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10673" } ], "release_date": "2020-03-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution" }, { "cve": "CVE-2020-10968", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1819208" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x prior to version 2.9.10.4. The interaction between serialization gadgets and typing is mishandled in the bus-proxy. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10968" }, { "category": "external", "summary": "RHBZ#1819208", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819208" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10968", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10968" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10968", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10968" } ], "release_date": "2020-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider" }, { "cve": "CVE-2020-10969", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1819212" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in javax.swing.JEditorPane", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10969" }, { "category": "external", "summary": "RHBZ#1819212", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819212" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10969", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10969" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10969", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10969" } ], "release_date": "2020-03-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in javax.swing.JEditorPane" }, { "cve": "CVE-2020-11111", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2020-03-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1821304" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.apache.activemq.jms.pool.XaPooledConnectionFactory", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11111" }, { "category": "external", "summary": "RHBZ#1821304", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821304" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11111", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11111" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11111", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11111" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/2664", "url": "https://github.com/FasterXML/jackson-databind/issues/2664" } ], "release_date": "2020-03-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in org.apache.activemq.jms.pool.XaPooledConnectionFactory" }, { "cve": "CVE-2020-11112", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2020-03-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1821311" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.apache.commons.proxy.provider.remoting.RmiProvider", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11112" }, { "category": "external", "summary": "RHBZ#1821311", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821311" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11112", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11112" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11112", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11112" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/2666", "url": "https://github.com/FasterXML/jackson-databind/issues/2666" } ], "release_date": "2020-03-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in org.apache.commons.proxy.provider.remoting.RmiProvider" }, { "cve": "CVE-2020-11113", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2020-03-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1821315" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11113" }, { "category": "external", "summary": "RHBZ#1821315", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821315" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11113", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11113" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11113", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11113" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/2670", "url": "https://github.com/FasterXML/jackson-databind/issues/2670" } ], "release_date": "2020-03-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime" }, { "cve": "CVE-2020-11612", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-03-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816216" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty in the way it handles the amount of data it compresses and decompresses. The Compression/Decompression codecs should enforce memory allocation size limits to avoid an Out of Memory Error (OOME) or exhaustion of the memory pool.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: compression/decompression codecs don\u0027t enforce limits on buffer allocation sizes", "title": "Vulnerability summary" }, { "category": "other", "text": "In OpenShift Container Platform end users don\u0027t have direct access to send requests to ElasticSearch. A user could need access to the ElasticSearch service on the internal cluster network in order to be able to send malicious requests to it.\n\n\nThird party scanners flagging Red Hat Satellite due to availability of the higher version packages in Red Hat AMQ Clients (through errata RHSA-2020:2605) compare to the qpid packages from Satellite Tools repository. qpid dependency fixed in errata RHSA-2020:2605 was for Red Hat AMQ Clients and it doesn\u0027t necessarily mean that packages from Satellite Tools are affected. These are two different products with different architecture and code-base. Updating the packages from any other repository than the Satellite-tools repository is not recommended for Satellite Customers. \n\nRed Hat Satellite 6.7 and earlier ship affected version of netty, however, there is no external connection being exposed and it is used by only Artemis to open an internal connection within the JVM. Since netty does not come into contact with untrusted data, vulnerability is not exposed in product code and there is no breach of Confidentiality, Integrity or Availability expected from this vulnerability. We may update the netty and its dependency in a future release.\n\nMore information regarding Satellite related packages can be found on KCS: https://access.redhat.com/solutions/5200591", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11612" }, { "category": "external", "summary": "RHBZ#1816216", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816216" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11612", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11612" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11612", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11612" } ], "release_date": "2020-01-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "netty: compression/decompression codecs don\u0027t enforce limits on buffer allocation sizes" }, { "cve": "CVE-2020-11619", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-04-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1826805" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.springframework:spring-aop", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11619" }, { "category": "external", "summary": "RHBZ#1826805", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1826805" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11619", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11619" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11619", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11619" } ], "release_date": "2020-04-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in org.springframework:spring-aop" }, { "cve": "CVE-2020-11620", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-04-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1826798" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in commons-jelly:commons-jelly", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11620" }, { "category": "external", "summary": "RHBZ#1826798", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1826798" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11620", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11620" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11620", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11620" } ], "release_date": "2020-04-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in commons-jelly:commons-jelly" }, { "cve": "CVE-2020-14060", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-06-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1848960" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.5. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: serialization in oadd.org.apache.xalan.lib.sql.JNDIConnectionPool", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 and Red Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.\n\nThe version of jackson-databind as shipped in Red Hat Software Collections rh-maven35 is used only while building maven, thus it does not deserialize data coming from untrusted sources, lowering the impact of the vulnerability for the Product.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14060" }, { "category": "external", "summary": "RHBZ#1848960", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848960" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14060", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14060" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14060", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14060" } ], "release_date": "2020-05-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* enableDefaultTyping()\n* @JsonTypeInfo using id.CLASS or id.MINIMAL_CLASS\n* oadd.org.apache.xalan.lib.sql.JNDIConnectionPool in classpath", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: serialization in oadd.org.apache.xalan.lib.sql.JNDIConnectionPool" }, { "cve": "CVE-2020-14061", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-06-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1848966" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.5. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: serialization in weblogic/oracle-aqjms", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 and Red Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.\n\nThe version of jackson-databind as shipped in Red Hat Software Collections rh-maven35 is used only while building maven, thus it does not deserialize data coming from untrusted sources, lowering the impact of the vulnerability for the Product.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14061" }, { "category": "external", "summary": "RHBZ#1848966", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848966" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14061", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14061" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14061", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14061" } ], "release_date": "2020-05-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* enableDefaultTyping()\n* @JsonTypeInfo using id.CLASS or id.MINIMAL_CLASS\n* oracle.jms.AQjms*ConnectionFactory in classpath", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: serialization in weblogic/oracle-aqjms" }, { "cve": "CVE-2020-14062", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-06-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1848962" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.5. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: serialization in com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 and Red Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.\n\nThe version of jackson-databind as shipped in Red Hat Software Collections rh-maven35 is used only while building maven, thus it does not deserialize data coming from untrusted sources, lowering the impact of the vulnerability for the Product.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14062" }, { "category": "external", "summary": "RHBZ#1848962", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848962" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14062", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14062" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14062", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14062" } ], "release_date": "2020-05-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* enableDefaultTyping()\n* @JsonTypeInfo using id.CLASS or id.MINIMAL_CLASS\n* com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool in classpath", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: serialization in com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool" } ] }
rhsa-2019:2861
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for gRPC, included in sriov-network-device-plugin-container, is now available for Red Hat OpenShift Container Platform 4.1.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains updates gRPC in the sriov-network-device-plugin container in Red Hat OpenShift Container Platform 4.1.18.\n\nSecurity Fix(es):\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:2861", "url": "https://access.redhat.com/errata/RHSA-2019:2861" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2861.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 4.1.18 gRPC security update", "tracking": { "current_release_date": "2025-03-15T19:43:48+00:00", "generator": { "date": "2025-03-15T19:43:48+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.1" } }, "id": "RHSA-2019:2861", "initial_release_date": "2019-09-26T17:19:31+00:00", "revision_history": [ { "date": "2019-09-26T17:19:31+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-09-26T17:19:31+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-03-15T19:43:48+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.1", "product": { "name": "Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.1::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "openshift4/ose-sriov-network-device-plugin@sha256:4493f9c75d46ecfcee81bbb0ca9c2579bac4ffb150b2255f8385eac50a885ca6_amd64", "product": { "name": "openshift4/ose-sriov-network-device-plugin@sha256:4493f9c75d46ecfcee81bbb0ca9c2579bac4ffb150b2255f8385eac50a885ca6_amd64", "product_id": "openshift4/ose-sriov-network-device-plugin@sha256:4493f9c75d46ecfcee81bbb0ca9c2579bac4ffb150b2255f8385eac50a885ca6_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-device-plugin@sha256:4493f9c75d46ecfcee81bbb0ca9c2579bac4ffb150b2255f8385eac50a885ca6?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-device-plugin\u0026tag=v4.1.18-201909201915" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-device-plugin@sha256:4493f9c75d46ecfcee81bbb0ca9c2579bac4ffb150b2255f8385eac50a885ca6_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-network-device-plugin@sha256:4493f9c75d46ecfcee81bbb0ca9c2579bac4ffb150b2255f8385eac50a885ca6_amd64" }, "product_reference": "openshift4/ose-sriov-network-device-plugin@sha256:4493f9c75d46ecfcee81bbb0ca9c2579bac4ffb150b2255f8385eac50a885ca6_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-network-device-plugin@sha256:4493f9c75d46ecfcee81bbb0ca9c2579bac4ffb150b2255f8385eac50a885ca6_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-26T17:19:31+00:00", "details": "For OpenShift Container Platform 4.1 see the following documentation, which\nwill be updated shortly for release 4.1.18, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-release-notes.html", "product_ids": [ "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-network-device-plugin@sha256:4493f9c75d46ecfcee81bbb0ca9c2579bac4ffb150b2255f8385eac50a885ca6_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2861" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-network-device-plugin@sha256:4493f9c75d46ecfcee81bbb0ca9c2579bac4ffb150b2255f8385eac50a885ca6_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-network-device-plugin@sha256:4493f9c75d46ecfcee81bbb0ca9c2579bac4ffb150b2255f8385eac50a885ca6_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-26T17:19:31+00:00", "details": "For OpenShift Container Platform 4.1 see the following documentation, which\nwill be updated shortly for release 4.1.18, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-release-notes.html", "product_ids": [ "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-network-device-plugin@sha256:4493f9c75d46ecfcee81bbb0ca9c2579bac4ffb150b2255f8385eac50a885ca6_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2861" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-network-device-plugin@sha256:4493f9c75d46ecfcee81bbb0ca9c2579bac4ffb150b2255f8385eac50a885ca6_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-network-device-plugin@sha256:4493f9c75d46ecfcee81bbb0ca9c2579bac4ffb150b2255f8385eac50a885ca6_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-26T17:19:31+00:00", "details": "For OpenShift Container Platform 4.1 see the following documentation, which\nwill be updated shortly for release 4.1.18, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-release-notes.html", "product_ids": [ "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-network-device-plugin@sha256:4493f9c75d46ecfcee81bbb0ca9c2579bac4ffb150b2255f8385eac50a885ca6_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2861" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-network-device-plugin@sha256:4493f9c75d46ecfcee81bbb0ca9c2579bac4ffb150b2255f8385eac50a885ca6_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" } ] }
RHSA-2020:0983
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "A minor version update (from 7.5 to 7.6) is now available for Red Hat Fuse. The purpose of this text-only errata is to inform you about the security issues fixed in this release.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.\n\n[2020-04-17 update: descriptions for mutiple components fixed for the same CVE added; also added golang CVE descriptions that were unintentionally ommitted from the original publication]", "title": "Topic" }, { "category": "general", "text": "This release of Red Hat Fuse 7.6.0 serves as a replacement for Red Hat Fuse 7.5, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* undertow: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* golang: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* undertow: HTTP/2: flood using PRIORITY frames results in excessive resource consumption (CVE-2019-9513)\n\n* undertow: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* golang: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* undertow: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* undertow: HTTP/2: 0-length headers lead to denial of service (CVE-2019-9516)\n\n* undertow: HTTP/2: request for large response leads to denial of service (CVE-2019-9517)\n\n* undertow: HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)\n\n* infinispan: invokeAccessibly method from ReflectionUtil class allows to invoke private methods (CVE-2019-10174)\n\n* spring-security-core: mishandling of user passwords allows logging in with a password of NULL (CVE-2019-11272)\n\n* jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution (CVE-2019-12384)\n\n* jackson-databind: default typing mishandling leading to remote code execution (CVE-2019-14379)\n\n* xmlrpc: Deserialization of server-side exception from faultCause in XMLRPC error response (CVE-2019-17570)\n\n* js-jquery: Cross-site scripting via cross-domain ajax requests (CVE-2015-9251)\n\n* logback: Serialization vulnerability in SocketServer and ServerSocketReceiver (CVE-2017-5929)\n\n* js-jquery: XSS in responses from cross-origin ajax requests (CVE-2017-16012)\n\n* apache-commons-compress: ZipArchiveInputStream.read() fails to identify correct EOF allowing for DoS via crafted zip (CVE-2018-11771)\n\n* spring-data-api: potential information disclosure through maliciously crafted example value in ExampleMatcher (CVE-2019-3802)\n\n* undertow: leak credentials to log files UndertowLogger.REQUEST_LOGGER.undertowRequestFailed (CVE-2019-3888)\n\n* shiro: Cookie padding oracle vulnerability with default configuration (CVE-2019-12422)\n\n* jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message. (CVE-2019-12814)\n\n* jackson-databind: Polymorphic typing issue related to logback/JNDI (CVE-2019-14439)\n\n* springframework: DoS Attack via Range Requests (CVE-2018-15756)\n\n* c3p0: loading XML configuration leads to denial of service (CVE-2019-5427)\n\n* undertow: Information leak in requests for directories without trailing slashes (CVE-2019-10184)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:0983", "url": "https://access.redhat.com/errata/RHSA-2020:0983" }, { "category": "external", "summary": "1730316", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1730316" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735741" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "1737517", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1737517" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=jboss.fuse\u0026version=7.6.0", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=jboss.fuse\u0026version=7.6.0" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "url": "https://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/" }, { "category": "external", "summary": "1399546", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1399546" }, { "category": "external", "summary": "1432858", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1432858" }, { "category": "external", "summary": "1591854", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1591854" }, { "category": "external", "summary": "1618573", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618573" }, { "category": "external", "summary": "1643043", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1643043" }, { "category": "external", "summary": "1693777", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1693777" }, { "category": "external", "summary": "1703469", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1703469" }, { "category": "external", "summary": "1709860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1709860" }, { "category": "external", "summary": "1713068", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1713068" }, { "category": "external", "summary": "1725795", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1725795" }, { "category": "external", "summary": "1725807", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1725807" }, { "category": "external", "summary": "1728993", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1728993" }, { "category": "external", "summary": "1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "external", "summary": "1752962", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752962" }, { "category": "external", "summary": "1774726", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774726" }, { "category": "external", "summary": "1775193", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775193" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_0983.json" } ], "title": "Red Hat Security Advisory: Red Hat Fuse 7.6.0 security update", "tracking": { "current_release_date": "2025-04-10T05:23:50+00:00", "generator": { "date": "2025-04-10T05:23:50+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.2" } }, "id": "RHSA-2020:0983", "initial_release_date": "2020-03-26T15:46:59+00:00", "revision_history": [ { "date": "2020-03-26T15:46:59+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-04-20T07:19:13+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-04-10T05:23:50+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Fuse 7.6.0", "product": { "name": "Red Hat Fuse 7.6.0", "product_id": "Red Hat Fuse 7.6.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_fuse:7" } } } ], "category": "product_family", "name": "Red Hat JBoss Fuse" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-9251", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2016-11-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1399546" } ], "notes": [ { "category": "description", "text": "jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.", "title": "Vulnerability description" }, { "category": "summary", "text": "jquery: Cross-site scripting via cross-domain ajax requests", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-9251" }, { "category": "external", "summary": "RHBZ#1399546", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1399546" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-9251", "url": "https://www.cve.org/CVERecord?id=CVE-2015-9251" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-9251", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-9251" } ], "release_date": "2015-06-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jquery: Cross-site scripting via cross-domain ajax requests" }, { "cve": "CVE-2017-5929", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2017-03-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1432858" } ], "notes": [ { "category": "description", "text": "It was found that logback is vulnerable to a deserialization issue. Logback can be configured to allow remote logging through SocketServer/ServerSocketReceiver interfaces that can accept untrusted serialized data. Authenticated attackers on the adjacent network can leverage this vulnerability to execute arbitrary code through deserialization of custom gadget chains.", "title": "Vulnerability description" }, { "category": "summary", "text": "logback: Serialization vulnerability in SocketServer and ServerSocketReceiver", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-5929" }, { "category": "external", "summary": "RHBZ#1432858", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1432858" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-5929", "url": "https://www.cve.org/CVERecord?id=CVE-2017-5929" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5929", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5929" } ], "release_date": "2017-02-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "logback: Serialization vulnerability in SocketServer and ServerSocketReceiver" }, { "cve": "CVE-2017-16012", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2018-06-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1591854" } ], "notes": [ { "category": "description", "text": "[REJECTED CVE] This CVE has been rejected. This candidate is a duplicate of CVE-2015-9251. Note: All CVE users should reference CVE-2015-9251 instead of this candidate.", "title": "Vulnerability description" }, { "category": "summary", "text": "js-jquery: XSS in responses from cross-origin ajax requests", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-16012" }, { "category": "external", "summary": "RHBZ#1591854", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1591854" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-16012", "url": "https://www.cve.org/CVERecord?id=CVE-2017-16012" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-16012", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16012" } ], "release_date": "2017-03-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "js-jquery: XSS in responses from cross-origin ajax requests" }, { "cve": "CVE-2018-11771", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2018-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618573" } ], "notes": [ { "category": "description", "text": "When reading a specially crafted ZIP archive, the read method of Apache Commons Compress 1.7 to 1.17\u0027s ZipArchiveInputStream can fail to return the correct EOF indication after the end of the stream has been reached. When combined with a java.io.InputStreamReader this can lead to an infinite stream, which can be used to mount a denial of service attack against services that use Compress\u0027 zip package.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-commons-compress: ZipArchiveInputStream.read() fails to identify correct EOF allowing for DoS via crafted zip", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-11771" }, { "category": "external", "summary": "RHBZ#1618573", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618573" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-11771", "url": "https://www.cve.org/CVERecord?id=CVE-2018-11771" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-11771", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11771" }, { "category": "external", "summary": "https://lists.apache.org/thread.html/b8da751fc0ca949534cdf2744111da6bb0349d2798fac94b0a50f330@%3Cannounce.apache.org%3E", "url": "https://lists.apache.org/thread.html/b8da751fc0ca949534cdf2744111da6bb0349d2798fac94b0a50f330@%3Cannounce.apache.org%3E" } ], "release_date": "2018-08-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "apache-commons-compress: ZipArchiveInputStream.read() fails to identify correct EOF allowing for DoS via crafted zip" }, { "cve": "CVE-2018-12536", "cwe": { "id": "CWE-209", "name": "Generation of Error Message Containing Sensitive Information" }, "discovery_date": "2018-06-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1597418" } ], "notes": [ { "category": "description", "text": "In Eclipse Jetty Server, all 9.x versions, on webapps deployed using default Error Handling, when an intentionally bad query arrives that doesn\u0027t match a dynamic url-pattern, and is eventually handled by the DefaultServlet\u0027s static file serving, the bad characters can trigger a java.nio.file.InvalidPathException which includes the full path to the base resource directory that the DefaultServlet and/or webapp is using. If this InvalidPathException is then handled by the default Error Handler, the InvalidPathException message is included in the error response, revealing the full server path to the requesting system.", "title": "Vulnerability description" }, { "category": "summary", "text": "jetty: full server path revealed when using the default Error Handling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-12536" }, { "category": "external", "summary": "RHBZ#1597418", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1597418" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-12536", "url": "https://www.cve.org/CVERecord?id=CVE-2018-12536" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12536", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12536" } ], "release_date": "2018-06-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" }, { "category": "workaround", "details": "Information disclosure occurs when java.nio.file.InvalidPathException occurs and is handled by the default Jetty error handler. To protect against this, a custom error handler can be configured for that particular error or for a larger set of errors according to the documentation link below. Red Hat Product Security advises that production deployments on Jetty use custom error handlers to limit the information disclosed and to ensure effective logging of error conditions.\n\nhttp://www.eclipse.org/jetty/documentation/current/custom-error-pages.html", "product_ids": [ "Red Hat Fuse 7.6.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "jetty: full server path revealed when using the default Error Handling" }, { "cve": "CVE-2018-15756", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2018-10-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1643043" } ], "notes": [ { "category": "description", "text": "Spring Framework, version 5.1, versions 5.0.x prior to 5.0.10, versions 4.3.x prior to 4.3.20, and older unsupported versions on the 4.2.x branch provide support for range requests when serving static resources through the ResourceHttpRequestHandler, or starting in 5.0 when an annotated controller returns an org.springframework.core.io.Resource. A malicious user (or attacker) can add a range header with a high number of ranges, or with wide ranges that overlap, or both, for a denial of service attack. This vulnerability affects applications that depend on either spring-webmvc or spring-webflux. Such applications must also have a registration for serving static resources (e.g. JS, CSS, images, and others), or have an annotated controller that returns an org.springframework.core.io.Resource. Spring Boot applications that depend on spring-boot-starter-web or spring-boot-starter-webflux are ready to serve static resources out of the box and are therefore vulnerable.", "title": "Vulnerability description" }, { "category": "summary", "text": "springframework: DoS Attack via Range Requests", "title": "Vulnerability summary" }, { "category": "other", "text": "The package rhvm-dependencies does not include the vulnerable spring-webmvc component.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-15756" }, { "category": "external", "summary": "RHBZ#1643043", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1643043" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-15756", "url": "https://www.cve.org/CVERecord?id=CVE-2018-15756" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-15756", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-15756" }, { "category": "external", "summary": "https://pivotal.io/security/cve-2018-15756", "url": "https://pivotal.io/security/cve-2018-15756" } ], "release_date": "2018-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "springframework: DoS Attack via Range Requests" }, { "cve": "CVE-2019-3802", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-06-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1730316" } ], "notes": [ { "category": "description", "text": "This affects Spring Data JPA in versions up to and including 2.1.6, 2.0.14 and 1.11.20. ExampleMatcher using ExampleMatcher.StringMatcher.STARTING, ExampleMatcher.StringMatcher.ENDING or ExampleMatcher.StringMatcher.CONTAINING could return more results than anticipated when a maliciously crafted example value is supplied.", "title": "Vulnerability description" }, { "category": "summary", "text": "spring-data-api: potential information disclosure through maliciously crafted example value in ExampleMatcher", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-3802" }, { "category": "external", "summary": "RHBZ#1730316", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1730316" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-3802", "url": "https://www.cve.org/CVERecord?id=CVE-2019-3802" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3802", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3802" }, { "category": "external", "summary": "https://pivotal.io/security/cve-2019-3802", "url": "https://pivotal.io/security/cve-2019-3802" } ], "release_date": "2019-07-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "spring-data-api: potential information disclosure through maliciously crafted example value in ExampleMatcher" }, { "acknowledgments": [ { "names": [ "Carter Kozak" ] } ], "cve": "CVE-2019-3888", "cwe": { "id": "CWE-532", "name": "Insertion of Sensitive Information into Log File" }, "discovery_date": "2019-03-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1693777" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Undertow web server before 2.0.21. An information exposure of plain text credentials through log files because Connectors.executeRootHandler:402 logs the HttpServerExchange object at ERROR level using UndertowLogger.REQUEST_LOGGER.undertowRequestFailed(t, exchange)", "title": "Vulnerability description" }, { "category": "summary", "text": "undertow: leak credentials to log files UndertowLogger.REQUEST_LOGGER.undertowRequestFailed", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-3888" }, { "category": "external", "summary": "RHBZ#1693777", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1693777" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-3888", "url": "https://www.cve.org/CVERecord?id=CVE-2019-3888" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3888", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3888" } ], "release_date": "2019-06-10T15:13:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "undertow: leak credentials to log files UndertowLogger.REQUEST_LOGGER.undertowRequestFailed" }, { "cve": "CVE-2019-5427", "cwe": { "id": "CWE-776", "name": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)" }, "discovery_date": "2019-04-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1709860" } ], "notes": [ { "category": "description", "text": "c3p0 version \u003c 0.9.5.4 may be exploited by a billion laughs attack when loading XML configuration due to missing protections against recursive entity expansion when loading configuration.", "title": "Vulnerability description" }, { "category": "summary", "text": "c3p0: loading XML configuration leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 is not vulnerable to this issue, because the candlepin component who uses the c3p0 jar never passes a XML configuration file to c3p0, even though it includes a vulnerable version of the latter. Since this issue requires a XML files to be loaded by c3p0, an exploitation path doesn\u0027t exist.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-5427" }, { "category": "external", "summary": "RHBZ#1709860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1709860" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-5427", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5427" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5427", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5427" } ], "release_date": "2019-04-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "c3p0: loading XML configuration leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9513", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735741" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker, using PRIORITY frames to flood the system, could cause excessive CPU usage and starvation of other clients. The largest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PRIORITY frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for packages nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9513" }, { "category": "external", "summary": "RHBZ#1735741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735741" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9513", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9513" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9513", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9513" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nghttp2.org/blog/2019/08/19/nghttp2-v1-39-2/", "url": "https://nghttp2.org/blog/2019/08/19/nghttp2-v1-39-2/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "Red Hat Fuse 7.6.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PRIORITY frames results in excessive resource consumption" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "cve": "CVE-2019-9516", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741864" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker, sending a stream of header with a 0-length header name and a 0-length header value, could cause some implementations to allocate memory for these headers and keep the allocations alive until the session dies. The can consume excess memory, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: 0-length headers lead to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9516" }, { "category": "external", "summary": "RHBZ#1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9516", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9516" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://github.com/nghttp2/nghttp2/issues/1382#", "url": "https://github.com/nghttp2/nghttp2/issues/1382#" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "Red Hat Fuse 7.6.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: 0-length headers lead to denial of service" }, { "cve": "CVE-2019-9517", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741868" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in HTTP/2. An attacker can open a HTTP/2 window so the peer can send without constraint. The TCP window remains closed so the peer cannot write the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the server\u0027s queue is setup, the responses can consume excess memory, CPU, or both, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: request for large response leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "The package httpd versions as shipped with Red Hat Enterprise Linux 5, 6 and 7 are not affected by this issue as HTTP/2 support is not provided.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9517" }, { "category": "external", "summary": "RHBZ#1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9517", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9517" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" }, { "category": "workaround", "details": "The httpd version shipped with Red Hat Enterprise Linux 8 provides HTTP/2 support through mod_http2 package. While mod_http2 package is not updated, users can disable HTTP/2 support as mitigation action by executing the following steps:\n\n1. Stop httpd service:\n$ systemctl stop httpd\n\n2. Remove http/2 protocol support from configuration files:\n$ sed -i \u0027s/\\(h2\\)\\|\\(h2c\\)//g\u0027 \u003chttpd_config_file\u003e\n\n3. Validate configuration files to make sure all syntax is valid:\n$ apachectl configtest\n\n4. Restart httpd service:\n$ systemctl start httpd", "product_ids": [ "Red Hat Fuse 7.6.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: request for large response leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9518", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735749" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using frames with an empty payload, a flood could occur that results in excessive CPU usage and starvation of other clients. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using empty frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9518" }, { "category": "external", "summary": "RHBZ#1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9518", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using empty frames results in excessive resource consumption" }, { "cve": "CVE-2019-10174", "cwe": { "id": "CWE-470", "name": "Use of Externally-Controlled Input to Select Classes or Code (\u0027Unsafe Reflection\u0027)" }, "discovery_date": "2018-10-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1703469" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Infinispan such that the invokeAccessibly method from the public class ReflectionUtil allows any application class to invoke private methods in any class with Infinispan\u0027s privileges. The attacker can use reflection to introduce new, malicious behavior into the application.", "title": "Vulnerability description" }, { "category": "summary", "text": "infinispan: invokeAccessibly method from ReflectionUtil class allows to invoke private methods", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform\u0027s OpenDaylight contains the vulnerable library. This library is a requirement of other dependencies (Karaf and Hibernate). Under supported deployments, the vulnerable functionality is not utilized. Based on this, no OpenDaylight versions will not be fixed.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10174" }, { "category": "external", "summary": "RHBZ#1703469", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1703469" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10174", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10174" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10174", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10174" } ], "release_date": "2019-11-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" }, { "category": "workaround", "details": "There is no known mitigation for this issue.", "product_ids": [ "Red Hat Fuse 7.6.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "infinispan: invokeAccessibly method from ReflectionUtil class allows to invoke private methods" }, { "acknowledgments": [ { "names": [ "Christian Schl\u00fcter" ], "organization": "Viada" } ], "cve": "CVE-2019-10184", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "discovery_date": "2019-03-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1713068" } ], "notes": [ { "category": "description", "text": "undertow before version 2.0.23.Final is vulnerable to an information leak issue. Web apps may have their directory structures predicted through requests without trailing slashes via the api.", "title": "Vulnerability description" }, { "category": "summary", "text": "undertow: Information leak in requests for directories without trailing slashes", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10184" }, { "category": "external", "summary": "RHBZ#1713068", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1713068" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10184", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10184" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10184", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10184" } ], "release_date": "2019-07-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "undertow: Information leak in requests for directories without trailing slashes" }, { "cve": "CVE-2019-10241", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2019-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1705924" } ], "notes": [ { "category": "description", "text": "In Eclipse Jetty version 9.2.26 and older, 9.3.25 and older, and 9.4.15 and older, the server is vulnerable to XSS conditions if a remote client USES a specially formatted URL against the DefaultServlet or ResourceHandler that is configured for showing a Listing of directory contents.", "title": "Vulnerability description" }, { "category": "summary", "text": "jetty: using specially formatted URL against DefaultServlet or ResourceHandler leads to XSS conditions", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of jetty which is embedded in the nutch package as shipped with Red Hat Satellite 5. The jetty server is not exposed, as such exploitation is difficult, Red Hat Product Security has rated this issue as having security impact of Low in the context of Red Hat Satellite 5. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10241" }, { "category": "external", "summary": "RHBZ#1705924", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705924" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10241", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10241" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10241", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10241" } ], "release_date": "2019-04-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jetty: using specially formatted URL against DefaultServlet or ResourceHandler leads to XSS conditions" }, { "cve": "CVE-2019-10247", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1705993" } ], "notes": [ { "category": "description", "text": "In Eclipse Jetty version 7.x, 8.x, 9.2.27 and older, 9.3.26 and older, and 9.4.16 and older, the server running on any OS and Jetty version combination will reveal the configured fully qualified directory base resource location on the output of the 404 error for not finding a Context that matches the requested path. The default server behavior on jetty-distribution and jetty-home will include at the end of the Handler tree a DefaultHandler, which is responsible for reporting this 404 error, it presents the various configured contexts as HTML for users to click through to. This produced HTML includes output that contains the configured fully qualified directory base resource location for each context.", "title": "Vulnerability description" }, { "category": "summary", "text": "jetty: error path information disclosure", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of jetty which is embedded in the nutch package as shipped with Red Hat Satellite 5. The jetty server is not exposed, as such exploitation is difficult, Red Hat Product Security has rated this issue as having security impact of Low in the context of Red Hat Satellite 5. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10247" }, { "category": "external", "summary": "RHBZ#1705993", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705993" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10247", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10247" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10247", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10247" } ], "release_date": "2019-04-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "jetty: error path information disclosure" }, { "cve": "CVE-2019-11272", "cwe": { "id": "CWE-305", "name": "Authentication Bypass by Primary Weakness" }, "discovery_date": "2019-06-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1728993" } ], "notes": [ { "category": "description", "text": "A flaw was found in Spring Security in several versions, in the use of plain text passwords using the PlaintextPasswordEncoder. If an application is using an affected version of Spring Security with the PlaintextPasswordEncoder and a user has a null encoded password, an attacker can use this flaw to authenticate using a password of \"null.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "spring-security-core: mishandling of user passwords allows logging in with a password of NULL", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform\u0027s OpenDaylight versions 9 and 10 contain the vulnerable code. However, these OpenDaylight versions were released as technical preview with limited support and will therefore not be updated. Other OpenDaylight versions do not contain the vulnerable library.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-11272" }, { "category": "external", "summary": "RHBZ#1728993", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1728993" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-11272", "url": "https://www.cve.org/CVERecord?id=CVE-2019-11272" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11272", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11272" }, { "category": "external", "summary": "https://pivotal.io/security/cve-2019-11272", "url": "https://pivotal.io/security/cve-2019-11272" } ], "release_date": "2019-07-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "spring-security-core: mishandling of user passwords allows logging in with a password of NULL" }, { "cve": "CVE-2019-12384", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-06-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1725807" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in FasterXML jackson-databind in versions prior to 2.9.9. The vulnerability would permit polymorphic deserialization of malicious objects using the logback-core gadget when used in conjunction with polymorphic type handling methods such as `enableDefaultTyping()` or when @JsonTypeInfo is using `Id.CLASS` or `Id.MINIMAL_CLASS` or in any other way which ObjectMapper.readValue might instantiate objects from unsafe sources. Depending on the classpath content, remote code execution may be possible.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack\u0027s OpenDaylight does not use logback in any supported configuration. Therefore, the prerequisites for this vulnerability are not present and OpenDaylight is not affected.\n\nThis vulnerability relies on logback-core (ch.qos.logback.core) being present in the application\u0027s ClassPath. Logback-core is not packaged as an RPM for Red Hat Enterprise Linux or Red Hat Software Collections. Applications using jackson-databind that do not also use logback-core are not impacted by this vulnerability.\n\nThis issue affects the versions of jackson-databind bundled with candlepin as shipped with Red Hat Satellite 6.x. However the affected code is NOT used at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-12384" }, { "category": "external", "summary": "RHBZ#1725807", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1725807" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-12384", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12384" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-12384", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12384" } ], "release_date": "2019-06-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Fuse 7.6.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution" }, { "cve": "CVE-2019-12422", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2019-11-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1774726" } ], "notes": [ { "category": "description", "text": "Apache Shiro before 1.4.2, when using the default \"remember me\" configuration, cookies could be susceptible to a padding attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "shiro: Cookie padding oracle vulnerability with default configuration", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-12422" }, { "category": "external", "summary": "RHBZ#1774726", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774726" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-12422", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12422" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-12422", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12422" } ], "release_date": "2019-11-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shiro: Cookie padding oracle vulnerability with default configuration" }, { "cve": "CVE-2019-12814", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-06-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1725795" } ], "notes": [ { "category": "description", "text": "A new polymorphic typing flaw was discovered in FasterXML jackson-databind, versions 2.x through 2.9.9. With default typing enabled, an attacker can send a specifically crafted JSON message to the server that allows them to read arbitrary local files.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message.", "title": "Vulnerability summary" }, { "category": "other", "text": "* Red Hat Satellite 6 does not include the jdom or jdom2 packages, thus it is not affected by this vulnerability. \n* Red Hat OpenStack\u0027s OpenDaylight does not include the jdom or jdom2 packages, thus it is not affected by this vulnerability.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-12814" }, { "category": "external", "summary": "RHBZ#1725795", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1725795" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-12814", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12814" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-12814", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12814" } ], "release_date": "2019-06-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" }, { "category": "workaround", "details": "This vulnerability relies on jdom (org.jdom) or jdom2 (org.jdom2) being present in the application\u0027s ClassPath. Applications using jackson-databind that do not also use jdom or jdom2 are not impacted by this vulnerability.", "product_ids": [ "Red Hat Fuse 7.6.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message." }, { "cve": "CVE-2019-14379", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-07-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1737517" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in FasterXML jackson-databind, where it would permit polymorphic deserialization of malicious objects using the ehcache and logback JNDI gadgets when used in conjunction with polymorphic type handling methods such as `enableDefaultTyping()` or when @JsonTypeInfo is using `Id.CLASS` or `Id.MINIMAL_CLASS` or in any other way which ObjectMapper.readValue might instantiate objects from unsafe sources. An attacker could use this flaw to execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: default typing mishandling leading to remote code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nSimilarly, Satellite 6 does not enable polymorphic unmarshmalling, which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14379" }, { "category": "external", "summary": "RHBZ#1737517", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1737517" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14379", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14379" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14379", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14379" } ], "release_date": "2019-07-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Fuse 7.6.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: default typing mishandling leading to remote code execution" }, { "cve": "CVE-2019-14439", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-07-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1752962" } ], "notes": [ { "category": "description", "text": "A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x before 2.9.9.2. This occurs when Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the logback jar in the classpath.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Polymorphic typing issue related to logback/JNDI", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenDaylight provided as part of Red Hat OpenStack does not utilize logback when used in a supported configuration. Therefore, the prerequisites for this vulnerability are not present and OpenDaylight is not affected.\n\nSatellite 6 does not enable polymorphic unmarshmalling, which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14439" }, { "category": "external", "summary": "RHBZ#1752962", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752962" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14439", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14439" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14439", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14439" } ], "release_date": "2019-07-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Fuse 7.6.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Polymorphic typing issue related to logback/JNDI" }, { "acknowledgments": [ { "names": [ "Guillaume Teissier" ], "organization": "Orange" } ], "cve": "CVE-2019-17570", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-11-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1775193" } ], "notes": [ { "category": "description", "text": "A flaw was discovered where the XMLRPC client implementation in Apache XMLRPC, performed deserialization of the server-side exception serialized in the faultCause attribute of XMLRPC error response messages. A malicious or compromised XMLRPC server could possibly use this flaw to execute arbitrary code with the privileges of an application using the Apache XMLRPC client library.", "title": "Vulnerability description" }, { "category": "summary", "text": "xmlrpc: Deserialization of server-side exception from faultCause in XMLRPC error response", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 7 provides vulnerable version of xmlrpc via the Optional repository. As the Optional repository is not supported, this issue is not planned to be addressed there.\n\nRed Hat Virtualization Manager uses xmlrpc only for internal communication with the scheduler. Since this is a component of the Manager itself, it is not subject to attacker influence and does not represent an attack surface.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-17570" }, { "category": "external", "summary": "RHBZ#1775193", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775193" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-17570", "url": "https://www.cve.org/CVERecord?id=CVE-2019-17570" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-17570", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17570" }, { "category": "external", "summary": "https://github.com/orangecertcc/security-research/security/advisories/GHSA-x2r6-4m45-m4jp", "url": "https://github.com/orangecertcc/security-research/security/advisories/GHSA-x2r6-4m45-m4jp" } ], "release_date": "2020-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" }, { "category": "workaround", "details": "There is no known mitigation other than restricting applications using the Apache XMLRPC client library from sending requests to untrusted XMLRPC servers.", "product_ids": [ "Red Hat Fuse 7.6.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xmlrpc: Deserialization of server-side exception from faultCause in XMLRPC error response" } ] }
rhsa-2019:2690
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for atomic-openshift is now available for Red Hat OpenShift Container Platform 3.10.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nSecurity Fix(es):\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* kubernetes: API server allows access to cluster-scoped custom resources as if resources were namespaced (CVE-2019-11247)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAll OpenShift Container Platform 3.10 users are advised to upgrade to these\nupdated packages and images.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:2690", "url": "https://access.redhat.com/errata/RHSA-2019:2690" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1732192", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1732192" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2690.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 3.10 security update", "tracking": { "current_release_date": "2025-03-15T19:44:18+00:00", "generator": { "date": "2025-03-15T19:44:18+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.1" } }, "id": "RHSA-2019:2690", "initial_release_date": "2019-09-12T06:37:28+00:00", "revision_history": [ { "date": "2019-09-12T06:37:28+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-09-12T06:37:28+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-03-15T19:44:18+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 3.10", "product": { "name": "Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:3.10::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product": { "name": "atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product_id": "atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product": { "name": "atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product_id": "atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product": { "name": "atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product_id": "atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product": { "name": "atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product_id": "atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product": { "name": "atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product_id": "atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product": { "name": "atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product_id": "atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product": { "name": "atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product_id": "atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product": { "name": "atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product_id": "atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product": { "name": "atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product_id": "atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-template-service-broker@3.10.170-1.git.0.8e592d6.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product": { "name": "atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product_id": "atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product": { "name": "atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_id": "atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product": { "name": "atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_id": "atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-clients-redistributable-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product": { "name": "atomic-openshift-clients-redistributable-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_id": "atomic-openshift-clients-redistributable-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-clients-redistributable@3.10.170-1.git.0.8e592d6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product": { "name": "atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_id": "atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product": { "name": "atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_id": "atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product": { "name": "atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_id": "atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product": { "name": "atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_id": "atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product": { "name": "atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_id": "atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product": { "name": "atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_id": "atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product": { "name": "atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_id": "atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-template-service-broker@3.10.170-1.git.0.8e592d6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product": { "name": "atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_id": "atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.src", "product": { "name": "atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.src", "product_id": "atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "atomic-openshift-docker-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "product": { "name": "atomic-openshift-docker-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "product_id": "atomic-openshift-docker-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } }, { "category": "product_version", "name": "atomic-openshift-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "product": { "name": "atomic-openshift-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "product_id": "atomic-openshift-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le" }, "product_reference": "atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.src as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.src" }, "product_reference": "atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.x86_64" }, "product_reference": "atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.ppc64le" }, "product_reference": "atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.x86_64" }, "product_reference": "atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-clients-redistributable-0:3.10.170-1.git.0.8e592d6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-redistributable-0:3.10.170-1.git.0.8e592d6.el7.x86_64" }, "product_reference": "atomic-openshift-clients-redistributable-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-docker-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-docker-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch" }, "product_reference": "atomic-openshift-docker-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch" }, "product_reference": "atomic-openshift-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.ppc64le" }, "product_reference": "atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.x86_64" }, "product_reference": "atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le" }, "product_reference": "atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.x86_64" }, "product_reference": "atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.ppc64le" }, "product_reference": "atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.x86_64" }, "product_reference": "atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.ppc64le" }, "product_reference": "atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.x86_64" }, "product_reference": "atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.ppc64le" }, "product_reference": "atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.x86_64" }, "product_reference": "atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.ppc64le" }, "product_reference": "atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.x86_64" }, "product_reference": "atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.ppc64le" }, "product_reference": "atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.x86_64" }, "product_reference": "atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.ppc64le" }, "product_reference": "atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.x86_64" }, "product_reference": "atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.src", "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-redistributable-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-docker-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "7Server-RH7-RHOSE-3.10:atomic-openshift-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-12T06:37:28+00:00", "details": "For OpenShift Container Platform 3.10 see the following documentation,\nwhich will be updated shortly for release 3.10.170, for important\ninstructions on how to upgrade your cluster and fully apply this\nasynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/3.10/release_notes/ocp_3_10_release_notes.html", "product_ids": [ "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.src", "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-redistributable-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-docker-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "7Server-RH7-RHOSE-3.10:atomic-openshift-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2690" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.src", "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-redistributable-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-docker-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "7Server-RH7-RHOSE-3.10:atomic-openshift-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.src", "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-redistributable-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-docker-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "7Server-RH7-RHOSE-3.10:atomic-openshift-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-12T06:37:28+00:00", "details": "For OpenShift Container Platform 3.10 see the following documentation,\nwhich will be updated shortly for release 3.10.170, for important\ninstructions on how to upgrade your cluster and fully apply this\nasynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/3.10/release_notes/ocp_3_10_release_notes.html", "product_ids": [ "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.src", "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-redistributable-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-docker-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "7Server-RH7-RHOSE-3.10:atomic-openshift-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2690" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.src", "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-redistributable-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-docker-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "7Server-RH7-RHOSE-3.10:atomic-openshift-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Kubernetes Product Security Committee" ] } ], "cve": "CVE-2019-11247", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2019-07-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1732192" } ], "notes": [ { "category": "description", "text": "The Kubernetes kube-apiserver mistakenly allows access to a cluster-scoped custom resource if the request is made as if the resource were namespaced. Authorizations for the resource accessed in this manner are enforced using roles and role bindings within the namespace, meaning that a user with access only to a resource in one namespace could create, view update or delete the cluster-scoped resource (according to their namespace role privileges). Kubernetes affected versions include versions prior to 1.13.9, versions prior to 1.14.5, versions prior to 1.15.2, and versions 1.7, 1.8, 1.9, 1.10, 1.11, 1.12.", "title": "Vulnerability description" }, { "category": "summary", "text": "kubernetes: API server allows access to cluster-scoped custom resources as if resources were namespaced", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.src", "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-redistributable-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-docker-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "7Server-RH7-RHOSE-3.10:atomic-openshift-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-11247" }, { "category": "external", "summary": "RHBZ#1732192", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1732192" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-11247", "url": "https://www.cve.org/CVERecord?id=CVE-2019-11247" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11247", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11247" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-discuss/Vf31dXp0EJc", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-discuss/Vf31dXp0EJc" } ], "release_date": "2019-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-12T06:37:28+00:00", "details": "For OpenShift Container Platform 3.10 see the following documentation,\nwhich will be updated shortly for release 3.10.170, for important\ninstructions on how to upgrade your cluster and fully apply this\nasynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/3.10/release_notes/ocp_3_10_release_notes.html", "product_ids": [ "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.src", "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-redistributable-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-docker-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "7Server-RH7-RHOSE-3.10:atomic-openshift-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2690" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.src", "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-redistributable-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-docker-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "7Server-RH7-RHOSE-3.10:atomic-openshift-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kubernetes: API server allows access to cluster-scoped custom resources as if resources were namespaced" } ] }
rhsa-2019:3131
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat OpenShift Container Platform 4.1.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the cri-o, cri-tools, faq, ignition, openshift-external-storage and pivot RPM packages, which have been rebuilt with an updated version of golang for Red Hat OpenShift Container Platform 4.1.20.\n\nSecurity Fix(es):\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:3131", "url": "https://access.redhat.com/errata/RHSA-2019:3131" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3131.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 4.1.20 golang security update", "tracking": { "current_release_date": "2025-03-15T19:44:36+00:00", "generator": { "date": "2025-03-15T19:44:36+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.1" } }, "id": "RHSA-2019:3131", "initial_release_date": "2019-10-16T15:36:43+00:00", "revision_history": [ { "date": "2019-10-16T15:36:43+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-10-16T15:36:43+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-03-15T19:44:36+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.1", "product": { "name": "Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.1::el8" } } }, { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.1", "product": { "name": "Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.1::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "product": { "name": "cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "product_id": "cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debugsource-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "product": { "name": "cri-o-debugsource-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "product_id": "cri-o-debugsource-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "product": { "name": "cri-o-debuginfo-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "product_id": "cri-o-debuginfo-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.x86_64", "product": { "name": "cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.x86_64", "product_id": "cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "ignition-0:0.32.0-2.git5941fc0.el8.x86_64", "product": { "name": "ignition-0:0.32.0-2.git5941fc0.el8.x86_64", "product_id": "ignition-0:0.32.0-2.git5941fc0.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "ignition-validate-0:0.32.0-2.git5941fc0.el8.x86_64", "product": { "name": "ignition-validate-0:0.32.0-2.git5941fc0.el8.x86_64", "product_id": "ignition-validate-0:0.32.0-2.git5941fc0.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "ignition-debugsource-0:0.32.0-2.git5941fc0.el8.x86_64", "product": { "name": "ignition-debugsource-0:0.32.0-2.git5941fc0.el8.x86_64", "product_id": "ignition-debugsource-0:0.32.0-2.git5941fc0.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "ignition-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64", "product": { "name": "ignition-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64", "product_id": "ignition-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "ignition-validate-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64", "product": { "name": "ignition-validate-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64", "product_id": "ignition-validate-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "pivot-0:0.0.5-2.el8.x86_64", "product": { "name": "pivot-0:0.0.5-2.el8.x86_64", "product_id": "pivot-0:0.0.5-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64", "product": { "name": "cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64", "product_id": "cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64", "product": { "name": "cri-o-debuginfo-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64", "product_id": "cri-o-debuginfo-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64", "product": { "name": "cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64", "product_id": "cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "cri-tools-debuginfo-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64", "product": { "name": "cri-tools-debuginfo-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64", "product_id": "cri-tools-debuginfo-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "faq-0:0.0.6-4.el7.x86_64", "product": { "name": "faq-0:0.0.6-4.el7.x86_64", "product_id": "faq-0:0.0.6-4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "faq-debuginfo-0:0.0.6-4.el7.x86_64", "product": { "name": "faq-debuginfo-0:0.0.6-4.el7.x86_64", "product_id": "faq-debuginfo-0:0.0.6-4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-external-storage-cephfs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product": { "name": "openshift-external-storage-cephfs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product_id": "openshift-external-storage-cephfs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-cephfs-provisioner@0.0.2-7.gitd3c94f0.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-external-storage-efs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product": { "name": "openshift-external-storage-efs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product_id": "openshift-external-storage-efs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-efs-provisioner@0.0.2-7.gitd3c94f0.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-external-storage-local-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product": { "name": "openshift-external-storage-local-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product_id": "openshift-external-storage-local-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-local-provisioner@0.0.2-7.gitd3c94f0.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-external-storage-manila-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product": { "name": "openshift-external-storage-manila-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product_id": "openshift-external-storage-manila-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-manila-provisioner@0.0.2-7.gitd3c94f0.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-external-storage-snapshot-controller-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product": { "name": "openshift-external-storage-snapshot-controller-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product_id": "openshift-external-storage-snapshot-controller-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-snapshot-controller@0.0.2-7.gitd3c94f0.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-external-storage-snapshot-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product": { "name": "openshift-external-storage-snapshot-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product_id": "openshift-external-storage-snapshot-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-snapshot-provisioner@0.0.2-7.gitd3c94f0.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-external-storage-debuginfo-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product": { "name": "openshift-external-storage-debuginfo-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product_id": "openshift-external-storage-debuginfo-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.src", "product": { "name": "cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.src", "product_id": "cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.src", "product": { "name": "cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.src", "product_id": "cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "ignition-0:0.32.0-2.git5941fc0.el8.src", "product": { "name": "ignition-0:0.32.0-2.git5941fc0.el8.src", "product_id": "ignition-0:0.32.0-2.git5941fc0.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "pivot-0:0.0.5-2.el8.src", "product": { "name": "pivot-0:0.0.5-2.el8.src", "product_id": "pivot-0:0.0.5-2.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.src", "product": { "name": "cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.src", "product_id": "cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.src", "product": { "name": "cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.src", "product_id": "cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "faq-0:0.0.6-4.el7.src", "product": { "name": "faq-0:0.0.6-4.el7.src", "product_id": "faq-0:0.0.6-4.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "openshift-external-storage-0:0.0.2-7.gitd3c94f0.el7.src", "product": { "name": "openshift-external-storage-0:0.0.2-7.gitd3c94f0.el7.src", "product_id": "openshift-external-storage-0:0.0.2-7.gitd3c94f0.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.src" }, "product_reference": "cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64" }, "product_reference": "cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:cri-o-debuginfo-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64" }, "product_reference": "cri-o-debuginfo-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.src" }, "product_reference": "cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64" }, "product_reference": "cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debuginfo-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:cri-tools-debuginfo-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64" }, "product_reference": "cri-tools-debuginfo-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "faq-0:0.0.6-4.el7.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:faq-0:0.0.6-4.el7.src" }, "product_reference": "faq-0:0.0.6-4.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "faq-0:0.0.6-4.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:faq-0:0.0.6-4.el7.x86_64" }, "product_reference": "faq-0:0.0.6-4.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "faq-debuginfo-0:0.0.6-4.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:faq-debuginfo-0:0.0.6-4.el7.x86_64" }, "product_reference": "faq-debuginfo-0:0.0.6-4.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-0:0.0.2-7.gitd3c94f0.el7.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-external-storage-0:0.0.2-7.gitd3c94f0.el7.src" }, "product_reference": "openshift-external-storage-0:0.0.2-7.gitd3c94f0.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-cephfs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-external-storage-cephfs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64" }, "product_reference": "openshift-external-storage-cephfs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-debuginfo-0:0.0.2-7.gitd3c94f0.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-external-storage-debuginfo-0:0.0.2-7.gitd3c94f0.el7.x86_64" }, "product_reference": "openshift-external-storage-debuginfo-0:0.0.2-7.gitd3c94f0.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-efs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-external-storage-efs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64" }, "product_reference": "openshift-external-storage-efs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-local-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-external-storage-local-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64" }, "product_reference": "openshift-external-storage-local-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-manila-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-external-storage-manila-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64" }, "product_reference": "openshift-external-storage-manila-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-snapshot-controller-0:0.0.2-7.gitd3c94f0.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-external-storage-snapshot-controller-0:0.0.2-7.gitd3c94f0.el7.x86_64" }, "product_reference": "openshift-external-storage-snapshot-controller-0:0.0.2-7.gitd3c94f0.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-snapshot-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-external-storage-snapshot-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64" }, "product_reference": "openshift-external-storage-snapshot-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.src" }, "product_reference": "cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64" }, "product_reference": "cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:cri-o-debuginfo-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64" }, "product_reference": "cri-o-debuginfo-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debugsource-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:cri-o-debugsource-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64" }, "product_reference": "cri-o-debugsource-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.src" }, "product_reference": "cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.x86_64" }, "product_reference": "cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-0:0.32.0-2.git5941fc0.el8.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:ignition-0:0.32.0-2.git5941fc0.el8.src" }, "product_reference": "ignition-0:0.32.0-2.git5941fc0.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-0:0.32.0-2.git5941fc0.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:ignition-0:0.32.0-2.git5941fc0.el8.x86_64" }, "product_reference": "ignition-0:0.32.0-2.git5941fc0.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:ignition-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64" }, "product_reference": "ignition-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-debugsource-0:0.32.0-2.git5941fc0.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:ignition-debugsource-0:0.32.0-2.git5941fc0.el8.x86_64" }, "product_reference": "ignition-debugsource-0:0.32.0-2.git5941fc0.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-validate-0:0.32.0-2.git5941fc0.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:ignition-validate-0:0.32.0-2.git5941fc0.el8.x86_64" }, "product_reference": "ignition-validate-0:0.32.0-2.git5941fc0.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-validate-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:ignition-validate-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64" }, "product_reference": "ignition-validate-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "pivot-0:0.0.5-2.el8.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:pivot-0:0.0.5-2.el8.src" }, "product_reference": "pivot-0:0.0.5-2.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "pivot-0:0.0.5-2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:pivot-0:0.0.5-2.el8.x86_64" }, "product_reference": "pivot-0:0.0.5-2.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.1:cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.src", "7Server-RH7-RHOSE-4.1:cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64", "7Server-RH7-RHOSE-4.1:cri-o-debuginfo-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64", "7Server-RH7-RHOSE-4.1:cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.src", "7Server-RH7-RHOSE-4.1:cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64", "7Server-RH7-RHOSE-4.1:cri-tools-debuginfo-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64", "7Server-RH7-RHOSE-4.1:faq-0:0.0.6-4.el7.src", "7Server-RH7-RHOSE-4.1:faq-0:0.0.6-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:faq-debuginfo-0:0.0.6-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-0:0.0.2-7.gitd3c94f0.el7.src", "7Server-RH7-RHOSE-4.1:openshift-external-storage-cephfs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-debuginfo-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-efs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-local-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-manila-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-snapshot-controller-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-snapshot-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "8Base-RHOSE-4.1:cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.src", "8Base-RHOSE-4.1:cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "8Base-RHOSE-4.1:cri-o-debuginfo-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "8Base-RHOSE-4.1:cri-o-debugsource-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "8Base-RHOSE-4.1:cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.src", "8Base-RHOSE-4.1:cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.x86_64", "8Base-RHOSE-4.1:ignition-0:0.32.0-2.git5941fc0.el8.src", "8Base-RHOSE-4.1:ignition-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-debugsource-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-validate-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-validate-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:pivot-0:0.0.5-2.el8.src", "8Base-RHOSE-4.1:pivot-0:0.0.5-2.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-16T15:36:43+00:00", "details": "For OpenShift Container Platform 4.1 see the following documentation, which\nwill be updated shortly for release 4.1.20, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-release-notes.html", "product_ids": [ "7Server-RH7-RHOSE-4.1:cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.src", "7Server-RH7-RHOSE-4.1:cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64", "7Server-RH7-RHOSE-4.1:cri-o-debuginfo-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64", "7Server-RH7-RHOSE-4.1:cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.src", "7Server-RH7-RHOSE-4.1:cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64", "7Server-RH7-RHOSE-4.1:cri-tools-debuginfo-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64", "7Server-RH7-RHOSE-4.1:faq-0:0.0.6-4.el7.src", "7Server-RH7-RHOSE-4.1:faq-0:0.0.6-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:faq-debuginfo-0:0.0.6-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-0:0.0.2-7.gitd3c94f0.el7.src", "7Server-RH7-RHOSE-4.1:openshift-external-storage-cephfs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-debuginfo-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-efs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-local-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-manila-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-snapshot-controller-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-snapshot-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "8Base-RHOSE-4.1:cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.src", "8Base-RHOSE-4.1:cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "8Base-RHOSE-4.1:cri-o-debuginfo-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "8Base-RHOSE-4.1:cri-o-debugsource-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "8Base-RHOSE-4.1:cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.src", "8Base-RHOSE-4.1:cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.x86_64", "8Base-RHOSE-4.1:ignition-0:0.32.0-2.git5941fc0.el8.src", "8Base-RHOSE-4.1:ignition-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-debugsource-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-validate-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-validate-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:pivot-0:0.0.5-2.el8.src", "8Base-RHOSE-4.1:pivot-0:0.0.5-2.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3131" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-4.1:cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.src", "7Server-RH7-RHOSE-4.1:cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64", "7Server-RH7-RHOSE-4.1:cri-o-debuginfo-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64", "7Server-RH7-RHOSE-4.1:cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.src", "7Server-RH7-RHOSE-4.1:cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64", "7Server-RH7-RHOSE-4.1:cri-tools-debuginfo-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64", "7Server-RH7-RHOSE-4.1:faq-0:0.0.6-4.el7.src", "7Server-RH7-RHOSE-4.1:faq-0:0.0.6-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:faq-debuginfo-0:0.0.6-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-0:0.0.2-7.gitd3c94f0.el7.src", "7Server-RH7-RHOSE-4.1:openshift-external-storage-cephfs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-debuginfo-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-efs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-local-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-manila-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-snapshot-controller-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-snapshot-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "8Base-RHOSE-4.1:cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.src", "8Base-RHOSE-4.1:cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "8Base-RHOSE-4.1:cri-o-debuginfo-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "8Base-RHOSE-4.1:cri-o-debugsource-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "8Base-RHOSE-4.1:cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.src", "8Base-RHOSE-4.1:cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.x86_64", "8Base-RHOSE-4.1:ignition-0:0.32.0-2.git5941fc0.el8.src", "8Base-RHOSE-4.1:ignition-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-debugsource-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-validate-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-validate-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:pivot-0:0.0.5-2.el8.src", "8Base-RHOSE-4.1:pivot-0:0.0.5-2.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.1:cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.src", "7Server-RH7-RHOSE-4.1:cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64", "7Server-RH7-RHOSE-4.1:cri-o-debuginfo-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64", "7Server-RH7-RHOSE-4.1:cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.src", "7Server-RH7-RHOSE-4.1:cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64", "7Server-RH7-RHOSE-4.1:cri-tools-debuginfo-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64", "7Server-RH7-RHOSE-4.1:faq-0:0.0.6-4.el7.src", "7Server-RH7-RHOSE-4.1:faq-0:0.0.6-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:faq-debuginfo-0:0.0.6-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-0:0.0.2-7.gitd3c94f0.el7.src", "7Server-RH7-RHOSE-4.1:openshift-external-storage-cephfs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-debuginfo-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-efs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-local-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-manila-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-snapshot-controller-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-snapshot-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "8Base-RHOSE-4.1:cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.src", "8Base-RHOSE-4.1:cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "8Base-RHOSE-4.1:cri-o-debuginfo-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "8Base-RHOSE-4.1:cri-o-debugsource-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "8Base-RHOSE-4.1:cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.src", "8Base-RHOSE-4.1:cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.x86_64", "8Base-RHOSE-4.1:ignition-0:0.32.0-2.git5941fc0.el8.src", "8Base-RHOSE-4.1:ignition-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-debugsource-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-validate-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-validate-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:pivot-0:0.0.5-2.el8.src", "8Base-RHOSE-4.1:pivot-0:0.0.5-2.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-16T15:36:43+00:00", "details": "For OpenShift Container Platform 4.1 see the following documentation, which\nwill be updated shortly for release 4.1.20, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-release-notes.html", "product_ids": [ "7Server-RH7-RHOSE-4.1:cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.src", "7Server-RH7-RHOSE-4.1:cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64", "7Server-RH7-RHOSE-4.1:cri-o-debuginfo-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64", "7Server-RH7-RHOSE-4.1:cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.src", "7Server-RH7-RHOSE-4.1:cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64", "7Server-RH7-RHOSE-4.1:cri-tools-debuginfo-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64", "7Server-RH7-RHOSE-4.1:faq-0:0.0.6-4.el7.src", "7Server-RH7-RHOSE-4.1:faq-0:0.0.6-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:faq-debuginfo-0:0.0.6-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-0:0.0.2-7.gitd3c94f0.el7.src", "7Server-RH7-RHOSE-4.1:openshift-external-storage-cephfs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-debuginfo-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-efs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-local-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-manila-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-snapshot-controller-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-snapshot-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "8Base-RHOSE-4.1:cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.src", "8Base-RHOSE-4.1:cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "8Base-RHOSE-4.1:cri-o-debuginfo-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "8Base-RHOSE-4.1:cri-o-debugsource-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "8Base-RHOSE-4.1:cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.src", "8Base-RHOSE-4.1:cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.x86_64", "8Base-RHOSE-4.1:ignition-0:0.32.0-2.git5941fc0.el8.src", "8Base-RHOSE-4.1:ignition-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-debugsource-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-validate-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-validate-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:pivot-0:0.0.5-2.el8.src", "8Base-RHOSE-4.1:pivot-0:0.0.5-2.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3131" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-4.1:cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.src", "7Server-RH7-RHOSE-4.1:cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64", "7Server-RH7-RHOSE-4.1:cri-o-debuginfo-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64", "7Server-RH7-RHOSE-4.1:cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.src", "7Server-RH7-RHOSE-4.1:cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64", "7Server-RH7-RHOSE-4.1:cri-tools-debuginfo-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64", "7Server-RH7-RHOSE-4.1:faq-0:0.0.6-4.el7.src", "7Server-RH7-RHOSE-4.1:faq-0:0.0.6-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:faq-debuginfo-0:0.0.6-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-0:0.0.2-7.gitd3c94f0.el7.src", "7Server-RH7-RHOSE-4.1:openshift-external-storage-cephfs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-debuginfo-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-efs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-local-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-manila-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-snapshot-controller-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-snapshot-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "8Base-RHOSE-4.1:cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.src", "8Base-RHOSE-4.1:cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "8Base-RHOSE-4.1:cri-o-debuginfo-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "8Base-RHOSE-4.1:cri-o-debugsource-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "8Base-RHOSE-4.1:cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.src", "8Base-RHOSE-4.1:cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.x86_64", "8Base-RHOSE-4.1:ignition-0:0.32.0-2.git5941fc0.el8.src", "8Base-RHOSE-4.1:ignition-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-debugsource-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-validate-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-validate-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:pivot-0:0.0.5-2.el8.src", "8Base-RHOSE-4.1:pivot-0:0.0.5-2.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" } ] }
rhsa-2019_2925
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the nodejs:10 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.\n\nThe following packages have been upgraded to a later upstream version: nodejs (10.16.3).\n\nSecurity Fix(es):\n\n* HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511)\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using PRIORITY frames results in excessive resource consumption (CVE-2019-9513)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* HTTP/2: 0-length headers lead to denial of service (CVE-2019-9516)\n\n* HTTP/2: request for large response leads to denial of service (CVE-2019-9517)\n\n* HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:2925", "url": "https://access.redhat.com/errata/RHSA-2019:2925" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735741" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2925.json" } ], "title": "Red Hat Security Advisory: nodejs:10 security update", "tracking": { "current_release_date": "2024-12-15T18:55:15+00:00", "generator": { "date": "2024-12-15T18:55:15+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2019:2925", "initial_release_date": "2019-09-30T15:15:54+00:00", "revision_history": [ { "date": "2019-09-30T15:15:54+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-09-30T15:15:54+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-15T18:55:15+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "nodejs:10:8000020190911085529:f8e95b4e", "product": { "name": "nodejs:10:8000020190911085529:f8e95b4e", "product_id": "nodejs:10:8000020190911085529:f8e95b4e", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/nodejs@10:8000020190911085529:f8e95b4e" } } }, { "category": "product_version", "name": "nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "product": { "name": "nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "product_id": "nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.0%2B4214%2B49953fda?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "product": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "product_id": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8%2B2632%2B6c5111ed?arch=noarch" } } }, { "category": "product_version", "name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "product": { "name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "product_id": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8%2B2873%2Baa7dfd9a?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "product": { "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "product_id": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.0%2B4214%2B49953fda?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "product": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "product_id": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8%2B2632%2B6c5111ed?arch=src" } } }, { "category": "product_version", "name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "product": { "name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "product_id": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8%2B2873%2Baa7dfd9a?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product": { "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product_id": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.0%2B4214%2B49953fda?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product": { "name": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product_id": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.0%2B4214%2B49953fda?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product": { "name": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product_id": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.0%2B4214%2B49953fda?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product": { "name": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product_id": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.0%2B4214%2B49953fda?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product": { "name": "nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product_id": "nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.0%2B4214%2B49953fda?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64", "product": { "name": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64", "product_id": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.0%2B4214%2B49953fda?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "product": { "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "product_id": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.0%2B4214%2B49953fda?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "product": { "name": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "product_id": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.0%2B4214%2B49953fda?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "product": { "name": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "product_id": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.0%2B4214%2B49953fda?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "product": { "name": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "product_id": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.0%2B4214%2B49953fda?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "product": { "name": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "product_id": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.0%2B4214%2B49953fda?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "product": { "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "product_id": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.0%2B4214%2B49953fda?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "product": { "name": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "product_id": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.0%2B4214%2B49953fda?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "product": { "name": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "product_id": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.0%2B4214%2B49953fda?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "product": { "name": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "product_id": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.0%2B4214%2B49953fda?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "product": { "name": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "product_id": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.0%2B4214%2B49953fda?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "product": { "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "product_id": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.0%2B4214%2B49953fda?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "product": { "name": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "product_id": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.0%2B4214%2B49953fda?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "product": { "name": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "product_id": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.0%2B4214%2B49953fda?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "product": { "name": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "product_id": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.0%2B4214%2B49953fda?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "product": { "name": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "product_id": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.0%2B4214%2B49953fda?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, "product_reference": "nodejs:10:8000020190911085529:f8e95b4e", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64 as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64" }, "product_reference": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le" }, "product_reference": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x" }, "product_reference": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src" }, "product_reference": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64 as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64" }, "product_reference": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64 as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64" }, "product_reference": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le" }, "product_reference": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x" }, "product_reference": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64 as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64" }, "product_reference": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64 as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64" }, "product_reference": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le" }, "product_reference": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x" }, "product_reference": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64 as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64" }, "product_reference": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64 as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64" }, "product_reference": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le" }, "product_reference": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x" }, "product_reference": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64 as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64" }, "product_reference": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64 as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64" }, "product_reference": "nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch" }, "product_reference": "nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch" }, "product_reference": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src" }, "product_reference": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch" }, "product_reference": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src" }, "product_reference": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64 as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64" }, "product_reference": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le" }, "product_reference": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x" }, "product_reference": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64 as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" }, "product_reference": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-5737", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-03-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1690808" } ], "notes": [ { "category": "description", "text": "It was found that the original fix for Slowloris, CVE-2018-12122, was insufficient. It is possible to bypass the server\u0027s headersTimeout by sending two specially crafted HTTP requests in the same connection. An attacker could use this flaw to bypass Slowloris protection, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Insufficient Slowloris fix causing DoS via server.headersTimeout bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-5737" }, { "category": "external", "summary": "RHBZ#1690808", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1690808" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-5737", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5737" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5737", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5737" }, { "category": "external", "summary": "https://nodejs.org/ja/blog/vulnerability/february-2019-security-releases/", "url": "https://nodejs.org/ja/blog/vulnerability/february-2019-security-releases/" } ], "release_date": "2019-02-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-30T15:15:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2925" }, { "category": "workaround", "details": "The use of a Load Balancer or a Reverse Proxy will increase the difficulty of the attack.", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs: Insufficient Slowloris fix causing DoS via server.headersTimeout bypass" }, { "cve": "CVE-2019-9511", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741860" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker can request a large amount of data by manipulating window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this queue can consume excess CPU, memory, or both, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: large amount of data requests leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "There are no mitigations available for nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "RHBZ#1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9511", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-30T15:15:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2925" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: large amount of data requests leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-30T15:15:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2925" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9513", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735741" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker, using PRIORITY frames to flood the system, could cause excessive CPU usage and starvation of other clients. The largest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PRIORITY frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for packages nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9513" }, { "category": "external", "summary": "RHBZ#1735741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735741" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9513", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9513" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9513", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9513" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nghttp2.org/blog/2019/08/19/nghttp2-v1-39-2/", "url": "https://nghttp2.org/blog/2019/08/19/nghttp2-v1-39-2/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-30T15:15:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2925" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PRIORITY frames results in excessive resource consumption" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-30T15:15:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2925" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-30T15:15:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2925" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "cve": "CVE-2019-9516", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741864" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker, sending a stream of header with a 0-length header name and a 0-length header value, could cause some implementations to allocate memory for these headers and keep the allocations alive until the session dies. The can consume excess memory, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: 0-length headers lead to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9516" }, { "category": "external", "summary": "RHBZ#1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9516", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9516" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://github.com/nghttp2/nghttp2/issues/1382#", "url": "https://github.com/nghttp2/nghttp2/issues/1382#" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-30T15:15:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2925" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: 0-length headers lead to denial of service" }, { "cve": "CVE-2019-9517", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741868" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in HTTP/2. An attacker can open a HTTP/2 window so the peer can send without constraint. The TCP window remains closed so the peer cannot write the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the server\u0027s queue is setup, the responses can consume excess memory, CPU, or both, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: request for large response leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "The package httpd versions as shipped with Red Hat Enterprise Linux 5, 6 and 7 are not affected by this issue as HTTP/2 support is not provided.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9517" }, { "category": "external", "summary": "RHBZ#1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9517", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9517" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-30T15:15:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2925" }, { "category": "workaround", "details": "The httpd version shipped with Red Hat Enterprise Linux 8 provides HTTP/2 support through mod_http2 package. While mod_http2 package is not updated, users can disable HTTP/2 support as mitigation action by executing the following steps:\n\n1. Stop httpd service:\n$ systemctl stop httpd\n\n2. Remove http/2 protocol support from configuration files:\n$ sed -i \u0027s/\\(h2\\)\\|\\(h2c\\)//g\u0027 \u003chttpd_config_file\u003e\n\n3. Validate configuration files to make sure all syntax is valid:\n$ apachectl configtest\n\n4. Restart httpd service:\n$ systemctl start httpd", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: request for large response leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9518", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735749" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using frames with an empty payload, a flood could occur that results in excessive CPU usage and starvation of other clients. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using empty frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9518" }, { "category": "external", "summary": "RHBZ#1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9518", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-30T15:15:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2925" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using empty frames results in excessive resource consumption" } ] }
rhsa-2019_3906
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat OpenShift Container Platform 3.11.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThe following RPM packages have been rebuilt with updated version of Go, which includes the security fixes listed further below:\n\natomic-enterprise-service-catalog\natomic-openshift-cluster-autoscaler\natomic-openshift-descheduler\natomic-openshift-metrics-server\natomic-openshift-node-problem-detector\natomic-openshift-service-idler\natomic-openshift-web-console\ncockpit\ncsi-attacher\ncsi-driver-registrar\ncsi-livenessprobe\ncsi-provisioner\ngolang-github-openshift-oauth-proxy\ngolang-github-openshift-prometheus-alert-buffer\ngolang-github-prometheus-alertmanager\ngolang-github-prometheus-node_exporter\ngolang-github-prometheus-prometheus\nhawkular-openshift-agent\nheapster\nimage-inspector\nopenshift-enterprise-autoheal\nopenshift-enterprise-cluster-capacity\nopenshift-eventrouter\nopenshift-external-storage\n\nSecurity Fix(es):\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:3906", "url": "https://access.redhat.com/errata/RHSA-2019:3906" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3906.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 3.11 HTTP/2 security update", "tracking": { "current_release_date": "2024-11-13T22:10:02+00:00", "generator": { "date": "2024-11-13T22:10:02+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2019:3906", "initial_release_date": "2019-11-18T16:26:09+00:00", "revision_history": [ { "date": "2019-11-18T16:26:09+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-11-18T16:26:09+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-13T22:10:02+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 3.11", "product": { "name": "Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:3.11::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.ppc64le", "product": { "name": "atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.ppc64le", "product_id": "atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.ppc64le", "product": { "name": "atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.ppc64le", "product_id": "atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog-svcat@3.11.154-1.git.1.fa68ced.el7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.ppc64le", "product": { "name": "atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.ppc64le", "product_id": "atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.ppc64le", "product": { "name": "atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.ppc64le", "product_id": "atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.ppc64le", "product": { "name": "atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.ppc64le", "product_id": "atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.ppc64le", "product": { "name": "atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.ppc64le", "product_id": "atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-node-problem-detector@3.11.154-1.git.1.5e8e065.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.ppc64le", "product": { "name": "atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.ppc64le", "product_id": "atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.ppc64le", "product": { "name": "atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.ppc64le", "product_id": "atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "cockpit-kubernetes-0:195-2.rhaos.el7.ppc64le", "product": { "name": "cockpit-kubernetes-0:195-2.rhaos.el7.ppc64le", "product_id": "cockpit-kubernetes-0:195-2.rhaos.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "cockpit-debuginfo-0:195-2.rhaos.el7.ppc64le", "product": { "name": "cockpit-debuginfo-0:195-2.rhaos.el7.ppc64le", "product_id": "cockpit-debuginfo-0:195-2.rhaos.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "csi-attacher-0:0.2.0-4.git27299be.el7.ppc64le", "product": { "name": "csi-attacher-0:0.2.0-4.git27299be.el7.ppc64le", "product_id": "csi-attacher-0:0.2.0-4.git27299be.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.ppc64le", "product": { "name": "csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.ppc64le", "product_id": "csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "csi-driver-registrar-0:0.2.0-2.el7.ppc64le", "product": { "name": "csi-driver-registrar-0:0.2.0-2.el7.ppc64le", "product_id": "csi-driver-registrar-0:0.2.0-2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "csi-driver-registrar-debuginfo-0:0.2.0-2.el7.ppc64le", "product": { "name": "csi-driver-registrar-debuginfo-0:0.2.0-2.el7.ppc64le", "product_id": "csi-driver-registrar-debuginfo-0:0.2.0-2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.ppc64le", "product": { "name": "csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.ppc64le", "product_id": "csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.ppc64le", "product": { "name": "csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.ppc64le", "product_id": "csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "csi-provisioner-0:0.2.0-3.el7.ppc64le", "product": { "name": "csi-provisioner-0:0.2.0-3.el7.ppc64le", "product_id": "csi-provisioner-0:0.2.0-3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "csi-provisioner-debuginfo-0:0.2.0-3.el7.ppc64le", "product": { "name": "csi-provisioner-debuginfo-0:0.2.0-3.el7.ppc64le", "product_id": "csi-provisioner-debuginfo-0:0.2.0-3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.ppc64le", "product": { "name": "golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.ppc64le", "product_id": "golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.ppc64le", "product": { "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.ppc64le", "product_id": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-openshift-prometheus-alert-buffer@0-3.gitceca8c1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.ppc64le", "product": { "name": "prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.ppc64le", "product_id": "prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.ppc64le", "product": { "name": "prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.ppc64le", "product_id": "prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "prometheus-0:3.11.154-1.git.1.148db48.el7.ppc64le", "product": { "name": "prometheus-0:3.11.154-1.git.1.148db48.el7.ppc64le", "product_id": "prometheus-0:3.11.154-1.git.1.148db48.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "hawkular-openshift-agent-0:1.2.2-3.el7.ppc64le", "product": { "name": "hawkular-openshift-agent-0:1.2.2-3.el7.ppc64le", "product_id": "hawkular-openshift-agent-0:1.2.2-3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "heapster-0:1.3.0-4.el7.ppc64le", "product": { "name": "heapster-0:1.3.0-4.el7.ppc64le", "product_id": "heapster-0:1.3.0-4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "image-inspector-0:2.4.0-4.el7.ppc64le", "product": { "name": "image-inspector-0:2.4.0-4.el7.ppc64le", "product_id": "image-inspector-0:2.4.0-4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.ppc64le", "product": { "name": "openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.ppc64le", "product_id": "openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.ppc64le", "product": { "name": "openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.ppc64le", "product_id": "openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-enterprise-cluster-capacity@3.11.154-1.git.1.5798c2c.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-eventrouter-0:0.2-4.git7c289cc.el7.ppc64le", "product": { "name": "openshift-eventrouter-0:0.2-4.git7c289cc.el7.ppc64le", "product_id": "openshift-eventrouter-0:0.2-4.git7c289cc.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.ppc64le", "product": { "name": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.ppc64le", "product_id": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product": { "name": "openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product_id": "openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-cephfs-provisioner@0.0.2-9.gitd3c94f0.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product": { "name": "openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product_id": "openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-efs-provisioner@0.0.2-9.gitd3c94f0.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product": { "name": "openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product_id": "openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-local-provisioner@0.0.2-9.gitd3c94f0.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product": { "name": "openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product_id": "openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-manila-provisioner@0.0.2-9.gitd3c94f0.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product": { "name": "openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product_id": "openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-snapshot-controller@0.0.2-9.gitd3c94f0.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product": { "name": "openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product_id": "openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-snapshot-provisioner@0.0.2-9.gitd3c94f0.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product": { "name": "openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product_id": "openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.x86_64", "product": { "name": "atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.x86_64", "product_id": "atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.x86_64", "product": { "name": "atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.x86_64", "product_id": "atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog-svcat@3.11.154-1.git.1.fa68ced.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.x86_64", "product": { "name": "atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.x86_64", "product_id": "atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.x86_64", "product": { "name": "atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.x86_64", "product_id": "atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.x86_64", "product": { "name": "atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.x86_64", "product_id": "atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.x86_64", "product": { "name": "atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.x86_64", "product_id": "atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-node-problem-detector@3.11.154-1.git.1.5e8e065.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.x86_64", "product": { "name": "atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.x86_64", "product_id": "atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.x86_64", "product": { "name": "atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.x86_64", "product_id": "atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "product": { "name": "cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "product_id": "cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "product": { "name": "cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "product_id": "cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "csi-attacher-0:0.2.0-4.git27299be.el7.x86_64", "product": { "name": "csi-attacher-0:0.2.0-4.git27299be.el7.x86_64", "product_id": "csi-attacher-0:0.2.0-4.git27299be.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.x86_64", "product": { "name": "csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.x86_64", "product_id": "csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "csi-driver-registrar-0:0.2.0-2.el7.x86_64", "product": { "name": "csi-driver-registrar-0:0.2.0-2.el7.x86_64", "product_id": "csi-driver-registrar-0:0.2.0-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "csi-driver-registrar-debuginfo-0:0.2.0-2.el7.x86_64", "product": { "name": "csi-driver-registrar-debuginfo-0:0.2.0-2.el7.x86_64", "product_id": "csi-driver-registrar-debuginfo-0:0.2.0-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.x86_64", "product": { "name": "csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.x86_64", "product_id": "csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.x86_64", "product": { "name": "csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.x86_64", "product_id": "csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "csi-provisioner-0:0.2.0-3.el7.x86_64", "product": { "name": "csi-provisioner-0:0.2.0-3.el7.x86_64", "product_id": "csi-provisioner-0:0.2.0-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "csi-provisioner-debuginfo-0:0.2.0-3.el7.x86_64", "product": { "name": "csi-provisioner-debuginfo-0:0.2.0-3.el7.x86_64", "product_id": "csi-provisioner-debuginfo-0:0.2.0-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.x86_64", "product": { "name": "golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.x86_64", "product_id": "golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "product": { "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "product_id": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-openshift-prometheus-alert-buffer@0-3.gitceca8c1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.x86_64", "product": { "name": "prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.x86_64", "product_id": "prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.x86_64", "product": { "name": "prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.x86_64", "product_id": "prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "prometheus-0:3.11.154-1.git.1.148db48.el7.x86_64", "product": { "name": "prometheus-0:3.11.154-1.git.1.148db48.el7.x86_64", "product_id": "prometheus-0:3.11.154-1.git.1.148db48.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "product": { "name": "hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "product_id": "hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "heapster-0:1.3.0-4.el7.x86_64", "product": { "name": "heapster-0:1.3.0-4.el7.x86_64", "product_id": "heapster-0:1.3.0-4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "image-inspector-0:2.4.0-4.el7.x86_64", "product": { "name": "image-inspector-0:2.4.0-4.el7.x86_64", "product_id": "image-inspector-0:2.4.0-4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.x86_64", "product": { "name": "openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.x86_64", "product_id": "openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.x86_64", "product": { "name": "openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.x86_64", "product_id": "openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-enterprise-cluster-capacity@3.11.154-1.git.1.5798c2c.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-eventrouter-0:0.2-4.git7c289cc.el7.x86_64", "product": { "name": "openshift-eventrouter-0:0.2-4.git7c289cc.el7.x86_64", "product_id": "openshift-eventrouter-0:0.2-4.git7c289cc.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.x86_64", "product": { "name": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.x86_64", "product_id": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product": { "name": "openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product_id": "openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-cephfs-provisioner@0.0.2-9.gitd3c94f0.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product": { "name": "openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product_id": "openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-efs-provisioner@0.0.2-9.gitd3c94f0.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product": { "name": "openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product_id": "openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-local-provisioner@0.0.2-9.gitd3c94f0.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product": { "name": "openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product_id": "openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-manila-provisioner@0.0.2-9.gitd3c94f0.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product": { "name": "openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product_id": "openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-snapshot-controller@0.0.2-9.gitd3c94f0.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product": { "name": "openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product_id": "openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-snapshot-provisioner@0.0.2-9.gitd3c94f0.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product": { "name": "openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product_id": "openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.src", "product": { "name": "atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.src", "product_id": "atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.src", "product": { "name": "atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.src", "product_id": "atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.src", "product": { "name": "atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.src", "product_id": "atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.src", "product": { "name": "atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.src", "product_id": "atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.src", "product": { "name": "atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.src", "product_id": "atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-node-problem-detector@3.11.154-1.git.1.5e8e065.el7?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.src", "product": { "name": "atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.src", "product_id": "atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.src", "product": { "name": "atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.src", "product_id": "atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "cockpit-0:195-2.rhaos.el7.src", "product": { "name": "cockpit-0:195-2.rhaos.el7.src", "product_id": "cockpit-0:195-2.rhaos.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "csi-attacher-0:0.2.0-4.git27299be.el7.src", "product": { "name": "csi-attacher-0:0.2.0-4.git27299be.el7.src", "product_id": "csi-attacher-0:0.2.0-4.git27299be.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "csi-driver-registrar-0:0.2.0-2.el7.src", "product": { "name": "csi-driver-registrar-0:0.2.0-2.el7.src", "product_id": "csi-driver-registrar-0:0.2.0-2.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.src", "product": { "name": "csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.src", "product_id": "csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "csi-provisioner-0:0.2.0-3.el7.src", "product": { "name": "csi-provisioner-0:0.2.0-3.el7.src", "product_id": "csi-provisioner-0:0.2.0-3.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.src", "product": { "name": "golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.src", "product_id": "golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "product": { "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "product_id": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-openshift-prometheus-alert-buffer@0-3.gitceca8c1.el7?arch=src" } } }, { "category": "product_version", "name": "golang-github-prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.src", "product": { "name": "golang-github-prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.src", "product_id": "golang-github-prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-prometheus-alertmanager@3.11.154-1.git.1.4acd2e6.el7?arch=src" } } }, { "category": "product_version", "name": "golang-github-prometheus-node_exporter-0:3.11.154-1.git.1.bc9f224.el7.src", "product": { "name": "golang-github-prometheus-node_exporter-0:3.11.154-1.git.1.bc9f224.el7.src", "product_id": "golang-github-prometheus-node_exporter-0:3.11.154-1.git.1.bc9f224.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-prometheus-node_exporter@3.11.154-1.git.1.bc9f224.el7?arch=src" } } }, { "category": "product_version", "name": "golang-github-prometheus-prometheus-0:3.11.154-1.git.1.148db48.el7.src", "product": { "name": "golang-github-prometheus-prometheus-0:3.11.154-1.git.1.148db48.el7.src", "product_id": "golang-github-prometheus-prometheus-0:3.11.154-1.git.1.148db48.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "hawkular-openshift-agent-0:1.2.2-3.el7.src", "product": { "name": "hawkular-openshift-agent-0:1.2.2-3.el7.src", "product_id": "hawkular-openshift-agent-0:1.2.2-3.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "heapster-0:1.3.0-4.el7.src", "product": { "name": "heapster-0:1.3.0-4.el7.src", "product_id": "heapster-0:1.3.0-4.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "image-inspector-0:2.4.0-4.el7.src", "product": { "name": "image-inspector-0:2.4.0-4.el7.src", "product_id": "image-inspector-0:2.4.0-4.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.src", "product": { "name": "openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.src", "product_id": "openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.src", "product": { "name": "openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.src", "product_id": "openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-enterprise-cluster-capacity@3.11.154-1.git.1.5798c2c.el7?arch=src" } } }, { "category": "product_version", "name": "openshift-eventrouter-0:0.2-4.git7c289cc.el7.src", "product": { "name": "openshift-eventrouter-0:0.2-4.git7c289cc.el7.src", "product_id": "openshift-eventrouter-0:0.2-4.git7c289cc.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "openshift-external-storage-0:0.0.2-9.gitd3c94f0.el7.src", "product": { "name": "openshift-external-storage-0:0.0.2-9.gitd3c94f0.el7.src", "product_id": "openshift-external-storage-0:0.0.2-9.gitd3c94f0.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.ppc64le" }, "product_reference": "atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.src" }, "product_reference": "atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.x86_64" }, "product_reference": "atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.ppc64le" }, "product_reference": "atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.x86_64" }, "product_reference": "atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.ppc64le" }, "product_reference": "atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.src" }, "product_reference": "atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.x86_64" }, "product_reference": "atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.ppc64le" }, "product_reference": "atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.src" }, "product_reference": "atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.x86_64" }, "product_reference": "atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.ppc64le" }, "product_reference": "atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.src" }, "product_reference": "atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.x86_64" }, "product_reference": "atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.ppc64le" }, "product_reference": "atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.src" }, "product_reference": "atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.x86_64" }, "product_reference": "atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.ppc64le" }, "product_reference": "atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.src" }, "product_reference": "atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.x86_64" }, "product_reference": "atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.ppc64le" }, "product_reference": "atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.src" }, "product_reference": "atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.x86_64" }, "product_reference": "atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "cockpit-0:195-2.rhaos.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:cockpit-0:195-2.rhaos.el7.src" }, "product_reference": "cockpit-0:195-2.rhaos.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "cockpit-debuginfo-0:195-2.rhaos.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:cockpit-debuginfo-0:195-2.rhaos.el7.ppc64le" }, "product_reference": "cockpit-debuginfo-0:195-2.rhaos.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "cockpit-debuginfo-0:195-2.rhaos.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:cockpit-debuginfo-0:195-2.rhaos.el7.x86_64" }, "product_reference": "cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "cockpit-kubernetes-0:195-2.rhaos.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:cockpit-kubernetes-0:195-2.rhaos.el7.ppc64le" }, "product_reference": "cockpit-kubernetes-0:195-2.rhaos.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "cockpit-kubernetes-0:195-2.rhaos.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:cockpit-kubernetes-0:195-2.rhaos.el7.x86_64" }, "product_reference": "cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "csi-attacher-0:0.2.0-4.git27299be.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.ppc64le" }, "product_reference": "csi-attacher-0:0.2.0-4.git27299be.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "csi-attacher-0:0.2.0-4.git27299be.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.src" }, "product_reference": "csi-attacher-0:0.2.0-4.git27299be.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "csi-attacher-0:0.2.0-4.git27299be.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.x86_64" }, "product_reference": "csi-attacher-0:0.2.0-4.git27299be.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.ppc64le" }, "product_reference": "csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.x86_64" }, "product_reference": "csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "csi-driver-registrar-0:0.2.0-2.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.ppc64le" }, "product_reference": "csi-driver-registrar-0:0.2.0-2.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "csi-driver-registrar-0:0.2.0-2.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.src" }, "product_reference": "csi-driver-registrar-0:0.2.0-2.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "csi-driver-registrar-0:0.2.0-2.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.x86_64" }, "product_reference": "csi-driver-registrar-0:0.2.0-2.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "csi-driver-registrar-debuginfo-0:0.2.0-2.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:csi-driver-registrar-debuginfo-0:0.2.0-2.el7.ppc64le" }, "product_reference": "csi-driver-registrar-debuginfo-0:0.2.0-2.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "csi-driver-registrar-debuginfo-0:0.2.0-2.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:csi-driver-registrar-debuginfo-0:0.2.0-2.el7.x86_64" }, "product_reference": "csi-driver-registrar-debuginfo-0:0.2.0-2.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.ppc64le" }, "product_reference": "csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.src" }, "product_reference": "csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.x86_64" }, "product_reference": "csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.ppc64le" }, "product_reference": "csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.x86_64" }, "product_reference": "csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "csi-provisioner-0:0.2.0-3.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.ppc64le" }, "product_reference": "csi-provisioner-0:0.2.0-3.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "csi-provisioner-0:0.2.0-3.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.src" }, "product_reference": "csi-provisioner-0:0.2.0-3.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "csi-provisioner-0:0.2.0-3.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.x86_64" }, "product_reference": "csi-provisioner-0:0.2.0-3.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "csi-provisioner-debuginfo-0:0.2.0-3.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:csi-provisioner-debuginfo-0:0.2.0-3.el7.ppc64le" }, "product_reference": "csi-provisioner-debuginfo-0:0.2.0-3.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "csi-provisioner-debuginfo-0:0.2.0-3.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:csi-provisioner-debuginfo-0:0.2.0-3.el7.x86_64" }, "product_reference": "csi-provisioner-debuginfo-0:0.2.0-3.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.ppc64le" }, "product_reference": "golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.src" }, "product_reference": "golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.x86_64" }, "product_reference": "golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.ppc64le" }, "product_reference": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src" }, "product_reference": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64" }, "product_reference": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.src" }, "product_reference": "golang-github-prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-node_exporter-0:3.11.154-1.git.1.bc9f224.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.154-1.git.1.bc9f224.el7.src" }, "product_reference": "golang-github-prometheus-node_exporter-0:3.11.154-1.git.1.bc9f224.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-prometheus-0:3.11.154-1.git.1.148db48.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.154-1.git.1.148db48.el7.src" }, "product_reference": "golang-github-prometheus-prometheus-0:3.11.154-1.git.1.148db48.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "hawkular-openshift-agent-0:1.2.2-3.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.ppc64le" }, "product_reference": "hawkular-openshift-agent-0:1.2.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "hawkular-openshift-agent-0:1.2.2-3.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.src" }, "product_reference": "hawkular-openshift-agent-0:1.2.2-3.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "hawkular-openshift-agent-0:1.2.2-3.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.x86_64" }, "product_reference": "hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "heapster-0:1.3.0-4.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.ppc64le" }, "product_reference": "heapster-0:1.3.0-4.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "heapster-0:1.3.0-4.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.src" }, "product_reference": "heapster-0:1.3.0-4.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "heapster-0:1.3.0-4.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.x86_64" }, "product_reference": "heapster-0:1.3.0-4.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "image-inspector-0:2.4.0-4.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.ppc64le" }, "product_reference": "image-inspector-0:2.4.0-4.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "image-inspector-0:2.4.0-4.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.src" }, "product_reference": "image-inspector-0:2.4.0-4.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "image-inspector-0:2.4.0-4.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.x86_64" }, "product_reference": "image-inspector-0:2.4.0-4.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.ppc64le" }, "product_reference": "openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.src" }, "product_reference": "openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.x86_64" }, "product_reference": "openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.ppc64le" }, "product_reference": "openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.src" }, "product_reference": "openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.x86_64" }, "product_reference": "openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-eventrouter-0:0.2-4.git7c289cc.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.ppc64le" }, "product_reference": "openshift-eventrouter-0:0.2-4.git7c289cc.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-eventrouter-0:0.2-4.git7c289cc.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.src" }, "product_reference": "openshift-eventrouter-0:0.2-4.git7c289cc.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-eventrouter-0:0.2-4.git7c289cc.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.x86_64" }, "product_reference": "openshift-eventrouter-0:0.2-4.git7c289cc.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.ppc64le" }, "product_reference": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.x86_64" }, "product_reference": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-0:0.0.2-9.gitd3c94f0.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-external-storage-0:0.0.2-9.gitd3c94f0.el7.src" }, "product_reference": "openshift-external-storage-0:0.0.2-9.gitd3c94f0.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le" }, "product_reference": "openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64" }, "product_reference": "openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.ppc64le" }, "product_reference": "openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.x86_64" }, "product_reference": "openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le" }, "product_reference": "openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64" }, "product_reference": "openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le" }, "product_reference": "openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64" }, "product_reference": "openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le" }, "product_reference": "openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64" }, "product_reference": "openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.ppc64le" }, "product_reference": "openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.x86_64" }, "product_reference": "openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le" }, "product_reference": "openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64" }, "product_reference": "openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-0:3.11.154-1.git.1.148db48.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.154-1.git.1.148db48.el7.ppc64le" }, "product_reference": "prometheus-0:3.11.154-1.git.1.148db48.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-0:3.11.154-1.git.1.148db48.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.154-1.git.1.148db48.el7.x86_64" }, "product_reference": "prometheus-0:3.11.154-1.git.1.148db48.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.ppc64le" }, "product_reference": "prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.x86_64" }, "product_reference": "prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.ppc64le" }, "product_reference": "prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.x86_64" }, "product_reference": "prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.x86_64", "7Server-RH7-RHOSE-3.11:cockpit-0:195-2.rhaos.el7.src", "7Server-RH7-RHOSE-3.11:cockpit-debuginfo-0:195-2.rhaos.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.11:cockpit-kubernetes-0:195-2.rhaos.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.src", "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.src", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-debuginfo-0:0.2.0-2.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-debuginfo-0:0.2.0-2.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.src", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.src", "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-provisioner-debuginfo-0:0.2.0-3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-provisioner-debuginfo-0:0.2.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.154-1.git.1.bc9f224.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.154-1.git.1.148db48.el7.src", "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.src", "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.ppc64le", "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.src", "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.ppc64le", "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.src", "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.src", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-0:0.0.2-9.gitd3c94f0.el7.src", "7Server-RH7-RHOSE-3.11:openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.154-1.git.1.148db48.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.154-1.git.1.148db48.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-18T16:26:09+00:00", "details": "See the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_release_notes.html", "product_ids": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.x86_64", "7Server-RH7-RHOSE-3.11:cockpit-0:195-2.rhaos.el7.src", "7Server-RH7-RHOSE-3.11:cockpit-debuginfo-0:195-2.rhaos.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.11:cockpit-kubernetes-0:195-2.rhaos.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.src", "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.src", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-debuginfo-0:0.2.0-2.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-debuginfo-0:0.2.0-2.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.src", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.src", "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-provisioner-debuginfo-0:0.2.0-3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-provisioner-debuginfo-0:0.2.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.154-1.git.1.bc9f224.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.154-1.git.1.148db48.el7.src", "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.src", "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.ppc64le", "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.src", "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.ppc64le", "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.src", "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.src", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-0:0.0.2-9.gitd3c94f0.el7.src", "7Server-RH7-RHOSE-3.11:openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.154-1.git.1.148db48.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.154-1.git.1.148db48.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3906" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.x86_64", "7Server-RH7-RHOSE-3.11:cockpit-0:195-2.rhaos.el7.src", "7Server-RH7-RHOSE-3.11:cockpit-debuginfo-0:195-2.rhaos.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.11:cockpit-kubernetes-0:195-2.rhaos.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.src", "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.src", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-debuginfo-0:0.2.0-2.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-debuginfo-0:0.2.0-2.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.src", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.src", "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-provisioner-debuginfo-0:0.2.0-3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-provisioner-debuginfo-0:0.2.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.154-1.git.1.bc9f224.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.154-1.git.1.148db48.el7.src", "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.src", "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.ppc64le", "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.src", "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.ppc64le", "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.src", "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.src", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-0:0.0.2-9.gitd3c94f0.el7.src", "7Server-RH7-RHOSE-3.11:openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.154-1.git.1.148db48.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.154-1.git.1.148db48.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.x86_64", "7Server-RH7-RHOSE-3.11:cockpit-0:195-2.rhaos.el7.src", "7Server-RH7-RHOSE-3.11:cockpit-debuginfo-0:195-2.rhaos.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.11:cockpit-kubernetes-0:195-2.rhaos.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.src", "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.src", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-debuginfo-0:0.2.0-2.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-debuginfo-0:0.2.0-2.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.src", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.src", "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-provisioner-debuginfo-0:0.2.0-3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-provisioner-debuginfo-0:0.2.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.154-1.git.1.bc9f224.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.154-1.git.1.148db48.el7.src", "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.src", "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.ppc64le", "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.src", "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.ppc64le", "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.src", "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.src", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-0:0.0.2-9.gitd3c94f0.el7.src", "7Server-RH7-RHOSE-3.11:openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.154-1.git.1.148db48.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.154-1.git.1.148db48.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-18T16:26:09+00:00", "details": "See the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_release_notes.html", "product_ids": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.x86_64", "7Server-RH7-RHOSE-3.11:cockpit-0:195-2.rhaos.el7.src", "7Server-RH7-RHOSE-3.11:cockpit-debuginfo-0:195-2.rhaos.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.11:cockpit-kubernetes-0:195-2.rhaos.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.src", "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.src", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-debuginfo-0:0.2.0-2.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-debuginfo-0:0.2.0-2.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.src", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.src", "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-provisioner-debuginfo-0:0.2.0-3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-provisioner-debuginfo-0:0.2.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.154-1.git.1.bc9f224.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.154-1.git.1.148db48.el7.src", "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.src", "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.ppc64le", "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.src", "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.ppc64le", "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.src", "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.src", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-0:0.0.2-9.gitd3c94f0.el7.src", "7Server-RH7-RHOSE-3.11:openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.154-1.git.1.148db48.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.154-1.git.1.148db48.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3906" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.x86_64", "7Server-RH7-RHOSE-3.11:cockpit-0:195-2.rhaos.el7.src", "7Server-RH7-RHOSE-3.11:cockpit-debuginfo-0:195-2.rhaos.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.11:cockpit-kubernetes-0:195-2.rhaos.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.src", "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.src", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-debuginfo-0:0.2.0-2.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-debuginfo-0:0.2.0-2.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.src", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.src", "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-provisioner-debuginfo-0:0.2.0-3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-provisioner-debuginfo-0:0.2.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.154-1.git.1.bc9f224.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.154-1.git.1.148db48.el7.src", "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.src", "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.ppc64le", "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.src", "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.ppc64le", "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.src", "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.src", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-0:0.0.2-9.gitd3c94f0.el7.src", "7Server-RH7-RHOSE-3.11:openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.154-1.git.1.148db48.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.154-1.git.1.148db48.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" } ] }
rhsa-2019_3245
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for apb, containernetworking-plugins, and golang-github-prometheus-promu is now available for Red Hat OpenShift Container Platform 4.2.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThe following packages have been rebuilt with an updated version of golang: apb (2.0.3), containernetworking-plugins (0.8.1), and golang-github-prometheus-promu (0.5.0). \n\nSecurity Fix(es):\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:3245", "url": "https://access.redhat.com/errata/RHSA-2019:3245" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3245.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 4.2 security update", "tracking": { "current_release_date": "2024-11-13T22:09:52+00:00", "generator": { "date": "2024-11-13T22:09:52+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2019:3245", "initial_release_date": "2019-10-29T17:43:03+00:00", "revision_history": [ { "date": "2019-10-29T17:43:03+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-10-29T17:43:03+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-13T22:09:52+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.2", "product": { "name": "Red Hat OpenShift Container Platform 4.2", "product_id": "7Server-RH7-RHOSE-4.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.2::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "apb-0:2.0.3-2.el7.x86_64", "product": { "name": "apb-0:2.0.3-2.el7.x86_64", "product_id": "apb-0:2.0.3-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.8.1-4.el7.x86_64", "product": { "name": "containernetworking-plugins-0:0.8.1-4.el7.x86_64", "product_id": "containernetworking-plugins-0:0.8.1-4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64", "product": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64", "product_id": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64", "product": { "name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64", "product_id": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64", "product": { "name": "prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64", "product_id": "prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "apb-0:2.0.3-2.el7.src", "product": { "name": "apb-0:2.0.3-2.el7.src", "product_id": "apb-0:2.0.3-2.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.8.1-4.el7.src", "product": { "name": "containernetworking-plugins-0:0.8.1-4.el7.src", "product_id": "containernetworking-plugins-0:0.8.1-4.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.src", "product": { "name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.src", "product_id": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "apb-container-scripts-0:2.0.3-2.el7.noarch", "product": { "name": "apb-container-scripts-0:2.0.3-2.el7.noarch", "product_id": "apb-container-scripts-0:2.0.3-2.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } }, { "category": "product_version", "name": "apb-devel-0:2.0.3-2.el7.noarch", "product": { "name": "apb-devel-0:2.0.3-2.el7.noarch", "product_id": "apb-devel-0:2.0.3-2.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "apb-0:2.0.3-2.el7.src as a component of Red Hat OpenShift Container Platform 4.2", "product_id": "7Server-RH7-RHOSE-4.2:apb-0:2.0.3-2.el7.src" }, "product_reference": "apb-0:2.0.3-2.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.2" }, { "category": "default_component_of", "full_product_name": { "name": "apb-0:2.0.3-2.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.2", "product_id": "7Server-RH7-RHOSE-4.2:apb-0:2.0.3-2.el7.x86_64" }, "product_reference": "apb-0:2.0.3-2.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.2" }, { "category": "default_component_of", "full_product_name": { "name": "apb-container-scripts-0:2.0.3-2.el7.noarch as a component of Red Hat OpenShift Container Platform 4.2", "product_id": "7Server-RH7-RHOSE-4.2:apb-container-scripts-0:2.0.3-2.el7.noarch" }, "product_reference": "apb-container-scripts-0:2.0.3-2.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.2" }, { "category": "default_component_of", "full_product_name": { "name": "apb-devel-0:2.0.3-2.el7.noarch as a component of Red Hat OpenShift Container Platform 4.2", "product_id": "7Server-RH7-RHOSE-4.2:apb-devel-0:2.0.3-2.el7.noarch" }, "product_reference": "apb-devel-0:2.0.3-2.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.2" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.1-4.el7.src as a component of Red Hat OpenShift Container Platform 4.2", "product_id": "7Server-RH7-RHOSE-4.2:containernetworking-plugins-0:0.8.1-4.el7.src" }, "product_reference": "containernetworking-plugins-0:0.8.1-4.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.2" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.1-4.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.2", "product_id": "7Server-RH7-RHOSE-4.2:containernetworking-plugins-0:0.8.1-4.el7.x86_64" }, "product_reference": "containernetworking-plugins-0:0.8.1-4.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.2" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.2", "product_id": "7Server-RH7-RHOSE-4.2:containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.2" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.src as a component of Red Hat OpenShift Container Platform 4.2", "product_id": "7Server-RH7-RHOSE-4.2:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.src" }, "product_reference": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.2" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.2", "product_id": "7Server-RH7-RHOSE-4.2:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64" }, "product_reference": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.2" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.2", "product_id": "7Server-RH7-RHOSE-4.2:prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64" }, "product_reference": "prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.2" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.2:apb-0:2.0.3-2.el7.src", "7Server-RH7-RHOSE-4.2:apb-0:2.0.3-2.el7.x86_64", "7Server-RH7-RHOSE-4.2:apb-container-scripts-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.2:apb-devel-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.2:containernetworking-plugins-0:0.8.1-4.el7.src", "7Server-RH7-RHOSE-4.2:containernetworking-plugins-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.2:containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.2:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.src", "7Server-RH7-RHOSE-4.2:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64", "7Server-RH7-RHOSE-4.2:prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-29T17:43:03+00:00", "details": "For OpenShift Container Platform 4.2 see the following documentation, which\nwill be updated shortly for release 4.2.1, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.2/release_notes/ocp-4-2-release-notes.html", "product_ids": [ "7Server-RH7-RHOSE-4.2:apb-0:2.0.3-2.el7.src", "7Server-RH7-RHOSE-4.2:apb-0:2.0.3-2.el7.x86_64", "7Server-RH7-RHOSE-4.2:apb-container-scripts-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.2:apb-devel-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.2:containernetworking-plugins-0:0.8.1-4.el7.src", "7Server-RH7-RHOSE-4.2:containernetworking-plugins-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.2:containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.2:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.src", "7Server-RH7-RHOSE-4.2:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64", "7Server-RH7-RHOSE-4.2:prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3245" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-4.2:apb-0:2.0.3-2.el7.src", "7Server-RH7-RHOSE-4.2:apb-0:2.0.3-2.el7.x86_64", "7Server-RH7-RHOSE-4.2:apb-container-scripts-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.2:apb-devel-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.2:containernetworking-plugins-0:0.8.1-4.el7.src", "7Server-RH7-RHOSE-4.2:containernetworking-plugins-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.2:containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.2:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.src", "7Server-RH7-RHOSE-4.2:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64", "7Server-RH7-RHOSE-4.2:prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.2:apb-0:2.0.3-2.el7.src", "7Server-RH7-RHOSE-4.2:apb-0:2.0.3-2.el7.x86_64", "7Server-RH7-RHOSE-4.2:apb-container-scripts-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.2:apb-devel-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.2:containernetworking-plugins-0:0.8.1-4.el7.src", "7Server-RH7-RHOSE-4.2:containernetworking-plugins-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.2:containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.2:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.src", "7Server-RH7-RHOSE-4.2:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64", "7Server-RH7-RHOSE-4.2:prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-29T17:43:03+00:00", "details": "For OpenShift Container Platform 4.2 see the following documentation, which\nwill be updated shortly for release 4.2.1, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.2/release_notes/ocp-4-2-release-notes.html", "product_ids": [ "7Server-RH7-RHOSE-4.2:apb-0:2.0.3-2.el7.src", "7Server-RH7-RHOSE-4.2:apb-0:2.0.3-2.el7.x86_64", "7Server-RH7-RHOSE-4.2:apb-container-scripts-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.2:apb-devel-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.2:containernetworking-plugins-0:0.8.1-4.el7.src", "7Server-RH7-RHOSE-4.2:containernetworking-plugins-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.2:containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.2:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.src", "7Server-RH7-RHOSE-4.2:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64", "7Server-RH7-RHOSE-4.2:prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3245" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-4.2:apb-0:2.0.3-2.el7.src", "7Server-RH7-RHOSE-4.2:apb-0:2.0.3-2.el7.x86_64", "7Server-RH7-RHOSE-4.2:apb-container-scripts-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.2:apb-devel-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.2:containernetworking-plugins-0:0.8.1-4.el7.src", "7Server-RH7-RHOSE-4.2:containernetworking-plugins-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.2:containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.2:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.src", "7Server-RH7-RHOSE-4.2:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64", "7Server-RH7-RHOSE-4.2:prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" } ] }
rhsa-2020_0406
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for containernetworking-plugins is now available for Red Hat Enterprise Linux 7 Extras.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The Container Network Interface (CNI) project consists of a specification and libraries for writing plug-ins for configuring network interfaces in Linux containers, along with a number of supported plug-ins. CNI concerns itself only with network connectivity of containers and removing allocated resources when the container is deleted.\n\nSecurity Fix(es):\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:0406", "url": "https://access.redhat.com/errata/RHSA-2020:0406" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_0406.json" } ], "title": "Red Hat Security Advisory: containernetworking-plugins security update", "tracking": { "current_release_date": "2024-11-13T22:11:12+00:00", "generator": { "date": "2024-11-13T22:11:12+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2020:0406", "initial_release_date": "2020-02-04T19:25:46+00:00", "revision_history": [ { "date": "2020-02-04T19:25:46+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-02-04T19:25:46+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-13T22:11:12+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux 7 Extras", "product": { "name": "Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.7", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_other:7" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux 7 Extras", "product": { "name": "Red Hat Enterprise Linux 7 Extras", "product_id": "7Workstation-EXTRAS-7.7", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_other:7" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Extras" }, { "branches": [ { "category": "product_version", "name": "containernetworking-plugins-0:0.8.1-4.el7_7.x86_64", "product": { "name": "containernetworking-plugins-0:0.8.1-4.el7_7.x86_64", "product_id": "containernetworking-plugins-0:0.8.1-4.el7_7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_7?arch=x86_64" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64", "product": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64", "product_id": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "containernetworking-plugins-0:0.8.1-4.el7_7.src", "product": { "name": "containernetworking-plugins-0:0.8.1-4.el7_7.src", "product_id": "containernetworking-plugins-0:0.8.1-4.el7_7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le", "product": { "name": "containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le", "product_id": "containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_7?arch=ppc64le" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le", "product": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le", "product_id": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "containernetworking-plugins-0:0.8.1-4.el7_7.s390x", "product": { "name": "containernetworking-plugins-0:0.8.1-4.el7_7.s390x", "product_id": "containernetworking-plugins-0:0.8.1-4.el7_7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_7?arch=s390x" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x", "product": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x", "product_id": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le" }, "product_reference": "containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le", "relates_to_product_reference": "7Server-EXTRAS-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.1-4.el7_7.s390x as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.s390x" }, "product_reference": "containernetworking-plugins-0:0.8.1-4.el7_7.s390x", "relates_to_product_reference": "7Server-EXTRAS-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.1-4.el7_7.src as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.src" }, "product_reference": "containernetworking-plugins-0:0.8.1-4.el7_7.src", "relates_to_product_reference": "7Server-EXTRAS-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.1-4.el7_7.x86_64 as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.x86_64" }, "product_reference": "containernetworking-plugins-0:0.8.1-4.el7_7.x86_64", "relates_to_product_reference": "7Server-EXTRAS-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le", "relates_to_product_reference": "7Server-EXTRAS-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x", "relates_to_product_reference": "7Server-EXTRAS-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64 as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64", "relates_to_product_reference": "7Server-EXTRAS-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le" }, "product_reference": "containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le", "relates_to_product_reference": "7Workstation-EXTRAS-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.1-4.el7_7.s390x as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.s390x" }, "product_reference": "containernetworking-plugins-0:0.8.1-4.el7_7.s390x", "relates_to_product_reference": "7Workstation-EXTRAS-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.1-4.el7_7.src as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.src" }, "product_reference": "containernetworking-plugins-0:0.8.1-4.el7_7.src", "relates_to_product_reference": "7Workstation-EXTRAS-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.1-4.el7_7.x86_64 as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.x86_64" }, "product_reference": "containernetworking-plugins-0:0.8.1-4.el7_7.x86_64", "relates_to_product_reference": "7Workstation-EXTRAS-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le", "relates_to_product_reference": "7Workstation-EXTRAS-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x", "relates_to_product_reference": "7Workstation-EXTRAS-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64 as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64", "relates_to_product_reference": "7Workstation-EXTRAS-7.7" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le", "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.s390x", "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.src", "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.x86_64", "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le", "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x", "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.s390x", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.src", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.x86_64", "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le", "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x", "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-02-04T19:25:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le", "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.s390x", "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.src", "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.x86_64", "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le", "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x", "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.s390x", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.src", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.x86_64", "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le", "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x", "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0406" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le", "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.s390x", "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.src", "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.x86_64", "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le", "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x", "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.s390x", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.src", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.x86_64", "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le", "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x", "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le", "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.s390x", "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.src", "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.x86_64", "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le", "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x", "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.s390x", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.src", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.x86_64", "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le", "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x", "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-02-04T19:25:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le", "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.s390x", "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.src", "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.x86_64", "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le", "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x", "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.s390x", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.src", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.x86_64", "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le", "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x", "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0406" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le", "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.s390x", "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.src", "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.x86_64", "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le", "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x", "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.s390x", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.src", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.x86_64", "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le", "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x", "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" } ] }
rhsa-2019:4045
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "A security update is now available for Red Hat Single Sign-On 7.3 from the Customer Portal.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Single Sign-On 7.3 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications.\n\nThis release of Red Hat Single Sign-On 7.3.5 serves as a replacement for Red Hat Single Sign-On 7.2.6, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* keycloak: Service accounts reset password flow not using placeholder.org domain anymore (CVE-2019-14837)\n\n* undertow: HTTP/2: flood using PING frames results in unbounded memory growth\n(CVE-2019-9512)\n\n* undertow: HTTP/2: flood using HEADERS frames results in unbounded memory\ngrowth (CVE-2019-9514)\n\n* undertow: HTTP/2: flood using SETTINGS frames results in unbounded memory\ngrowth (CVE-2019-9515)\n\n* wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027\nuser by default (CVE-2019-14838)\n\n* wildfly: wildfly-security-manager: security manager authorization bypass\n(CVE-2019-14843)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:4045", "url": "https://access.redhat.com/errata/RHSA-2019:4045" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.rhsso\u0026downloadType=securityPatches\u0026version=7.3", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.rhsso\u0026downloadType=securityPatches\u0026version=7.3" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.3/", "url": "https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.3/" }, { "category": "external", "summary": "1730227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1730227" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1751227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751227" }, { "category": "external", "summary": "1752980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752980" }, { "category": "external", "summary": "KEYCLOAK-11792", "url": "https://issues.redhat.com/browse/KEYCLOAK-11792" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_4045.json" } ], "title": "Red Hat Security Advisory: Red Hat Single Sign-On 7.3.5 security update", "tracking": { "current_release_date": "2025-03-15T19:44:47+00:00", "generator": { "date": "2025-03-15T19:44:47+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.1" } }, "id": "RHSA-2019:4045", "initial_release_date": "2019-12-02T17:21:07+00:00", "revision_history": [ { "date": "2019-12-02T17:21:07+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-12-02T17:21:07+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-03-15T19:44:47+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Single Sign-On 7.3", "product": { "name": "Red Hat Single Sign-On 7.3", "product_id": "Red Hat Single Sign-On 7.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_single_sign_on:7.3" } } } ], "category": "product_family", "name": "Red Hat Single Sign-On" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Single Sign-On 7.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:21:07+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Single Sign-On 7.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4045" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Single Sign-On 7.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Single Sign-On 7.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:21:07+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Single Sign-On 7.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4045" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Single Sign-On 7.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Single Sign-On 7.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:21:07+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Single Sign-On 7.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4045" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Single Sign-On 7.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "Vadim Ashikhman" ] } ], "cve": "CVE-2019-14837", "cwe": { "id": "CWE-547", "name": "Use of Hard-coded, Security-relevant Constants" }, "discovery_date": "2019-07-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1730227" } ], "notes": [ { "category": "description", "text": "A flaw was found in Keycloak. The use of an open hard-coded domain can allow an unauthorized login by setting up a mail server and resetting the user credentials, enabling information disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak: keycloak uses hardcoded open dummy domain for new accounts enabling information disclosure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Single Sign-On 7.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14837" }, { "category": "external", "summary": "RHBZ#1730227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1730227" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14837", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14837" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14837", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14837" } ], "release_date": "2019-12-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:21:07+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Single Sign-On 7.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4045" }, { "category": "workaround", "details": "It is not a very straight forward workaround but it is possible to mitigate this by manually editing the default Email ID ([email protected]) to some valid email ID ([email protected]) in the USER_ENTITY table in the RHSSO database used.", "product_ids": [ "Red Hat Single Sign-On 7.3" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "Red Hat Single Sign-On 7.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "keycloak: keycloak uses hardcoded open dummy domain for new accounts enabling information disclosure" }, { "acknowledgments": [ { "names": [ "F\u00e1bio Magalh\u00e3es de Andrade" ], "organization": "Sonda Ativas" }, { "names": [ "Juliano de Castro Santos", "Leonard Lunardi" ], "organization": "UnimedBH" } ], "cve": "CVE-2019-14838", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2019-08-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1751227" } ], "notes": [ { "category": "description", "text": "It was found that Wildfly users had default user permissions set incorrectly. A malicious user could use this flaw to access unauthorized controls for the application server.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Single Sign-On 7.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14838" }, { "category": "external", "summary": "RHBZ#1751227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751227" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14838", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14838" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14838", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14838" }, { "category": "external", "summary": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14838", "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14838" } ], "release_date": "2019-10-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:21:07+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Single Sign-On 7.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4045" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "Red Hat Single Sign-On 7.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default" }, { "cve": "CVE-2019-14843", "cwe": { "id": "CWE-592", "name": "CWE-592" }, "discovery_date": "2019-09-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1752980" } ], "notes": [ { "category": "description", "text": "A flaw was found in Wildfly Security Manager, running under JDK 11 or 8, that authorized requests for any requester. This flaw could be used by a malicious app deployed on the app server to access unauthorized information and possibly conduct further attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-security-manager: security manager authorization bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Single Sign-On 7.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14843" }, { "category": "external", "summary": "RHBZ#1752980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752980" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14843", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14843" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14843", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14843" } ], "release_date": "2019-09-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:21:07+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Single Sign-On 7.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4045" }, { "category": "workaround", "details": "This flaw only affects the Security Manager running under JDK 11 or 8. To mitigate exposure to this flaw, do not run under those JDK versions.", "product_ids": [ "Red Hat Single Sign-On 7.3" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat Single Sign-On 7.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "wildfly-security-manager: security manager authorization bypass" } ] }
RHSA-2019:2966
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated Quay packages that fix several bugs and add various enhancements are now available.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Quay 3.1.1 errata release, including:\n\nSecurity Fix(es):\n\n* HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511)\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using PRIORITY frames resulting in excessive resource consumption (CVE-2019-9513)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* HTTP/2: 0-length headers lead to denial of service (CVE-2019-9516)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Fixed repository mirror credentials properly escaped to allow special characters\n* Fixed repository mirror UI cancel button enabled\n* Fixed repository mirror UI change next sync date", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:2966", "url": "https://access.redhat.com/errata/RHSA-2019:2966" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735741" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "1750473", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1750473" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2966.json" } ], "title": "Red Hat Security Advisory: Red Hat Quay v3.1.1 security update", "tracking": { "current_release_date": "2025-03-15T19:44:30+00:00", "generator": { "date": "2025-03-15T19:44:30+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.1" } }, "id": "RHSA-2019:2966", "initial_release_date": "2019-10-03T18:57:22+00:00", "revision_history": [ { "date": "2019-10-03T18:57:22+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-10-03T18:57:22+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-03-15T19:44:30+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Quay v3", "product": { "name": "Quay v3", "product_id": "7Server-RH7-Quay-3", "product_identification_helper": { "cpe": "cpe:/a:redhat:quay:3::el7" } } } ], "category": "product_family", "name": "Red Hat Quay" }, { "branches": [ { "category": "product_version", "name": "quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64", "product": { "name": "quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64", "product_id": "quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64", "product_identification_helper": { "purl": "pkg:oci/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821?arch=amd64\u0026repository_url=registry.redhat.io/quay3/clair-jwt\u0026tag=v2.0.9-7" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64 as a component of Quay v3", "product_id": "7Server-RH7-Quay-3:quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64" }, "product_reference": "quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64", "relates_to_product_reference": "7Server-RH7-Quay-3" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-9511", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741860" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker can request a large amount of data by manipulating window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this queue can consume excess CPU, memory, or both, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: large amount of data requests leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "There are no mitigations available for nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-Quay-3:quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "RHBZ#1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9511", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-03T18:57:22+00:00", "details": "Please download the release images via:\n\nquay.io/redhat/quay:v3.1.1\nquay.io/redhat/clair-jwt:v3.1.1\nquay.io/redhat/quay-builder:v3.1.1", "product_ids": [ "7Server-RH7-Quay-3:quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2966" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "7Server-RH7-Quay-3:quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-Quay-3:quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: large amount of data requests leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-Quay-3:quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-03T18:57:22+00:00", "details": "Please download the release images via:\n\nquay.io/redhat/quay:v3.1.1\nquay.io/redhat/clair-jwt:v3.1.1\nquay.io/redhat/quay-builder:v3.1.1", "product_ids": [ "7Server-RH7-Quay-3:quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2966" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-Quay-3:quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9513", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735741" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker, using PRIORITY frames to flood the system, could cause excessive CPU usage and starvation of other clients. The largest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PRIORITY frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for packages nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-Quay-3:quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9513" }, { "category": "external", "summary": "RHBZ#1735741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735741" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9513", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9513" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9513", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9513" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nghttp2.org/blog/2019/08/19/nghttp2-v1-39-2/", "url": "https://nghttp2.org/blog/2019/08/19/nghttp2-v1-39-2/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-03T18:57:22+00:00", "details": "Please download the release images via:\n\nquay.io/redhat/quay:v3.1.1\nquay.io/redhat/clair-jwt:v3.1.1\nquay.io/redhat/quay-builder:v3.1.1", "product_ids": [ "7Server-RH7-Quay-3:quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2966" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "7Server-RH7-Quay-3:quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-Quay-3:quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PRIORITY frames results in excessive resource consumption" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-Quay-3:quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-03T18:57:22+00:00", "details": "Please download the release images via:\n\nquay.io/redhat/quay:v3.1.1\nquay.io/redhat/clair-jwt:v3.1.1\nquay.io/redhat/quay-builder:v3.1.1", "product_ids": [ "7Server-RH7-Quay-3:quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2966" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-Quay-3:quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "cve": "CVE-2019-9516", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741864" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker, sending a stream of header with a 0-length header name and a 0-length header value, could cause some implementations to allocate memory for these headers and keep the allocations alive until the session dies. The can consume excess memory, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: 0-length headers lead to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-Quay-3:quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9516" }, { "category": "external", "summary": "RHBZ#1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9516", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9516" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://github.com/nghttp2/nghttp2/issues/1382#", "url": "https://github.com/nghttp2/nghttp2/issues/1382#" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-03T18:57:22+00:00", "details": "Please download the release images via:\n\nquay.io/redhat/quay:v3.1.1\nquay.io/redhat/clair-jwt:v3.1.1\nquay.io/redhat/quay-builder:v3.1.1", "product_ids": [ "7Server-RH7-Quay-3:quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2966" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "7Server-RH7-Quay-3:quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-Quay-3:quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: 0-length headers lead to denial of service" } ] }
rhsa-2020_0922
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat AMQ Broker 7.6 is now available from the Red Hat Customer Portal.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "AMQ Broker is a high-performance messaging implementation based on ActiveMQ Artemis. It uses an asynchronous journal for fast message persistence, and supports multiple languages, protocols, and platforms. \n\nThis release of Red Hat AMQ Broker 7.6.0 serves as a replacement for Red Hat AMQ Broker 7.5.0, and includes security and bug fixes, and enhancements. For further information, refer to the release notes linked to in the References section.\n\nSecurity Fix(es):\n\n* netty: HTTP request smuggling (CVE-2019-20444)\n\n* netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header (CVE-2019-20445)\n\n* jetty: HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511)\n\n* jetty: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* jetty: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* jetty: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* jetty: HTTP/2: 0-length headers lead to denial of service (CVE-2019-9516)\n\n* jetty: HTTP/2: request for large response leads to denial of service (CVE-2019-9517)\n\n* jetty: HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)\n\n* jetty: using specially formatted URL against DefaultServlet or ResourceHandler leads to XSS conditions (CVE-2019-10241)\n\n* jetty: error path information disclosure (CVE-2019-10247)\n\n* mqtt-client: activemq: Corrupt MQTT frame can cause broker shutdown (CVE-2019-0222)\n\n* netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers (CVE-2019-16869)\n\n* netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling (CVE-2020-7238)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:0922", "url": "https://access.redhat.com/errata/RHSA-2020:0922" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=jboss.amq.broker\u0026version=7.6.0\u0026productChanged=yes", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=jboss.amq.broker\u0026version=7.6.0\u0026productChanged=yes" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_amq/7.6/", "url": "https://access.redhat.com/documentation/en-us/red_hat_amq/7.6/" }, { "category": "external", "summary": "1696012", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1696012" }, { "category": "external", "summary": "1705924", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705924" }, { "category": "external", "summary": "1705993", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705993" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "external", "summary": "1758619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758619" }, { "category": "external", "summary": "1796225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796225" }, { "category": "external", "summary": "1798509", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798509" }, { "category": "external", "summary": "1798524", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798524" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_0922.json" } ], "title": "Red Hat Security Advisory: Red Hat AMQ Broker 7.6 release and security update", "tracking": { "current_release_date": "2024-12-29T18:37:26+00:00", "generator": { "date": "2024-12-29T18:37:26+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.4" } }, "id": "RHSA-2020:0922", "initial_release_date": "2020-03-23T08:21:33+00:00", "revision_history": [ { "date": "2020-03-23T08:21:33+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-03-23T08:21:33+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-29T18:37:26+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat AMQ", "product": { "name": "Red Hat AMQ", "product_id": "Red Hat AMQ", "product_identification_helper": { "cpe": "cpe:/a:redhat:amq_broker:7" } } } ], "category": "product_family", "name": "Red Hat JBoss AMQ" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-0222", "discovery_date": "2019-03-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1696012" } ], "notes": [ { "category": "description", "text": "In Apache ActiveMQ 5.0.0 - 5.15.8, unmarshalling corrupt MQTT frame can lead to broker Out of Memory exception making it unresponsive.", "title": "Vulnerability description" }, { "category": "summary", "text": "activemq: Corrupt MQTT frame can cause broker shutdown", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-0222" }, { "category": "external", "summary": "RHBZ#1696012", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1696012" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0222", "url": "https://www.cve.org/CVERecord?id=CVE-2019-0222" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0222", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0222" } ], "release_date": "2019-03-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "activemq: Corrupt MQTT frame can cause broker shutdown" }, { "cve": "CVE-2019-9511", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741860" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker can request a large amount of data by manipulating window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this queue can consume excess CPU, memory, or both, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: large amount of data requests leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "There are no mitigations available for nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "RHBZ#1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9511", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "Red Hat AMQ" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: large amount of data requests leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "cve": "CVE-2019-9516", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741864" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker, sending a stream of header with a 0-length header name and a 0-length header value, could cause some implementations to allocate memory for these headers and keep the allocations alive until the session dies. The can consume excess memory, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: 0-length headers lead to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9516" }, { "category": "external", "summary": "RHBZ#1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9516", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9516" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://github.com/nghttp2/nghttp2/issues/1382#", "url": "https://github.com/nghttp2/nghttp2/issues/1382#" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "Red Hat AMQ" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: 0-length headers lead to denial of service" }, { "cve": "CVE-2019-9517", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741868" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in HTTP/2. An attacker can open a HTTP/2 window so the peer can send without constraint. The TCP window remains closed so the peer cannot write the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the server\u0027s queue is setup, the responses can consume excess memory, CPU, or both, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: request for large response leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "The package httpd versions as shipped with Red Hat Enterprise Linux 5, 6 and 7 are not affected by this issue as HTTP/2 support is not provided.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9517" }, { "category": "external", "summary": "RHBZ#1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9517", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9517" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" }, { "category": "workaround", "details": "The httpd version shipped with Red Hat Enterprise Linux 8 provides HTTP/2 support through mod_http2 package. While mod_http2 package is not updated, users can disable HTTP/2 support as mitigation action by executing the following steps:\n\n1. Stop httpd service:\n$ systemctl stop httpd\n\n2. Remove http/2 protocol support from configuration files:\n$ sed -i \u0027s/\\(h2\\)\\|\\(h2c\\)//g\u0027 \u003chttpd_config_file\u003e\n\n3. Validate configuration files to make sure all syntax is valid:\n$ apachectl configtest\n\n4. Restart httpd service:\n$ systemctl start httpd", "product_ids": [ "Red Hat AMQ" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: request for large response leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9518", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735749" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using frames with an empty payload, a flood could occur that results in excessive CPU usage and starvation of other clients. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using empty frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9518" }, { "category": "external", "summary": "RHBZ#1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9518", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: flood using empty frames results in excessive resource consumption" }, { "cve": "CVE-2019-10241", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2019-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1705924" } ], "notes": [ { "category": "description", "text": "In Eclipse Jetty version 9.2.26 and older, 9.3.25 and older, and 9.4.15 and older, the server is vulnerable to XSS conditions if a remote client USES a specially formatted URL against the DefaultServlet or ResourceHandler that is configured for showing a Listing of directory contents.", "title": "Vulnerability description" }, { "category": "summary", "text": "jetty: using specially formatted URL against DefaultServlet or ResourceHandler leads to XSS conditions", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of jetty which is embedded in the nutch package as shipped with Red Hat Satellite 5. The jetty server is not exposed, as such exploitation is difficult, Red Hat Product Security has rated this issue as having security impact of Low in the context of Red Hat Satellite 5. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10241" }, { "category": "external", "summary": "RHBZ#1705924", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705924" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10241", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10241" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10241", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10241" } ], "release_date": "2019-04-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jetty: using specially formatted URL against DefaultServlet or ResourceHandler leads to XSS conditions" }, { "cve": "CVE-2019-10247", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1705993" } ], "notes": [ { "category": "description", "text": "In Eclipse Jetty version 7.x, 8.x, 9.2.27 and older, 9.3.26 and older, and 9.4.16 and older, the server running on any OS and Jetty version combination will reveal the configured fully qualified directory base resource location on the output of the 404 error for not finding a Context that matches the requested path. The default server behavior on jetty-distribution and jetty-home will include at the end of the Handler tree a DefaultHandler, which is responsible for reporting this 404 error, it presents the various configured contexts as HTML for users to click through to. This produced HTML includes output that contains the configured fully qualified directory base resource location for each context.", "title": "Vulnerability description" }, { "category": "summary", "text": "jetty: error path information disclosure", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of jetty which is embedded in the nutch package as shipped with Red Hat Satellite 5. The jetty server is not exposed, as such exploitation is difficult, Red Hat Product Security has rated this issue as having security impact of Low in the context of Red Hat Satellite 5. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10247" }, { "category": "external", "summary": "RHBZ#1705993", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705993" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10247", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10247" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10247", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10247" } ], "release_date": "2019-04-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "jetty: error path information disclosure" }, { "cve": "CVE-2019-16869", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2019-09-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1758619" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty, where whitespace before the colon in HTTP headers is mishandled. This flaw allows an attacker to cause HTTP request smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that this vulnerability does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships vulnerable netty version embedded in Candlepin, however, is not directly vulnerable since HTTP requests are handled by Tomcat and not netty.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-16869" }, { "category": "external", "summary": "RHBZ#1758619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758619" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16869", "url": "https://www.cve.org/CVERecord?id=CVE-2019-16869" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16869", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16869" } ], "release_date": "2019-09-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat AMQ" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers" }, { "cve": "CVE-2019-20444", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1798524" } ], "notes": [ { "category": "description", "text": "A HTTP smuggling flaw was found in HttpObjectDecoder.java in Netty in versions prior to version 4.1.44. HTTP headers with an invalid fold, in this case CRLF (carriage return, line feed) without being followed by SP (space) or HTAB (horizontal tab), result in situations where headers can be misread. Data integrity is the highest threat with this vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP request smuggling", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that the previous vulnerability, CVE-2019-16869, does not pose a substantial practical threat to ElasticSearch 6. We agree that these issues would be difficult to exploit on OpenShift Container Platform so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships a vulnerable version of netty embedded in Candlepin. However, the flaw can not be triggered in that context, because HTTP requests are handled by Tomcat, not by netty. A future release may fix this.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20444" }, { "category": "external", "summary": "RHBZ#1798524", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798524" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20444", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20444" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20444", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20444" }, { "category": "external", "summary": "https://github.com/elastic/elasticsearch/issues/49396", "url": "https://github.com/elastic/elasticsearch/issues/49396" } ], "release_date": "2020-01-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat AMQ" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP request smuggling" }, { "cve": "CVE-2019-20445", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1798509" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty before version 4.1.44, where it accepted multiple Content-Length headers and also accepted both Transfer-Encoding, as well as Content-Length headers where it should reject the message under such circumstances. In circumstances where Netty is used in the context of a server, it could result in a viable HTTP smuggling vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that the previous vulnerability, CVE-2019-16869, does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit both these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships a vulnerable version of netty embedded in Candlepin. However, the flaw can not be triggered in that context, because HTTP requests are handled by Tomcat, not by netty. A future release may fix this.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20445" }, { "category": "external", "summary": "RHBZ#1798509", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798509" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20445", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20445" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20445", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20445" } ], "release_date": "2020-01-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat AMQ" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header" }, { "cve": "CVE-2020-7238", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1796225" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty, where it mishandles Transfer-Encoding whitespace. This flaw allows HTTP Request Smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that the previous vulnerability, CVE-2019-16869, does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit both these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships vulnerable netty version embedded in Candlepin, however, is not directly vulnerable since HTTP requests are handled by Tomcat and not netty.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-7238" }, { "category": "external", "summary": "RHBZ#1796225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796225" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-7238", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7238" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7238", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7238" }, { "category": "external", "summary": "https://netty.io/news/2019/12/18/4-1-44-Final.html", "url": "https://netty.io/news/2019/12/18/4-1-44-Final.html" } ], "release_date": "2020-01-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat AMQ" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling" } ] }
rhsa-2020:0727
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for Red Hat Data Grid is now available.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Data Grid is a distributed, in-memory, NoSQL datastore based on the Infinispan project.\n\nThis release of Red Hat Data Grid 7.3.3 serves as a replacement for Red Hat Data Grid 7.3.2 and includes bug fixes and enhancements, which are described in the Release Notes, linked to in the References section of this erratum.\n\nSecurity Fix(es):\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)\n\n* xstream: remote code execution due to insecure XML deserialization (regression of CVE-2013-7285) (CVE-2019-10173)\n\n* infinispan: invokeAccessibly method from ReflectionUtil class allows to invoke private methods (CVE-2019-10174)\n\n* jackson-databind: default typing mishandling leading to remote code execution (CVE-2019-14379)\n\n* h2: Information Exposure due to insecure handling of permissions in the backup (CVE-2018-14335)\n\n* wildfly: Race condition on PID file allows for termination of arbitrary processes by local users (CVE-2019-3805)\n\n* undertow: leak credentials to log files UndertowLogger.REQUEST_LOGGER.undertowRequestFailed (CVE-2019-3888)\n\n* undertow: DEBUG log for io.undertow.request.security if enabled leaks credentials to log files (CVE-2019-10212)\n\n* undertow: Information leak in requests for directories without trailing slashes (CVE-2019-10184)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:0727", "url": "https://access.redhat.com/errata/RHSA-2020:0727" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=data.grid\u0026downloadType=patches\u0026version=7.3", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=data.grid\u0026downloadType=patches\u0026version=7.3" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_data_grid/7.3/html-single/red_hat_data_grid_7.3_release_notes/index", "url": "https://access.redhat.com/documentation/en-us/red_hat_data_grid/7.3/html-single/red_hat_data_grid_7.3_release_notes/index" }, { "category": "external", "summary": "1610877", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1610877" }, { "category": "external", "summary": "1660263", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1660263" }, { "category": "external", "summary": "1693777", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1693777" }, { "category": "external", "summary": "1703469", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1703469" }, { "category": "external", "summary": "1713068", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1713068" }, { "category": "external", "summary": "1722971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1722971" }, { "category": "external", "summary": "1731984", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1731984" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "1737517", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1737517" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_0727.json" } ], "title": "Red Hat Security Advisory: Red Hat Data Grid 7.3.3 security update", "tracking": { "current_release_date": "2025-04-09T17:27:23+00:00", "generator": { "date": "2025-04-09T17:27:23+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.2" } }, "id": "RHSA-2020:0727", "initial_release_date": "2020-03-05T12:53:27+00:00", "revision_history": [ { "date": "2020-03-05T12:53:27+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-03-05T12:53:27+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-04-09T17:27:23+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Data Grid 7.3.3", "product": { "name": "Red Hat Data Grid 7.3.3", "product_id": "Red Hat Data Grid 7.3.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_data_grid:7.3" } } } ], "category": "product_family", "name": "Red Hat JBoss Data Grid" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-14335", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1610877" } ], "notes": [ { "category": "description", "text": "An issue was discovered in H2 1.4.197. Insecure handling of permissions in the backup function allows attackers to read sensitive files (outside of their permissions) via a symlink to a fake database file.", "title": "Vulnerability description" }, { "category": "summary", "text": "h2: Information Exposure due to insecure handling of permissions in the backup", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Data Grid 7.3.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-14335" }, { "category": "external", "summary": "RHBZ#1610877", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1610877" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-14335", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14335" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14335", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14335" } ], "release_date": "2018-07-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-05T12:53:27+00:00", "details": "To install this update, do the following:\n\n1. Download the Data Grid 7.3.3 server patch from the customer portal.\n2. Back up your existing Data Grid installation. You should back up databases, configuration files, and so on.\n3. Install the Data Grid 7.3.3 server patch. Refer to the 7.3 Release Notes for patching instructions.\n4. Restart Data Grid to ensure the changes take effect.", "product_ids": [ "Red Hat Data Grid 7.3.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0727" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat Data Grid 7.3.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "h2: Information Exposure due to insecure handling of permissions in the backup" }, { "acknowledgments": [ { "names": [ "Daniel Le Gall" ], "organization": "SCRT Information Security" } ], "cve": "CVE-2019-3805", "cwe": { "id": "CWE-364", "name": "Signal Handler Race Condition" }, "discovery_date": "2018-11-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1660263" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in wildfly that would allow local users, who are able to execute init.d script, to terminate arbitrary processes on the system. An attacker could exploit this by modifying the PID file in /var/run/jboss-eap/ allowing the init.d script to terminate any process as root.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly: Race condition on PID file allows for termination of arbitrary processes by local users", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Data Grid 7.3.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-3805" }, { "category": "external", "summary": "RHBZ#1660263", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1660263" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-3805", "url": "https://www.cve.org/CVERecord?id=CVE-2019-3805" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3805", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3805" } ], "release_date": "2019-04-30T17:12:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-05T12:53:27+00:00", "details": "To install this update, do the following:\n\n1. Download the Data Grid 7.3.3 server patch from the customer portal.\n2. Back up your existing Data Grid installation. You should back up databases, configuration files, and so on.\n3. Install the Data Grid 7.3.3 server patch. Refer to the 7.3 Release Notes for patching instructions.\n4. Restart Data Grid to ensure the changes take effect.", "product_ids": [ "Red Hat Data Grid 7.3.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0727" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Data Grid 7.3.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wildfly: Race condition on PID file allows for termination of arbitrary processes by local users" }, { "acknowledgments": [ { "names": [ "Carter Kozak" ] } ], "cve": "CVE-2019-3888", "cwe": { "id": "CWE-532", "name": "Insertion of Sensitive Information into Log File" }, "discovery_date": "2019-03-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1693777" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Undertow web server before 2.0.21. An information exposure of plain text credentials through log files because Connectors.executeRootHandler:402 logs the HttpServerExchange object at ERROR level using UndertowLogger.REQUEST_LOGGER.undertowRequestFailed(t, exchange)", "title": "Vulnerability description" }, { "category": "summary", "text": "undertow: leak credentials to log files UndertowLogger.REQUEST_LOGGER.undertowRequestFailed", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Data Grid 7.3.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-3888" }, { "category": "external", "summary": "RHBZ#1693777", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1693777" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-3888", "url": "https://www.cve.org/CVERecord?id=CVE-2019-3888" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3888", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3888" } ], "release_date": "2019-06-10T15:13:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-05T12:53:27+00:00", "details": "To install this update, do the following:\n\n1. Download the Data Grid 7.3.3 server patch from the customer portal.\n2. Back up your existing Data Grid installation. You should back up databases, configuration files, and so on.\n3. Install the Data Grid 7.3.3 server patch. Refer to the 7.3 Release Notes for patching instructions.\n4. Restart Data Grid to ensure the changes take effect.", "product_ids": [ "Red Hat Data Grid 7.3.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0727" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat Data Grid 7.3.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "undertow: leak credentials to log files UndertowLogger.REQUEST_LOGGER.undertowRequestFailed" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Data Grid 7.3.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-05T12:53:27+00:00", "details": "To install this update, do the following:\n\n1. Download the Data Grid 7.3.3 server patch from the customer portal.\n2. Back up your existing Data Grid installation. You should back up databases, configuration files, and so on.\n3. Install the Data Grid 7.3.3 server patch. Refer to the 7.3 Release Notes for patching instructions.\n4. Restart Data Grid to ensure the changes take effect.", "product_ids": [ "Red Hat Data Grid 7.3.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0727" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Data Grid 7.3.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Data Grid 7.3.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-05T12:53:27+00:00", "details": "To install this update, do the following:\n\n1. Download the Data Grid 7.3.3 server patch from the customer portal.\n2. Back up your existing Data Grid installation. You should back up databases, configuration files, and so on.\n3. Install the Data Grid 7.3.3 server patch. Refer to the 7.3 Release Notes for patching instructions.\n4. Restart Data Grid to ensure the changes take effect.", "product_ids": [ "Red Hat Data Grid 7.3.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0727" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Data Grid 7.3.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Data Grid 7.3.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-05T12:53:27+00:00", "details": "To install this update, do the following:\n\n1. Download the Data Grid 7.3.3 server patch from the customer portal.\n2. Back up your existing Data Grid installation. You should back up databases, configuration files, and so on.\n3. Install the Data Grid 7.3.3 server patch. Refer to the 7.3 Release Notes for patching instructions.\n4. Restart Data Grid to ensure the changes take effect.", "product_ids": [ "Red Hat Data Grid 7.3.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0727" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Data Grid 7.3.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9518", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735749" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using frames with an empty payload, a flood could occur that results in excessive CPU usage and starvation of other clients. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using empty frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Data Grid 7.3.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9518" }, { "category": "external", "summary": "RHBZ#1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9518", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-05T12:53:27+00:00", "details": "To install this update, do the following:\n\n1. Download the Data Grid 7.3.3 server patch from the customer portal.\n2. Back up your existing Data Grid installation. You should back up databases, configuration files, and so on.\n3. Install the Data Grid 7.3.3 server patch. Refer to the 7.3 Release Notes for patching instructions.\n4. Restart Data Grid to ensure the changes take effect.", "product_ids": [ "Red Hat Data Grid 7.3.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0727" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Data Grid 7.3.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using empty frames results in excessive resource consumption" }, { "cve": "CVE-2019-10173", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "discovery_date": "2019-06-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1722971" } ], "notes": [ { "category": "description", "text": "It was found that xstream API version 1.4.10 introduced a regression for a previous deserialization flaw. If the security framework has not been initialized, it may allow a remote attacker to run arbitrary shell commands when unmarshalling XML or any supported format. This a regression of CVE-2013-7285 fixed in 1.4.7 (fixed) as of BPMS 6.0.1, the regression was introduced with xstream-1.4.10 implemented in RHPAM.", "title": "Vulnerability description" }, { "category": "summary", "text": "xstream: remote code execution due to insecure XML deserialization (regression of CVE-2013-7285)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Data Grid 7.3.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10173" }, { "category": "external", "summary": "RHBZ#1722971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1722971" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10173", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10173" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10173", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10173" }, { "category": "external", "summary": "http://x-stream.github.io/changes.html#1.4.11", "url": "http://x-stream.github.io/changes.html#1.4.11" } ], "release_date": "2018-10-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-05T12:53:27+00:00", "details": "To install this update, do the following:\n\n1. Download the Data Grid 7.3.3 server patch from the customer portal.\n2. Back up your existing Data Grid installation. You should back up databases, configuration files, and so on.\n3. Install the Data Grid 7.3.3 server patch. Refer to the 7.3 Release Notes for patching instructions.\n4. Restart Data Grid to ensure the changes take effect.", "product_ids": [ "Red Hat Data Grid 7.3.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0727" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat Data Grid 7.3.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xstream: remote code execution due to insecure XML deserialization (regression of CVE-2013-7285)" }, { "cve": "CVE-2019-10174", "cwe": { "id": "CWE-470", "name": "Use of Externally-Controlled Input to Select Classes or Code (\u0027Unsafe Reflection\u0027)" }, "discovery_date": "2018-10-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1703469" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Infinispan such that the invokeAccessibly method from the public class ReflectionUtil allows any application class to invoke private methods in any class with Infinispan\u0027s privileges. The attacker can use reflection to introduce new, malicious behavior into the application.", "title": "Vulnerability description" }, { "category": "summary", "text": "infinispan: invokeAccessibly method from ReflectionUtil class allows to invoke private methods", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform\u0027s OpenDaylight contains the vulnerable library. This library is a requirement of other dependencies (Karaf and Hibernate). Under supported deployments, the vulnerable functionality is not utilized. Based on this, no OpenDaylight versions will not be fixed.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Data Grid 7.3.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10174" }, { "category": "external", "summary": "RHBZ#1703469", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1703469" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10174", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10174" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10174", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10174" } ], "release_date": "2019-11-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-05T12:53:27+00:00", "details": "To install this update, do the following:\n\n1. Download the Data Grid 7.3.3 server patch from the customer portal.\n2. Back up your existing Data Grid installation. You should back up databases, configuration files, and so on.\n3. Install the Data Grid 7.3.3 server patch. Refer to the 7.3 Release Notes for patching instructions.\n4. Restart Data Grid to ensure the changes take effect.", "product_ids": [ "Red Hat Data Grid 7.3.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0727" }, { "category": "workaround", "details": "There is no known mitigation for this issue.", "product_ids": [ "Red Hat Data Grid 7.3.3" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat Data Grid 7.3.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "infinispan: invokeAccessibly method from ReflectionUtil class allows to invoke private methods" }, { "acknowledgments": [ { "names": [ "Christian Schl\u00fcter" ], "organization": "Viada" } ], "cve": "CVE-2019-10184", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "discovery_date": "2019-03-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1713068" } ], "notes": [ { "category": "description", "text": "undertow before version 2.0.23.Final is vulnerable to an information leak issue. Web apps may have their directory structures predicted through requests without trailing slashes via the api.", "title": "Vulnerability description" }, { "category": "summary", "text": "undertow: Information leak in requests for directories without trailing slashes", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Data Grid 7.3.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10184" }, { "category": "external", "summary": "RHBZ#1713068", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1713068" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10184", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10184" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10184", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10184" } ], "release_date": "2019-07-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-05T12:53:27+00:00", "details": "To install this update, do the following:\n\n1. Download the Data Grid 7.3.3 server patch from the customer portal.\n2. Back up your existing Data Grid installation. You should back up databases, configuration files, and so on.\n3. Install the Data Grid 7.3.3 server patch. Refer to the 7.3 Release Notes for patching instructions.\n4. Restart Data Grid to ensure the changes take effect.", "product_ids": [ "Red Hat Data Grid 7.3.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0727" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat Data Grid 7.3.3" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "undertow: Information leak in requests for directories without trailing slashes" }, { "cve": "CVE-2019-10212", "cwe": { "id": "CWE-532", "name": "Insertion of Sensitive Information into Log File" }, "discovery_date": "2019-07-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1731984" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Undertow DEBUG log for io.undertow.request.security. If enabled, an attacker could abuse this flaw to obtain the user\u2019s credentials from the log files.", "title": "Vulnerability description" }, { "category": "summary", "text": "undertow: DEBUG log for io.undertow.request.security if enabled leaks credentials to log files", "title": "Vulnerability summary" }, { "category": "other", "text": "All the Red Hat products using the undertow-core jar version 2.0.20 or before are affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Data Grid 7.3.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10212" }, { "category": "external", "summary": "RHBZ#1731984", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1731984" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10212", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10212" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10212", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10212" } ], "release_date": "2019-09-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-05T12:53:27+00:00", "details": "To install this update, do the following:\n\n1. Download the Data Grid 7.3.3 server patch from the customer portal.\n2. Back up your existing Data Grid installation. You should back up databases, configuration files, and so on.\n3. Install the Data Grid 7.3.3 server patch. Refer to the 7.3 Release Notes for patching instructions.\n4. Restart Data Grid to ensure the changes take effect.", "product_ids": [ "Red Hat Data Grid 7.3.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0727" }, { "category": "workaround", "details": "Use Elytron instead of legacy Security subsystem.", "product_ids": [ "Red Hat Data Grid 7.3.3" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat Data Grid 7.3.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "undertow: DEBUG log for io.undertow.request.security if enabled leaks credentials to log files" }, { "cve": "CVE-2019-14379", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-07-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1737517" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in FasterXML jackson-databind, where it would permit polymorphic deserialization of malicious objects using the ehcache and logback JNDI gadgets when used in conjunction with polymorphic type handling methods such as `enableDefaultTyping()` or when @JsonTypeInfo is using `Id.CLASS` or `Id.MINIMAL_CLASS` or in any other way which ObjectMapper.readValue might instantiate objects from unsafe sources. An attacker could use this flaw to execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: default typing mishandling leading to remote code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nSimilarly, Satellite 6 does not enable polymorphic unmarshmalling, which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Data Grid 7.3.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14379" }, { "category": "external", "summary": "RHBZ#1737517", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1737517" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14379", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14379" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14379", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14379" } ], "release_date": "2019-07-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-05T12:53:27+00:00", "details": "To install this update, do the following:\n\n1. Download the Data Grid 7.3.3 server patch from the customer portal.\n2. Back up your existing Data Grid installation. You should back up databases, configuration files, and so on.\n3. Install the Data Grid 7.3.3 server patch. Refer to the 7.3 Release Notes for patching instructions.\n4. Restart Data Grid to ensure the changes take effect.", "product_ids": [ "Red Hat Data Grid 7.3.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0727" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Data Grid 7.3.3" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat Data Grid 7.3.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: default typing mishandling leading to remote code execution" } ] }
rhsa-2024_5856
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "A security update is now available for Red Hat JBoss Enterprise Application Platform 7.1 for Red Hat Enterprise Linux 7.\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 7.1.7 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.1.6, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.1.7 Release Notes for information about the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* undertow: EAP: field-name is not parsed in accordance to RFC7230 [eap-7.1.z] (CVE-2020-1710)\n\n* commons-beanutils: apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default [eap-7.1.z] (CVE-2019-10086)\n\n* log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink [eap-7.1.z] (CVE-2022-23302)\n\n* jackson-databind: default typing mishandling leading to remote code execution [eap-7.1.z] (CVE-2019-14379)\n\n* undertow: HTTP/2: flood using HEADERS frames results in unbounded memory growth [eap-7.1.z] (CVE-2019-9514)\n\n* undertow: AJP File Read/Inclusion Vulnerability [eap-7.1.z] (CVE-2020-1745)\n\n* undertow: HTTP/2: large amount of data requests leads to denial of service [eap-7.1.z] (CVE-2019-9511)\n\n* undertow: servletPath in normalized incorrectly leading to dangerous application mapping which could result in security bypass [eap-7.1.z] (CVE-2020-1757)\n\n* undertow: possible Denial Of Service (DOS) in Undertow HTTP server listening on HTTPS [eap-7.1.z] (CVE-2019-14888)\n\n* log4j: Unsafe deserialization flaw in Chainsaw log viewer [eap-7.1.z] (CVE-2022-23307)\n\n* netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header [eap-7.1.z] (CVE-2019-20445)\n\n* log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender [eap-7.1.z] (CVE-2021-4104)\n\n* undertow: HTTP/2: flood using SETTINGS frames results in unbounded memory growth [eap-7.1.z] (CVE-2019-9515)\n\n* infinispan-core: infinispan: invokeAccessibly method from ReflectionUtil class allows to invoke private methods [eap-7.1.z] (CVE-2019-10174)\n\n* log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender [eap-7.1.z] (CVE-2022-23305)\n\n* jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution [eap-7.1.z] (CVE-2019-12384)\n\n* wildfly-security-manager: security manager authorization bypass (CVE-2019-14843)\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers (CVE-2019-16869)\n\n* jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.* (CVE-2019-17531)\n\n* netty: HTTP request smuggling (CVE-2019-20444)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:5856", "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.1", "url": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.1" }, { "category": "external", "summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.1/html-single/installation_guide/index", "url": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.1/html-single/installation_guide/index" }, { "category": "external", "summary": "1703469", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1703469" }, { "category": "external", "summary": "1725807", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1725807" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1737517", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1737517" }, { "category": "external", "summary": "1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "1752770", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752770" }, { "category": "external", "summary": "1752980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752980" }, { "category": "external", "summary": "1758619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758619" }, { "category": "external", "summary": "1767483", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767483" }, { "category": "external", "summary": "1772464", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772464" }, { "category": "external", "summary": "1775293", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775293" }, { "category": "external", "summary": "1793970", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793970" }, { "category": "external", "summary": "1798509", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798509" }, { "category": "external", "summary": "1798524", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798524" }, { "category": "external", "summary": "1807305", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1807305" }, { "category": "external", "summary": "2031667", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031667" }, { "category": "external", "summary": "2041949", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041949" }, { "category": "external", "summary": "2041959", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041959" }, { "category": "external", "summary": "2041967", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041967" }, { "category": "external", "summary": "JBEAP-24826", "url": "https://issues.redhat.com/browse/JBEAP-24826" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_5856.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.1.7 on RHEL 7 security update", "tracking": { "current_release_date": "2024-12-29T18:38:42+00:00", "generator": { "date": "2024-12-29T18:38:42+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.4" } }, "id": "RHSA-2024:5856", "initial_release_date": "2024-08-26T11:05:47+00:00", "revision_history": [ { "date": "2024-08-26T11:05:47+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-08-26T11:05:47+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-29T18:38:42+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product": { "name": "Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform_eus:7.1::el7" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" }, { "branches": [ { "category": "product_version", "name": "eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "product": { "name": "eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "product_id": "eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.ep7.el7?arch=src" } } }, { "category": "product_version", "name": "eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "product": { "name": "eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "product_id": "eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.ep7.el7?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "product": { "name": "eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "product_id": "eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.ep7.el7?arch=src" } } }, { "category": "product_version", "name": "eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "product": { "name": "eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "product_id": "eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00002.1.ep7.el7?arch=src" } } }, { "category": "product_version", "name": "eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "product": { "name": "eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "product_id": "eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.ep7.el7?arch=src" } } }, { "category": "product_version", "name": "eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "product": { "name": "eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "product_id": "eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00001.1.ep7.el7?arch=src" } } }, { "category": "product_version", "name": "eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "product": { "name": "eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "product_id": "eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00002.1.ep7.el7?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "product": { "name": "eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "product_id": "eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00002.1.ep7.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "product": { "name": "eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "product_id": "eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "product": { "name": "eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "product_id": "eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "product": { "name": "eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "product_id": "eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "product": { "name": "eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "product_id": "eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "product": { "name": "eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "product_id": "eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00002.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "product": { "name": "eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "product_id": "eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "product": { "name": "eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "product_id": "eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "product": { "name": "eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "product_id": "eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "product": { "name": "eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "product_id": "eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "product": { "name": "eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "product_id": "eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "product": { "name": "eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "product_id": "eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "product": { "name": "eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "product_id": "eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00001.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "product": { "name": "eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "product_id": "eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00002.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "product": { "name": "eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "product_id": "eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00002.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "product": { "name": "eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "product_id": "eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00002.1.ep7.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch" }, "product_reference": "eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src" }, "product_reference": "eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch" }, "product_reference": "eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src" }, "product_reference": "eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch" }, "product_reference": "eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch" }, "product_reference": "eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch" }, "product_reference": "eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch" }, "product_reference": "eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch" }, "product_reference": "eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch" }, "product_reference": "eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src" }, "product_reference": "eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch" }, "product_reference": "eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src" }, "product_reference": "eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch" }, "product_reference": "eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src" }, "product_reference": "eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch" }, "product_reference": "eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch" }, "product_reference": "eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src" }, "product_reference": "eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" }, "product_reference": "eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src" }, "product_reference": "eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch" }, "product_reference": "eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src" }, "product_reference": "eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" }, "product_reference": "eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-9511", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741860" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker can request a large amount of data by manipulating window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this queue can consume excess CPU, memory, or both, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: large amount of data requests leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "There are no mitigations available for nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "RHBZ#1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9511", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: large amount of data requests leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "cve": "CVE-2019-10086", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-10-31T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1767483" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Apache Commons BeanUtils, where the class property in PropertyUtilsBean is not suppressed by default. This flaw allows an attacker to access the classloader.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src" ], "known_not_affected": [ "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10086" }, { "category": "external", "summary": "RHBZ#1767483", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767483" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10086", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10086" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10086", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10086" }, { "category": "external", "summary": "https://commons.apache.org/proper/commons-beanutils/javadocs/v1.9.4/RELEASE-NOTES.txt", "url": "https://commons.apache.org/proper/commons-beanutils/javadocs/v1.9.4/RELEASE-NOTES.txt" } ], "release_date": "2019-08-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "category": "workaround", "details": "There is no currently known mitigation for this flaw.", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default" }, { "cve": "CVE-2019-10174", "cwe": { "id": "CWE-470", "name": "Use of Externally-Controlled Input to Select Classes or Code (\u0027Unsafe Reflection\u0027)" }, "discovery_date": "2018-10-25T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1703469" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Infinispan such that the invokeAccessibly method from the public class ReflectionUtil allows any application class to invoke private methods in any class with Infinispan\u0027s privileges. The attacker can use reflection to introduce new, malicious behavior into the application.", "title": "Vulnerability description" }, { "category": "summary", "text": "infinispan: invokeAccessibly method from ReflectionUtil class allows to invoke private methods", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform\u0027s OpenDaylight contains the vulnerable library. This library is a requirement of other dependencies (Karaf and Hibernate). Under supported deployments, the vulnerable functionality is not utilized. Based on this, no OpenDaylight versions will not be fixed.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch" ], "known_not_affected": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10174" }, { "category": "external", "summary": "RHBZ#1703469", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1703469" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10174", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10174" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10174", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10174" } ], "release_date": "2019-11-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "category": "workaround", "details": "There is no known mitigation for this issue.", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "infinispan: invokeAccessibly method from ReflectionUtil class allows to invoke private methods" }, { "cve": "CVE-2019-12384", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-06-25T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1725807" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in FasterXML jackson-databind in versions prior to 2.9.9. The vulnerability would permit polymorphic deserialization of malicious objects using the logback-core gadget when used in conjunction with polymorphic type handling methods such as `enableDefaultTyping()` or when @JsonTypeInfo is using `Id.CLASS` or `Id.MINIMAL_CLASS` or in any other way which ObjectMapper.readValue might instantiate objects from unsafe sources. Depending on the classpath content, remote code execution may be possible.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack\u0027s OpenDaylight does not use logback in any supported configuration. Therefore, the prerequisites for this vulnerability are not present and OpenDaylight is not affected.\n\nThis vulnerability relies on logback-core (ch.qos.logback.core) being present in the application\u0027s ClassPath. Logback-core is not packaged as an RPM for Red Hat Enterprise Linux or Red Hat Software Collections. Applications using jackson-databind that do not also use logback-core are not impacted by this vulnerability.\n\nThis issue affects the versions of jackson-databind bundled with candlepin as shipped with Red Hat Satellite 6.x. However the affected code is NOT used at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src" ], "known_not_affected": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-12384" }, { "category": "external", "summary": "RHBZ#1725807", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1725807" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-12384", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12384" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-12384", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12384" } ], "release_date": "2019-06-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution" }, { "cve": "CVE-2019-14379", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-07-29T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1737517" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in FasterXML jackson-databind, where it would permit polymorphic deserialization of malicious objects using the ehcache and logback JNDI gadgets when used in conjunction with polymorphic type handling methods such as `enableDefaultTyping()` or when @JsonTypeInfo is using `Id.CLASS` or `Id.MINIMAL_CLASS` or in any other way which ObjectMapper.readValue might instantiate objects from unsafe sources. An attacker could use this flaw to execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: default typing mishandling leading to remote code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nSimilarly, Satellite 6 does not enable polymorphic unmarshmalling, which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src" ], "known_not_affected": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14379" }, { "category": "external", "summary": "RHBZ#1737517", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1737517" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14379", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14379" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14379", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14379" } ], "release_date": "2019-07-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: default typing mishandling leading to remote code execution" }, { "cve": "CVE-2019-14843", "cwe": { "id": "CWE-592", "name": "CWE-592" }, "discovery_date": "2019-09-17T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1752980" } ], "notes": [ { "category": "description", "text": "A flaw was found in Wildfly Security Manager, running under JDK 11 or 8, that authorized requests for any requester. This flaw could be used by a malicious app deployed on the app server to access unauthorized information and possibly conduct further attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-security-manager: security manager authorization bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ], "known_not_affected": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14843" }, { "category": "external", "summary": "RHBZ#1752980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752980" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14843", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14843" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14843", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14843" } ], "release_date": "2019-09-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "category": "workaround", "details": "This flaw only affects the Security Manager running under JDK 11 or 8. To mitigate exposure to this flaw, do not run under those JDK versions.", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "wildfly-security-manager: security manager authorization bypass" }, { "acknowledgments": [ { "names": [ "Henning Baldersheim", "H\u00e5vard Pettersen" ], "organization": "Verizon Media" } ], "cve": "CVE-2019-14888", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-10-25T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1772464" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the Undertow HTTP server listening on HTTPS. An attacker can target the HTTPS port to carry out a Denial Of Service (DOS) to make the service unavailable on SSL.", "title": "Vulnerability description" }, { "category": "summary", "text": "undertow: possible Denial Of Service (DOS) in Undertow HTTP server listening on HTTPS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src" ], "known_not_affected": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14888" }, { "category": "external", "summary": "RHBZ#1772464", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772464" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14888", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14888" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14888", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14888" } ], "release_date": "2020-01-20T12:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "category": "workaround", "details": "Enable HTTP2 (enable-http2=\"true\") in the undertow\u0027s HTTPS settings.", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "undertow: possible Denial Of Service (DOS) in Undertow HTTP server listening on HTTPS" }, { "cve": "CVE-2019-16869", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2019-09-26T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1758619" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty, where whitespace before the colon in HTTP headers is mishandled. This flaw allows an attacker to cause HTTP request smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that this vulnerability does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships vulnerable netty version embedded in Candlepin, however, is not directly vulnerable since HTTP requests are handled by Tomcat and not netty.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch" ], "known_not_affected": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-16869" }, { "category": "external", "summary": "RHBZ#1758619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758619" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16869", "url": "https://www.cve.org/CVERecord?id=CVE-2019-16869" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16869", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16869" } ], "release_date": "2019-09-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers" }, { "cve": "CVE-2019-17531", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2019-11-21T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1775293" } ], "notes": [ { "category": "description", "text": "A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the apache-log4j-extra (version 1.2.x) jar in the classpath, and an attacker can provide a JNDI service to access, it is possible to make the service execute a malicious payload.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.*", "title": "Vulnerability summary" }, { "category": "other", "text": "Satellite 6 does not enable polymorphic unmarshmalling, which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenShift Container Platform does ship the vulnerable component, but does not enable the unsafe conditions needed to exploit, lowering their vulnerability impact.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src" ], "known_not_affected": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-17531" }, { "category": "external", "summary": "RHBZ#1775293", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775293" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-17531", "url": "https://www.cve.org/CVERecord?id=CVE-2019-17531" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-17531", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17531" } ], "release_date": "2019-10-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.*" }, { "cve": "CVE-2019-20444", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-30T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1798524" } ], "notes": [ { "category": "description", "text": "A HTTP smuggling flaw was found in HttpObjectDecoder.java in Netty in versions prior to version 4.1.44. HTTP headers with an invalid fold, in this case CRLF (carriage return, line feed) without being followed by SP (space) or HTAB (horizontal tab), result in situations where headers can be misread. Data integrity is the highest threat with this vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP request smuggling", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that the previous vulnerability, CVE-2019-16869, does not pose a substantial practical threat to ElasticSearch 6. We agree that these issues would be difficult to exploit on OpenShift Container Platform so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships a vulnerable version of netty embedded in Candlepin. However, the flaw can not be triggered in that context, because HTTP requests are handled by Tomcat, not by netty. A future release may fix this.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch" ], "known_not_affected": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20444" }, { "category": "external", "summary": "RHBZ#1798524", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798524" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20444", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20444" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20444", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20444" }, { "category": "external", "summary": "https://github.com/elastic/elasticsearch/issues/49396", "url": "https://github.com/elastic/elasticsearch/issues/49396" } ], "release_date": "2020-01-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP request smuggling" }, { "cve": "CVE-2019-20445", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-20T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1798509" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty before version 4.1.44, where it accepted multiple Content-Length headers and also accepted both Transfer-Encoding, as well as Content-Length headers where it should reject the message under such circumstances. In circumstances where Netty is used in the context of a server, it could result in a viable HTTP smuggling vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that the previous vulnerability, CVE-2019-16869, does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit both these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships a vulnerable version of netty embedded in Candlepin. However, the flaw can not be triggered in that context, because HTTP requests are handled by Tomcat, not by netty. A future release may fix this.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch" ], "known_not_affected": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20445" }, { "category": "external", "summary": "RHBZ#1798509", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798509" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20445", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20445" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20445", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20445" } ], "release_date": "2020-01-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header" }, { "cve": "CVE-2020-1710", "cwe": { "id": "CWE-113", "name": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)" }, "discovery_date": "2019-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1793970" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in JBoss EAP, where it does not process the header field-name in accordance with RFC7230. Whitespace between the header field-name and colon is processed, resulting in an HTTP response code of 200 instead of a bad request of 400.", "title": "Vulnerability description" }, { "category": "summary", "text": "EAP: field-name is not parsed in accordance to RFC7230", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-1710" }, { "category": "external", "summary": "RHBZ#1793970", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793970" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-1710", "url": "https://www.cve.org/CVERecord?id=CVE-2020-1710" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1710", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1710" } ], "release_date": "2020-08-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "category": "workaround", "details": "There is currently no known mitigation for this issue.", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "EAP: field-name is not parsed in accordance to RFC7230" }, { "acknowledgments": [ { "names": [ "Steve Zapantis", "Robert Roberson", "taktakdb4g" ] } ], "cve": "CVE-2020-1745", "cwe": { "id": "CWE-285", "name": "Improper Authorization" }, "discovery_date": "2020-02-24T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1807305" } ], "notes": [ { "category": "description", "text": "A file inclusion vulnerability was found in the AJP connector enabled with a default AJP configuration port of 8009 in Undertow version 2.0.29.Final and before. A remote, unauthenticated attacker could exploit this vulnerability to read web application files from a vulnerable server. In instances where the vulnerable server allows file uploads, an attacker could upload malicious JavaServer Pages (JSP) code within a variety of file types and trigger this vulnerability to gain remote code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "undertow: AJP File Read/Inclusion Vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "Please refer to the Red Hat knowledgebase article: https://access.redhat.com/solutions/4851251 and CVE page https://access.redhat.com/security/cve/cve-2020-1938", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src" ], "known_not_affected": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-1745" }, { "category": "external", "summary": "RHBZ#1807305", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1807305" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-1745", "url": "https://www.cve.org/CVERecord?id=CVE-2020-1745" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1745", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1745" }, { "category": "external", "summary": "https://meterpreter.org/cve-2020-1938-apache-tomcat-ajp-connector-remote-code-execution-vulnerability-alert/", "url": "https://meterpreter.org/cve-2020-1938-apache-tomcat-ajp-connector-remote-code-execution-vulnerability-alert/" }, { "category": "external", "summary": "https://www.cnvd.org.cn/webinfo/show/5415", "url": "https://www.cnvd.org.cn/webinfo/show/5415" }, { "category": "external", "summary": "https://www.tenable.com/blog/cve-2020-1938-ghostcat-apache-tomcat-ajp-file-readinclusion-vulnerability-cnvd-2020-10487", "url": "https://www.tenable.com/blog/cve-2020-1938-ghostcat-apache-tomcat-ajp-file-readinclusion-vulnerability-cnvd-2020-10487" } ], "release_date": "2020-02-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "category": "workaround", "details": "Please refer to the Red Hat knowledgebase article: https://access.redhat.com/solutions/4851251", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", "version": "3.1" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "undertow: AJP File Read/Inclusion Vulnerability" }, { "acknowledgments": [ { "names": [ "Fedorov Oleksii", "Keitaro Yamazaki", "Shiga Ryota" ], "organization": "LINE Corporation" } ], "cve": "CVE-2020-1757", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-09-09T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1752770" } ], "notes": [ { "category": "description", "text": "A flaw was found in Undertow, where the servlet container causes the servletPath to normalize incorrectly by truncating the path after the semicolon. The flaw may lead to application mapping, resulting in a security bypass.", "title": "Vulnerability description" }, { "category": "summary", "text": "undertow: servletPath is normalized incorrectly leading to dangerous application mapping which could result in security bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src" ], "known_not_affected": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-1757" }, { "category": "external", "summary": "RHBZ#1752770", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752770" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-1757", "url": "https://www.cve.org/CVERecord?id=CVE-2020-1757" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1757", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1757" } ], "release_date": "2018-12-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "category": "workaround", "details": "The issue can be mitigated by configuring UrlPathHelper to ignore the servletPath via setting \"alwaysUseFullPath\".", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "undertow: servletPath is normalized incorrectly leading to dangerous application mapping which could result in security bypass" }, { "cve": "CVE-2021-4104", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-12-13T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2031667" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Java logging library Apache Log4j in version 1.x. JMSAppender in Log4j 1.x is vulnerable to deserialization of untrusted data. This allows a remote attacker to execute code on the server if the deployed application is configured to use JMSAppender and to the attacker\u0027s JNDI LDAP endpoint.", "title": "Vulnerability description" }, { "category": "summary", "text": "log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender", "title": "Vulnerability summary" }, { "category": "other", "text": "Based on the conditions to be exploitable (see details below), the risk is much lower than Log4j 2.x and Red Hat has assessed this to be Moderate severity. This flaw has been filed for Log4j 1.x, and the corresponding flaw information for Log4j 2.x is available at: https://access.redhat.com/security/cve/CVE-2021-44228\n\nNote this flaw ONLY affects applications which are specifically configured to use JMSAppender, which is not the default, or when the attacker has write access to the Log4j configuration for adding JMSAppender to the attacker\u0027s JNDI LDAP endpoint. \n\nIf the Log4j configuration is set TopicBindingName or TopicConnectionFactoryBindingName configurations allowing JMSAppender to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-44228 Log4j 2.x, Log4j 1.x is vulnerable. However, the attack vector is reduced as it depends on having write access, which is not a standard configuration rather than untrusted user input. These are sufficient factors beyond the attacker\u0027s control.\n\nThe tomcat package shipped with Red Hat Enterprise Linux does not include log4j but it does include a default configuration for log4j, log4j.properties, which could be used with tomcat if users choose to install and configure the library. The JMSAppender is not enabled by default, and the permissions of the file can only be modified as root.\n\nRed Hat Virtualization ships log4j12-1.2.17, but it is used and configured in a way which makes this flaw not possible to exploit. Therefore impact is rated Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src" ], "known_not_affected": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-4104" }, { "category": "external", "summary": "RHBZ#2031667", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031667" }, { "category": "external", "summary": "RHSB-2021-009", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-009" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4104", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4104" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4104", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4104" }, { "category": "external", "summary": "https://github.com/apache/logging-log4j2/pull/608#issuecomment-990494126", "url": "https://github.com/apache/logging-log4j2/pull/608#issuecomment-990494126" }, { "category": "external", "summary": "https://github.com/apache/logging-log4j2/pull/608#issuecomment-991723301", "url": "https://github.com/apache/logging-log4j2/pull/608#issuecomment-991723301" }, { "category": "external", "summary": "https://lists.apache.org/thread/0x4zvtq92yggdgvwfgsftqrj4xx5w0nx", "url": "https://lists.apache.org/thread/0x4zvtq92yggdgvwfgsftqrj4xx5w0nx" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2021/12/13/1", "url": "https://www.openwall.com/lists/oss-security/2021/12/13/1" } ], "release_date": "2021-12-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "category": "workaround", "details": "These are the possible mitigations for this flaw for releases version 1.x:\n\n- Comment out or remove JMSAppender in the Log4j configuration if it is used\n- Remove the JMSAppender class from the classpath. For example:\n```\nzip -q -d log4j-*.jar org/apache/log4j/net/JMSAppender.class\n```\n- Restrict access for the OS user on the platform running the application to prevent modifying the Log4j configuration by the attacker.", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender" }, { "cve": "CVE-2022-23302", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2022-01-18T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2041949" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Java logging library Apache Log4j in version 1.x. JMSSink in Log4j 1.x is vulnerable to deserialization of untrusted data. This allows a remote attacker to execute code on the server if JMSSink is deployed and has been configured to perform JNDI requests.", "title": "Vulnerability description" }, { "category": "summary", "text": "log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink", "title": "Vulnerability summary" }, { "category": "other", "text": "Note this flaw ONLY affects applications which are specifically configured to use JMSSink, which is not the default, or when the attacker has write access to the Log4j configuration for adding JMSSink to the attacker\u0027s JNDI LDAP endpoint.\n\nRed Hat Satellite bundles log4j-over-slf4j with Candlepin, however, product is not affected as it uses logback framework for logging.\n\nRed Hat Virtualization and OpenShift Container Platform in the OCP Metering stack (the Hive/Presto/Hadoop components) ship a vulnerable version of the log4j package, however JMSSink is not used. Therefore the impact of this vulnerability for these products is rated Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src" ], "known_not_affected": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-23302" }, { "category": "external", "summary": "RHBZ#2041949", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041949" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23302", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23302" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23302", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23302" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2022/01/18/3", "url": "https://www.openwall.com/lists/oss-security/2022/01/18/3" } ], "release_date": "2022-01-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "category": "workaround", "details": "These are the possible mitigations for this flaw for releases version 1.x:\n\n- Comment out or remove JMSSink in the Log4j configuration if it is used\n- Remove the JMSSink class from the server\u0027s jar files. For example:\n```\nzip -q -d log4j-*.jar org/apache/log4j/net/JMSSink.class\n```\n- Restrict access for the OS user on the platform running the application to prevent modifying the Log4j configuration by the attacker.", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink" }, { "cve": "CVE-2022-23305", "cwe": { "id": "CWE-89", "name": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)" }, "discovery_date": "2022-01-18T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2041959" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Java logging library Apache Log4j in version 1.x. JDBCAppender in Log4j 1.x is vulnerable to SQL injection in untrusted data. This allows a remote attacker to run SQL statements in the database if the deployed application is configured to use JDBCAppender with certain interpolation tokens.", "title": "Vulnerability description" }, { "category": "summary", "text": "log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender", "title": "Vulnerability summary" }, { "category": "other", "text": "Note this issue only affects Log4j 1.x when specifically configured to use the JDBCAppender, which is not the default.\n\nRed Hat Satellite bundles log4j-over-slf4j with Candlepin, however, product is not affected as it uses logback framework for logging.\n\nRed Hat Virtualization and OpenShift Container Platform in the OCP Metering stack (the Hive/Presto/Hadoop components) ship a vulnerable version of the log4j package, however JDBCAppender is not used. Therefore the impact of this vulnerability for these products is rated Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src" ], "known_not_affected": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-23305" }, { "category": "external", "summary": "RHBZ#2041959", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041959" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23305", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23305" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23305", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23305" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2022/01/18/4", "url": "https://www.openwall.com/lists/oss-security/2022/01/18/4" } ], "release_date": "2022-01-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "category": "workaround", "details": "These are the possible mitigations for this flaw for releases version 1.x:\n\n- Comment out or remove JDBCAppender in the Log4j configuration if it is used\n- Remove the JDBCAppender class from the server\u0027s jar files. For example:\n```\nzip -q -d log4j-*.jar org/apache/log4j/jdbc/JDBCAppender.class\n```", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender" }, { "cve": "CVE-2022-23307", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2022-01-18T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2041967" } ], "notes": [ { "category": "description", "text": "A flaw was found in the log4j 1.x chainsaw component, where the contents of certain log entries are deserialized and possibly permit code execution. This flaw allows an attacker to send a malicious request with serialized data to the server to be deserialized when the chainsaw component is run.", "title": "Vulnerability description" }, { "category": "summary", "text": "log4j: Unsafe deserialization flaw in Chainsaw log viewer", "title": "Vulnerability summary" }, { "category": "other", "text": "Chainsaw is a standalone graphical user interface for viewing log entries in log4j. This flaw may be bypassed by using other available means to access log entries.\n\nRed Hat Satellite bundles log4j-over-slf4j with Candlepin, however, product is not affected as it uses logback framework for logging.\n\nRed Hat Virtualization ships a vulnerable version of the log4j package, however chainsaw is not part of typical use cases. An attacker looking to exploit this would need to not only be able to generate a malicious log entry, but also have the necessary access and permissions to start chainsaw on the engine node. Therefore the impact of this vulnerability for Red Hat Virtualization is rated Low.\n\nSimilar to Red Hat Virtualization in OpenShift Container Platform (OCP), the Hive/Presto/Hadoop components that comprise the OCP Metering stack, ship the vulnerable version of log4j package, however vulnerable chainsaw component is not used by default. Therefore the impact to OCP is reduced to Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src" ], "known_not_affected": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-23307" }, { "category": "external", "summary": "RHBZ#2041967", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041967" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23307", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23307" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23307", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23307" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2022/01/18/5", "url": "https://www.openwall.com/lists/oss-security/2022/01/18/5" } ], "release_date": "2022-01-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "category": "workaround", "details": "These are the mitigations available for this flaw for log4j 1.x:\n- Avoid using Chainsaw to view logs, and instead use some other utility, especially if there is a log view available within the product itself.\n- Remove the Chainsaw classes from the log4j jar files. For example:\n```\nzip -q -d log4j-*.jar org/apache/log4j/chainsaw/*\n```\n(log4j jars may be nested in zip archives within product)", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "log4j: Unsafe deserialization flaw in Chainsaw log viewer" } ] }
RHSA-2019:2939
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for rh-nodejs10-nodejs is now available for Red Hat Software Collections.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.\n\nThe following packages have been upgraded to a later upstream version: rh-nodejs10-nodejs (10.16.3).\n\nSecurity Fix(es):\n\n* HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511)\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using PRIORITY frames results in excessive resource consumption (CVE-2019-9513)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* HTTP/2: 0-length headers lead to denial of service (CVE-2019-9516)\n\n* HTTP/2: request for large response leads to denial of service (CVE-2019-9517)\n\n* HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:2939", "url": "https://access.redhat.com/errata/RHSA-2019:2939" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735741" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2939.json" } ], "title": "Red Hat Security Advisory: rh-nodejs10-nodejs security update", "tracking": { "current_release_date": "2025-03-17T01:36:58+00:00", "generator": { "date": "2025-03-17T01:36:58+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.1" } }, "id": "RHSA-2019:2939", "initial_release_date": "2019-10-01T10:03:49+00:00", "revision_history": [ { "date": "2019-10-01T10:03:49+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-10-01T10:03:49+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-03-17T01:36:58+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } } ], "category": "product_family", "name": "Red Hat Software Collections" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "product": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "product_id": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "product": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "product_id": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "product": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "product_id": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "product": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "product_id": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs10-0:3.2-3.el7.ppc64le", "product": { "name": "rh-nodejs10-0:3.2-3.el7.ppc64le", "product_id": "rh-nodejs10-0:3.2-3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "product": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "product_id": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "product": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "product_id": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "product": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "product_id": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "product": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "product_id": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "product": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "product_id": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "product": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "product_id": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs10-0:3.2-3.el7.s390x", "product": { "name": "rh-nodejs10-0:3.2-3.el7.s390x", "product_id": "rh-nodejs10-0:3.2-3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs10-runtime-0:3.2-3.el7.s390x", "product": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.s390x", "product_id": "rh-nodejs10-runtime-0:3.2-3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "product": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "product_id": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "product": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "product_id": "rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=aarch64" } } }, { "category": "product_version", "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "product": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "product_id": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=aarch64" } } }, { "category": "product_version", "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "product": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "product_id": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=aarch64" } } }, { "category": "product_version", "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "product": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "product_id": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=aarch64" } } }, { "category": "product_version", "name": "rh-nodejs10-0:3.2-3.el7.aarch64", "product": { "name": "rh-nodejs10-0:3.2-3.el7.aarch64", "product_id": "rh-nodejs10-0:3.2-3.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=aarch64" } } }, { "category": "product_version", "name": "rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "product": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "product_id": "rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=aarch64" } } }, { "category": "product_version", "name": "rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "product": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "product_id": "rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "product": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "product_id": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "rh-nodejs10-0:3.2-3.el7.src", "product": { "name": "rh-nodejs10-0:3.2-3.el7.src", "product_id": "rh-nodejs10-0:3.2-3.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "product": { "name": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "product_id": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "product": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "product_id": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "product": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "product_id": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "product": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "product_id": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "product": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "product_id": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs10-0:3.2-3.el7.x86_64", "product": { "name": "rh-nodejs10-0:3.2-3.el7.x86_64", "product_id": "rh-nodejs10-0:3.2-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "product": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "product_id": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "product": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "product_id": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.src", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch" }, "product_reference": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch" }, "product_reference": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch" }, "product_reference": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch" }, "product_reference": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch" }, "product_reference": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.src", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch" }, "product_reference": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-12121", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2018-11-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1661002" } ], "notes": [ { "category": "description", "text": "Node.js: All versions prior to Node.js 6.15.0, 8.14.0, 10.14.0 and 11.3.0: Denial of Service with large HTTP headers: By using a combination of many requests with maximum sized headers (almost 80 KB per connection), and carefully timed completion of the headers, it is possible to cause the HTTP server to abort from heap allocation failure. Attack potential is mitigated by the use of a load balancer or other proxy layer.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Denial of Service with large HTTP headers", "title": "Vulnerability summary" }, { "category": "other", "text": "The nodejs RPMs shipped in Red Hat OpenShift Container Platform (OCP) versions 3.6 through 3.10 are vulnerable to this flaw because they contain the affected code. Later versions of OCP used nodejs RPMs delivered from Red Hat Software Collections and Red Hat Enterprise Linux channels.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-12121" }, { "category": "external", "summary": "RHBZ#1661002", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1661002" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-12121", "url": "https://www.cve.org/CVERecord?id=CVE-2018-12121" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12121", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12121" } ], "release_date": "2018-11-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-01T10:03:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2939" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs: Denial of Service with large HTTP headers" }, { "cve": "CVE-2018-12122", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2018-11-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1661005" } ], "notes": [ { "category": "description", "text": "It was found that Node.js HTTP server was vulnerable to a Slowloris type attack. An attacker could make long lived connections by sending bytes very slowly to the server, saturating its resource and possibly resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Slowloris HTTP Denial of Service", "title": "Vulnerability summary" }, { "category": "other", "text": "The nodejs RPMs shipped in Red Hat OpenShift Container Platform (OCP) versions 3.6 through 3.10 are vulnerable to this flaw because they contain the affected code. Later versions of OCP used nodejs RPMs delivered from Red Hat Software Collections and Red Hat Enterprise Linux channels.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-12122" }, { "category": "external", "summary": "RHBZ#1661005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1661005" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-12122", "url": "https://www.cve.org/CVERecord?id=CVE-2018-12122" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12122", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12122" } ], "release_date": "2018-11-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-01T10:03:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2939" }, { "category": "workaround", "details": "The use of a Load Balancer or a Reverse Proxy will increase the difficulty of the attack.", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs: Slowloris HTTP Denial of Service" }, { "cve": "CVE-2018-12123", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2018-11-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1661010" } ], "notes": [ { "category": "description", "text": "Node.js: All versions prior to Node.js 6.15.0, 8.14.0, 10.14.0 and 11.3.0: Hostname spoofing in URL parser for javascript protocol: If a Node.js application is using url.parse() to determine the URL hostname, that hostname can be spoofed by using a mixed case \"javascript:\" (e.g. \"javAscript:\") protocol (other protocols are not affected). If security decisions are made about the URL based on the hostname, they may be incorrect.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Hostname spoofing in URL parser for javascript protocol", "title": "Vulnerability summary" }, { "category": "other", "text": "The nodejs RPMs shipped in Red Hat OpenShift Container Platform (OCP) versions 3.6 through 3.10 are vulnerable to this flaw because they contain the affected code. Later versions of OCP used nodejs RPMs delivered from Red Hat Software Collections and Red Hat Enterprise Linux channels.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-12123" }, { "category": "external", "summary": "RHBZ#1661010", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1661010" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-12123", "url": "https://www.cve.org/CVERecord?id=CVE-2018-12123" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12123", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12123" } ], "release_date": "2018-11-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-01T10:03:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2939" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs: Hostname spoofing in URL parser for javascript protocol" }, { "cve": "CVE-2019-5737", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-03-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1690808" } ], "notes": [ { "category": "description", "text": "It was found that the original fix for Slowloris, CVE-2018-12122, was insufficient. It is possible to bypass the server\u0027s headersTimeout by sending two specially crafted HTTP requests in the same connection. An attacker could use this flaw to bypass Slowloris protection, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Insufficient Slowloris fix causing DoS via server.headersTimeout bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-5737" }, { "category": "external", "summary": "RHBZ#1690808", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1690808" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-5737", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5737" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5737", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5737" }, { "category": "external", "summary": "https://nodejs.org/ja/blog/vulnerability/february-2019-security-releases/", "url": "https://nodejs.org/ja/blog/vulnerability/february-2019-security-releases/" } ], "release_date": "2019-02-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-01T10:03:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2939" }, { "category": "workaround", "details": "The use of a Load Balancer or a Reverse Proxy will increase the difficulty of the attack.", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs: Insufficient Slowloris fix causing DoS via server.headersTimeout bypass" }, { "cve": "CVE-2019-9511", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741860" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker can request a large amount of data by manipulating window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this queue can consume excess CPU, memory, or both, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: large amount of data requests leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "There are no mitigations available for nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "RHBZ#1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9511", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-01T10:03:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2939" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: large amount of data requests leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-01T10:03:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2939" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9513", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735741" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker, using PRIORITY frames to flood the system, could cause excessive CPU usage and starvation of other clients. The largest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PRIORITY frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for packages nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9513" }, { "category": "external", "summary": "RHBZ#1735741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735741" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9513", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9513" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9513", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9513" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nghttp2.org/blog/2019/08/19/nghttp2-v1-39-2/", "url": "https://nghttp2.org/blog/2019/08/19/nghttp2-v1-39-2/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-01T10:03:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2939" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PRIORITY frames results in excessive resource consumption" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-01T10:03:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2939" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-01T10:03:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2939" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "cve": "CVE-2019-9516", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741864" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker, sending a stream of header with a 0-length header name and a 0-length header value, could cause some implementations to allocate memory for these headers and keep the allocations alive until the session dies. The can consume excess memory, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: 0-length headers lead to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9516" }, { "category": "external", "summary": "RHBZ#1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9516", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9516" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://github.com/nghttp2/nghttp2/issues/1382#", "url": "https://github.com/nghttp2/nghttp2/issues/1382#" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-01T10:03:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2939" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: 0-length headers lead to denial of service" }, { "cve": "CVE-2019-9517", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741868" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in HTTP/2. An attacker can open a HTTP/2 window so the peer can send without constraint. The TCP window remains closed so the peer cannot write the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the server\u0027s queue is setup, the responses can consume excess memory, CPU, or both, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: request for large response leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "The package httpd versions as shipped with Red Hat Enterprise Linux 5, 6 and 7 are not affected by this issue as HTTP/2 support is not provided.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9517" }, { "category": "external", "summary": "RHBZ#1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9517", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9517" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-01T10:03:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2939" }, { "category": "workaround", "details": "The httpd version shipped with Red Hat Enterprise Linux 8 provides HTTP/2 support through mod_http2 package. While mod_http2 package is not updated, users can disable HTTP/2 support as mitigation action by executing the following steps:\n\n1. Stop httpd service:\n$ systemctl stop httpd\n\n2. Remove http/2 protocol support from configuration files:\n$ sed -i \u0027s/\\(h2\\)\\|\\(h2c\\)//g\u0027 \u003chttpd_config_file\u003e\n\n3. Validate configuration files to make sure all syntax is valid:\n$ apachectl configtest\n\n4. Restart httpd service:\n$ systemctl start httpd", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: request for large response leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9518", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735749" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using frames with an empty payload, a flood could occur that results in excessive CPU usage and starvation of other clients. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using empty frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9518" }, { "category": "external", "summary": "RHBZ#1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9518", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-01T10:03:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2939" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using empty frames results in excessive resource consumption" } ] }
RHSA-2019:4020
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat JBoss Enterprise Application Platform 7.2 for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime.\n\nThis release of Red Hat JBoss Enterprise Application Platform 7.2.5 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.2.4, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.2.5 Release Notes for information about the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* undertow: HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511)\n\n* undertow: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* undertow: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* undertow: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default (CVE-2019-14838)\n\n* wildfly: wildfly-security-manager: security manager authorization bypass (CVE-2019-14843)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:4020", "url": "https://access.redhat.com/errata/RHSA-2019:4020" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/", "url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/html-single/installation_guide/", "url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/html-single/installation_guide/" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "1751227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751227" }, { "category": "external", "summary": "1752980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752980" }, { "category": "external", "summary": "JBEAP-17075", "url": "https://issues.redhat.com/browse/JBEAP-17075" }, { "category": "external", "summary": "JBEAP-17220", "url": "https://issues.redhat.com/browse/JBEAP-17220" }, { "category": "external", "summary": "JBEAP-17365", "url": "https://issues.redhat.com/browse/JBEAP-17365" }, { "category": "external", "summary": "JBEAP-17476", "url": "https://issues.redhat.com/browse/JBEAP-17476" }, { "category": "external", "summary": "JBEAP-17478", "url": "https://issues.redhat.com/browse/JBEAP-17478" }, { "category": "external", "summary": "JBEAP-17483", "url": "https://issues.redhat.com/browse/JBEAP-17483" }, { "category": "external", "summary": "JBEAP-17495", "url": "https://issues.redhat.com/browse/JBEAP-17495" }, { "category": "external", "summary": "JBEAP-17496", "url": "https://issues.redhat.com/browse/JBEAP-17496" }, { "category": "external", "summary": "JBEAP-17513", "url": "https://issues.redhat.com/browse/JBEAP-17513" }, { "category": "external", "summary": "JBEAP-17521", "url": "https://issues.redhat.com/browse/JBEAP-17521" }, { "category": "external", "summary": "JBEAP-17523", "url": "https://issues.redhat.com/browse/JBEAP-17523" }, { "category": "external", "summary": "JBEAP-17547", "url": "https://issues.redhat.com/browse/JBEAP-17547" }, { "category": "external", "summary": "JBEAP-17548", "url": "https://issues.redhat.com/browse/JBEAP-17548" }, { "category": "external", "summary": "JBEAP-17560", "url": "https://issues.redhat.com/browse/JBEAP-17560" }, { "category": "external", "summary": "JBEAP-17579", "url": "https://issues.redhat.com/browse/JBEAP-17579" }, { "category": "external", "summary": "JBEAP-17582", "url": "https://issues.redhat.com/browse/JBEAP-17582" }, { "category": "external", "summary": "JBEAP-17605", "url": "https://issues.redhat.com/browse/JBEAP-17605" }, { "category": "external", "summary": "JBEAP-17631", "url": "https://issues.redhat.com/browse/JBEAP-17631" }, { "category": "external", "summary": "JBEAP-17647", "url": "https://issues.redhat.com/browse/JBEAP-17647" }, { "category": "external", "summary": "JBEAP-17665", "url": "https://issues.redhat.com/browse/JBEAP-17665" }, { "category": "external", "summary": "JBEAP-17722", "url": "https://issues.redhat.com/browse/JBEAP-17722" }, { "category": "external", "summary": "JBEAP-17874", "url": "https://issues.redhat.com/browse/JBEAP-17874" }, { "category": "external", "summary": "JBEAP-17880", "url": "https://issues.redhat.com/browse/JBEAP-17880" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_4020.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 8 security update", "tracking": { "current_release_date": "2025-03-15T19:44:28+00:00", "generator": { "date": "2025-03-15T19:44:28+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.1" } }, "id": "RHSA-2019:4020", "initial_release_date": "2019-11-26T19:57:14+00:00", "revision_history": [ { "date": "2019-11-26T19:57:14+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-11-26T19:57:14+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-03-15T19:44:28+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss EAP 7.2 for RHEL 8", "product": { "name": "Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el8" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" }, { "branches": [ { "category": "product_version", "name": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "product": { "name": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "product_id": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00005.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "product": { "name": "eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "product_id": "eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00005.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "product_id": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "product_id": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "product_id": "eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "product_id": "eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "product_id": "eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "product": { "name": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "product_id": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00003.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "product": { "name": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "product_id": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00002.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product": { "name": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product_id": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product": { "name": "eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product_id": "eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product": { "name": "eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product_id": "eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product": { "name": "eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product_id": "eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product": { "name": "eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product_id": "eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product": { "name": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product_id": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product": { "name": "eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product_id": "eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product": { "name": "eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product_id": "eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product": { "name": "eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product_id": "eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product": { "name": "eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product_id": "eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "product_id": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "product_id": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "product": { "name": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "product_id": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00002.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "product": { "name": "eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "product_id": "eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00002.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "product": { "name": "eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "product_id": "eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00002.1.el8eap?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "product": { "name": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "product_id": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00005.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "product": { "name": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "product_id": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "product": { "name": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "product_id": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "product": { "name": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "product_id": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00003.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "product": { "name": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "product_id": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00002.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "product": { "name": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "product_id": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "product": { "name": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "product_id": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "product": { "name": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "product_id": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "product": { "name": "eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "product_id": "eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "product": { "name": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "product_id": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "product": { "name": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "product_id": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "product": { "name": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "product_id": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "product": { "name": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "product_id": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "product": { "name": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "product_id": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "product": { "name": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "product_id": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "product": { "name": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "product_id": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "product": { "name": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "product_id": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "product": { "name": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "product_id": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src", "product": { "name": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src", "product_id": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "product": { "name": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "product_id": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "product": { "name": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "product_id": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "product": { "name": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "product_id": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00002.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "product": { "name": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "product_id": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "product": { "name": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "product_id": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=x86_64" } } }, { "category": "product_version", "name": "eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "product": { "name": "eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "product_id": "eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src" }, "product_reference": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch" }, "product_reference": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src" }, "product_reference": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch" }, "product_reference": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src" }, "product_reference": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src" }, "product_reference": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src" }, "product_reference": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src" }, "product_reference": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src" }, "product_reference": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src" }, "product_reference": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src" }, "product_reference": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src" }, "product_reference": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src" }, "product_reference": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch" }, "product_reference": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src" }, "product_reference": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch" }, "product_reference": "eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch" }, "product_reference": "eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch" }, "product_reference": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src" }, "product_reference": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch" }, "product_reference": "eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch" }, "product_reference": "eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch" }, "product_reference": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src" }, "product_reference": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch" }, "product_reference": "eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch" }, "product_reference": "eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch" }, "product_reference": "eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch" }, "product_reference": "eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch" }, "product_reference": "eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src" }, "product_reference": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src" }, "product_reference": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch" }, "product_reference": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src" }, "product_reference": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src" }, "product_reference": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src" }, "product_reference": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src" }, "product_reference": "eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch" }, "product_reference": "eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch" }, "product_reference": "eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src" }, "product_reference": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src" }, "product_reference": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64 as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64" }, "product_reference": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64 as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64" }, "product_reference": "eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" }, "product_reference": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-9511", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741860" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker can request a large amount of data by manipulating window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this queue can consume excess CPU, memory, or both, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: large amount of data requests leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "There are no mitigations available for nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "RHBZ#1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9511", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T19:57:14+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied.\n\nFor details about how to apply this update, see:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4020" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: large amount of data requests leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T19:57:14+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied.\n\nFor details about how to apply this update, see:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4020" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T19:57:14+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied.\n\nFor details about how to apply this update, see:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4020" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T19:57:14+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied.\n\nFor details about how to apply this update, see:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4020" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "F\u00e1bio Magalh\u00e3es de Andrade" ], "organization": "Sonda Ativas" }, { "names": [ "Juliano de Castro Santos", "Leonard Lunardi" ], "organization": "UnimedBH" } ], "cve": "CVE-2019-14838", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2019-08-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1751227" } ], "notes": [ { "category": "description", "text": "It was found that Wildfly users had default user permissions set incorrectly. A malicious user could use this flaw to access unauthorized controls for the application server.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14838" }, { "category": "external", "summary": "RHBZ#1751227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751227" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14838", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14838" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14838", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14838" }, { "category": "external", "summary": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14838", "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14838" } ], "release_date": "2019-10-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T19:57:14+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied.\n\nFor details about how to apply this update, see:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4020" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default" }, { "cve": "CVE-2019-14843", "cwe": { "id": "CWE-592", "name": "CWE-592" }, "discovery_date": "2019-09-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1752980" } ], "notes": [ { "category": "description", "text": "A flaw was found in Wildfly Security Manager, running under JDK 11 or 8, that authorized requests for any requester. This flaw could be used by a malicious app deployed on the app server to access unauthorized information and possibly conduct further attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-security-manager: security manager authorization bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14843" }, { "category": "external", "summary": "RHBZ#1752980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752980" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14843", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14843" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14843", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14843" } ], "release_date": "2019-09-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T19:57:14+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied.\n\nFor details about how to apply this update, see:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4020" }, { "category": "workaround", "details": "This flaw only affects the Security Manager running under JDK 11 or 8. To mitigate exposure to this flaw, do not run under those JDK versions.", "product_ids": [ "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "wildfly-security-manager: security manager authorization bypass" } ] }
rhsa-2019_2726
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the go-toolset:rhel8 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.\n\nSecurity Fix(es):\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Failure trying to conntect to image registry using TLS when buildah is compiled with FIPS mode (BZ#1743169)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:2726", "url": "https://access.redhat.com/errata/RHSA-2019:2726" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1743169", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1743169" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2726.json" } ], "title": "Red Hat Security Advisory: go-toolset:rhel8 security and bug fix update", "tracking": { "current_release_date": "2024-11-13T22:08:47+00:00", "generator": { "date": "2024-11-13T22:08:47+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2019:2726", "initial_release_date": "2019-09-12T12:29:22+00:00", "revision_history": [ { "date": "2019-09-12T12:29:22+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-09-12T12:29:22+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-13T22:08:47+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "go-toolset:rhel8:8000120190828225436:14bc675c", "product": { "name": "go-toolset:rhel8:8000120190828225436:14bc675c", "product_id": "go-toolset:rhel8:8000120190828225436:14bc675c", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/go-toolset@rhel8:8000120190828225436:14bc675c" } } }, { "category": "product_version", "name": "golang-docs-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "product": { "name": "golang-docs-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "product_id": "golang-docs-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.1%2B4087%2Bd8180914?arch=noarch" } } }, { "category": "product_version", "name": "golang-misc-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "product": { "name": "golang-misc-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "product_id": "golang-misc-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.1%2B4087%2Bd8180914?arch=noarch" } } }, { "category": "product_version", "name": "golang-src-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "product": { "name": "golang-src-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "product_id": "golang-src-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.1%2B4087%2Bd8180914?arch=noarch" } } }, { "category": "product_version", "name": "golang-tests-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "product": { "name": "golang-tests-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "product_id": "golang-tests-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.1%2B4087%2Bd8180914?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.src", "product": { "name": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.src", "product_id": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.1%2B4087%2Bd8180914?arch=src" } } }, { "category": "product_version", "name": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.src", "product": { "name": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.src", "product_id": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.1%2B4087%2Bd8180914?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.x86_64", "product": { "name": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.x86_64", "product_id": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.1%2B4087%2Bd8180914?arch=x86_64" } } }, { "category": "product_version", "name": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "product": { "name": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "product_id": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.1%2B4087%2Bd8180914?arch=x86_64" } } }, { "category": "product_version", "name": "golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "product": { "name": "golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "product_id": "golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.1%2B4087%2Bd8180914?arch=x86_64" } } }, { "category": "product_version", "name": "golang-race-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "product": { "name": "golang-race-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "product_id": "golang-race-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.1%2B4087%2Bd8180914?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.s390x", "product": { "name": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.s390x", "product_id": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.1%2B4087%2Bd8180914?arch=s390x" } } }, { "category": "product_version", "name": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x", "product": { "name": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x", "product_id": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.1%2B4087%2Bd8180914?arch=s390x" } } }, { "category": "product_version", "name": "golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x", "product": { "name": "golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x", "product_id": "golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.1%2B4087%2Bd8180914?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.ppc64le", "product": { "name": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.ppc64le", "product_id": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.1%2B4087%2Bd8180914?arch=ppc64le" } } }, { "category": "product_version", "name": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le", "product": { "name": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le", "product_id": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.1%2B4087%2Bd8180914?arch=ppc64le" } } }, { "category": "product_version", "name": "golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le", "product": { "name": "golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le", "product_id": "golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.1%2B4087%2Bd8180914?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.aarch64", "product": { "name": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.aarch64", "product_id": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.1%2B4087%2Bd8180914?arch=aarch64" } } }, { "category": "product_version", "name": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64", "product": { "name": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64", "product_id": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.1%2B4087%2Bd8180914?arch=aarch64" } } }, { "category": "product_version", "name": "golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64", "product": { "name": "golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64", "product_id": "golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.1%2B4087%2Bd8180914?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "go-toolset:rhel8:8000120190828225436:14bc675c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c" }, "product_reference": "go-toolset:rhel8:8000120190828225436:14bc675c", "relates_to_product_reference": "AppStream-8.0.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.aarch64 as a component of go-toolset:rhel8:8000120190828225436:14bc675c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.aarch64" }, "product_reference": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.aarch64", "relates_to_product_reference": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.ppc64le as a component of go-toolset:rhel8:8000120190828225436:14bc675c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.ppc64le" }, "product_reference": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.ppc64le", "relates_to_product_reference": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.s390x as a component of go-toolset:rhel8:8000120190828225436:14bc675c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.s390x" }, "product_reference": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.s390x", "relates_to_product_reference": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.src as a component of go-toolset:rhel8:8000120190828225436:14bc675c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.src" }, "product_reference": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.src", "relates_to_product_reference": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.x86_64 as a component of go-toolset:rhel8:8000120190828225436:14bc675c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.x86_64" }, "product_reference": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.x86_64", "relates_to_product_reference": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64 as a component of go-toolset:rhel8:8000120190828225436:14bc675c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64" }, "product_reference": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64", "relates_to_product_reference": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le as a component of go-toolset:rhel8:8000120190828225436:14bc675c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le" }, "product_reference": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le", "relates_to_product_reference": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x as a component of go-toolset:rhel8:8000120190828225436:14bc675c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x" }, "product_reference": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x", "relates_to_product_reference": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.src as a component of go-toolset:rhel8:8000120190828225436:14bc675c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.src" }, "product_reference": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.src", "relates_to_product_reference": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64 as a component of go-toolset:rhel8:8000120190828225436:14bc675c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64" }, "product_reference": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "relates_to_product_reference": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64 as a component of go-toolset:rhel8:8000120190828225436:14bc675c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64" }, "product_reference": "golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64", "relates_to_product_reference": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le as a component of go-toolset:rhel8:8000120190828225436:14bc675c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le" }, "product_reference": "golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le", "relates_to_product_reference": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x as a component of go-toolset:rhel8:8000120190828225436:14bc675c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x" }, "product_reference": "golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x", "relates_to_product_reference": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64 as a component of go-toolset:rhel8:8000120190828225436:14bc675c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64" }, "product_reference": "golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "relates_to_product_reference": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c" }, { "category": "default_component_of", "full_product_name": { "name": "golang-docs-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch as a component of go-toolset:rhel8:8000120190828225436:14bc675c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-docs-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch" }, "product_reference": "golang-docs-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "relates_to_product_reference": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c" }, { "category": "default_component_of", "full_product_name": { "name": "golang-misc-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch as a component of go-toolset:rhel8:8000120190828225436:14bc675c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-misc-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch" }, "product_reference": "golang-misc-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "relates_to_product_reference": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c" }, { "category": "default_component_of", "full_product_name": { "name": "golang-race-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64 as a component of go-toolset:rhel8:8000120190828225436:14bc675c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-race-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64" }, "product_reference": "golang-race-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "relates_to_product_reference": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c" }, { "category": "default_component_of", "full_product_name": { "name": "golang-src-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch as a component of go-toolset:rhel8:8000120190828225436:14bc675c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-src-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch" }, "product_reference": "golang-src-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "relates_to_product_reference": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c" }, { "category": "default_component_of", "full_product_name": { "name": "golang-tests-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch as a component of go-toolset:rhel8:8000120190828225436:14bc675c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-tests-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch" }, "product_reference": "golang-tests-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "relates_to_product_reference": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.aarch64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.ppc64le", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.s390x", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.src", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.src", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-docs-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-misc-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-race-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-src-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-tests-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-12T12:29:22+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.aarch64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.ppc64le", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.s390x", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.src", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.src", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-docs-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-misc-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-race-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-src-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-tests-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2726" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.aarch64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.ppc64le", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.s390x", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.src", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.src", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-docs-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-misc-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-race-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-src-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-tests-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.aarch64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.ppc64le", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.s390x", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.src", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.src", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-docs-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-misc-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-race-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-src-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-tests-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-12T12:29:22+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.aarch64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.ppc64le", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.s390x", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.src", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.src", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-docs-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-misc-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-race-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-src-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-tests-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2726" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.aarch64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.ppc64le", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.s390x", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.src", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.src", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-docs-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-misc-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-race-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-src-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-tests-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" } ] }
rhsa-2019_4352
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat JBoss Fuse 6.3 and Red Hat JBoss A-MQ 6.3.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Fuse provides a small-footprint, flexible, open source enterprise service bus and integration platform. Red Hat A-MQ is a standards compliant messaging system that is tailored for use in mission critical applications.\n\nThis patch is an update to Red Hat Fuse 6.3 and Red Hat A-MQ 6.3. It includes bug fixes, which are documented in the patch notes accompanying the package on the download page. See the download link given in the references section below.\n\nSecurity fix(es):\n\n* zookeeper: Information disclosure in Apache ZooKeeper (CVE-2019-0201)\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515) \n\n* HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)\n\n* xstream: remote code execution due to insecure XML deserialization (CVE-2019-10173)\n\n* jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution (CVE-2019-12384)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:4352", "url": "https://access.redhat.com/errata/RHSA-2019:4352" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=jboss.amq.broker\u0026downloadType=securityPatches\u0026version=6.3.0", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=jboss.amq.broker\u0026downloadType=securityPatches\u0026version=6.3.0" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=jboss.fuse\u0026downloadType=securityPatches\u0026version=6.3", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=jboss.fuse\u0026downloadType=securityPatches\u0026version=6.3" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_fuse/6.3/html/release_notes/index", "url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_fuse/6.3/html/release_notes/index" }, { "category": "external", "summary": "1715197", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1715197" }, { "category": "external", "summary": "1722971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1722971" }, { "category": "external", "summary": "1725807", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1725807" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_4352.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Fuse/A-MQ 6.3 R14 security and bug fix update", "tracking": { "current_release_date": "2024-11-22T13:27:38+00:00", "generator": { "date": "2024-11-22T13:27:38+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2019:4352", "initial_release_date": "2019-12-19T17:37:50+00:00", "revision_history": [ { "date": "2019-12-19T17:37:50+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-12-19T17:37:50+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T13:27:38+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Fuse 6.3", "product": { "name": "Red Hat Fuse 6.3", "product_id": "Red Hat Fuse 6.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_fuse:6.3" } } } ], "category": "product_family", "name": "Red Hat JBoss Fuse" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-0201", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "discovery_date": "2019-05-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1715197" } ], "notes": [ { "category": "description", "text": "A flaw was found in Apache ZooKeeper. A lack of permission checks while retrieving ACLs allows unsalted hash values to be disclosed for unauthenticated or unprivileged users.", "title": "Vulnerability description" }, { "category": "summary", "text": "zookeeper: Information disclosure in Apache ZooKeeper", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 6.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-0201" }, { "category": "external", "summary": "RHBZ#1715197", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1715197" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0201", "url": "https://www.cve.org/CVERecord?id=CVE-2019-0201" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0201", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0201" } ], "release_date": "2019-05-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-19T17:37:50+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are located in the download section of the customer portal.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Fuse 6.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4352" }, { "category": "workaround", "details": "Use an authentication method other than Digest (e.g. Kerberos) or upgrade to zookeeper 3.4.14 or later (3.5.5 or later if on the 3.5 branch). [https://zookeeper.apache.org/security.html#CVE-2019-0201]", "product_ids": [ "Red Hat Fuse 6.3" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 6.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "zookeeper: Information disclosure in Apache ZooKeeper" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 6.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-19T17:37:50+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are located in the download section of the customer portal.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Fuse 6.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4352" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 6.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 6.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-19T17:37:50+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are located in the download section of the customer portal.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Fuse 6.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4352" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 6.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 6.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-19T17:37:50+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are located in the download section of the customer portal.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Fuse 6.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4352" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 6.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9518", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735749" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using frames with an empty payload, a flood could occur that results in excessive CPU usage and starvation of other clients. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using empty frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 6.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9518" }, { "category": "external", "summary": "RHBZ#1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9518", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-19T17:37:50+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are located in the download section of the customer portal.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Fuse 6.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4352" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 6.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using empty frames results in excessive resource consumption" }, { "cve": "CVE-2019-10173", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "discovery_date": "2019-06-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1722971" } ], "notes": [ { "category": "description", "text": "It was found that xstream API version 1.4.10 introduced a regression for a previous deserialization flaw. If the security framework has not been initialized, it may allow a remote attacker to run arbitrary shell commands when unmarshalling XML or any supported format. This a regression of CVE-2013-7285 fixed in 1.4.7 (fixed) as of BPMS 6.0.1, the regression was introduced with xstream-1.4.10 implemented in RHPAM.", "title": "Vulnerability description" }, { "category": "summary", "text": "xstream: remote code execution due to insecure XML deserialization (regression of CVE-2013-7285)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 6.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10173" }, { "category": "external", "summary": "RHBZ#1722971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1722971" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10173", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10173" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10173", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10173" }, { "category": "external", "summary": "http://x-stream.github.io/changes.html#1.4.11", "url": "http://x-stream.github.io/changes.html#1.4.11" } ], "release_date": "2018-10-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-19T17:37:50+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are located in the download section of the customer portal.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Fuse 6.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4352" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat Fuse 6.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xstream: remote code execution due to insecure XML deserialization (regression of CVE-2013-7285)" }, { "cve": "CVE-2019-12384", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-06-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1725807" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in FasterXML jackson-databind in versions prior to 2.9.9. The vulnerability would permit polymorphic deserialization of malicious objects using the logback-core gadget when used in conjunction with polymorphic type handling methods such as `enableDefaultTyping()` or when @JsonTypeInfo is using `Id.CLASS` or `Id.MINIMAL_CLASS` or in any other way which ObjectMapper.readValue might instantiate objects from unsafe sources. Depending on the classpath content, remote code execution may be possible.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack\u0027s OpenDaylight does not use logback in any supported configuration. Therefore, the prerequisites for this vulnerability are not present and OpenDaylight is not affected.\n\nThis vulnerability relies on logback-core (ch.qos.logback.core) being present in the application\u0027s ClassPath. Logback-core is not packaged as an RPM for Red Hat Enterprise Linux or Red Hat Software Collections. Applications using jackson-databind that do not also use logback-core are not impacted by this vulnerability.\n\nThis issue affects the versions of jackson-databind bundled with candlepin as shipped with Red Hat Satellite 6.x. However the affected code is NOT used at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 6.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-12384" }, { "category": "external", "summary": "RHBZ#1725807", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1725807" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-12384", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12384" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-12384", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12384" } ], "release_date": "2019-06-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-19T17:37:50+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are located in the download section of the customer portal.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Fuse 6.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4352" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Fuse 6.3" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 6.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution" } ] }
rhsa-2020:3196
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat Decision Manager.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Decision Manager is an open source decision management platform that combines business rules management, complex event processing, Decision Model \u0026 Notation (DMN) execution, and Business Optimizer for solving planning problems. It automates business decisions and makes that logic available to the entire business. \n\nThis release of Red Hat Decision Manager 7.8.0 serves as an update to Red Hat Decision Manager 7.7.1, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* netty: HTTP request smuggling (CVE-2019-20444)\n\n* netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers (CVE-2019-16869)\n\n* netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling (CVE-2020-7238)\n\n* netty: HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)\n\n* netty: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* netty: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* netty: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header (CVE-2019-20445)\n\n* cxf-core: cxf: does not restrict the number of message attachments (CVE-2019-12406)\n\n* cxf-core: cxf: OpenId Connect token service does not properly validate the clientId (CVE-2019-12423)\n\n* cxf-core: cxf: reflected XSS in the services listing page (CVE-2019-17573)\n\n* jackson-databind: lacks certain net.sf.ehcache blocking (CVE-2019-20330)\n\n* jackson-databind: Lacks certain xbean-reflect/JNDI blocking (CVE-2020-8840)\n\n* jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution (CVE-2020-10672)\n\n* jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution (CVE-2020-10673)\n\n* jackson-databind: Serialization gadgets in anteros-core (CVE-2020-9548)\n\n* jackson-databind: Serialization gadgets in commons-jelly:commons-jelly (CVE-2020-11620)\n\n* jackson-databind: Serialization gadgets in ibatis-sqlmap (CVE-2020-9547)\n\n* jackson-databind: Serialization gadgets in javax.swing.JEditorPane (CVE-2020-10969)\n\n* jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider (CVE-2020-10968)\n\n* jackson-databind: Serialization gadgets in org.apache.activemq.jms.pool.XaPooledConnectionFactory (CVE-2020-11111)\n\n* jackson-databind: Serialization gadgets in org.apache.commons.proxy.provider.remoting.RmiProvider (CVE-2020-11112)\n\n* jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime (CVE-2020-11113)\n\n* jackson-databind: Serialization gadgets in org.springframework:spring-aop (CVE-2020-11619)\n\n* jackson-databind: Serialization gadgets in shaded-hikari-config (CVE-2020-9546)\n\n* jackson-databind: serialization in oadd.org.apache.xalan.lib.sql.JNDIConnectionPool (CVE-2020-14060)\n\n* jackson-databind: serialization in weblogic/oracle-aqjms (CVE-2020-14061)\n\n* jackson-databind: serialization in com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool (CVE-2020-14062)\n\n* netty: compression/decompression codecs don\u0027t enforce limits on buffer allocation sizes (CVE-2020-11612)\n\n* quartz: libquartz: XXE attacks via job description (CVE-2019-13990)\n\n* keycloak: security issue on reset credential flow (CVE-2020-1718)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:3196", "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=rhdm\u0026version=7.8.0", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=rhdm\u0026version=7.8.0" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_decision_manager/7.8/html/release_notes_for_red_hat_decision_manager_7.8/index", "url": "https://access.redhat.com/documentation/en-us/red_hat_decision_manager/7.8/html/release_notes_for_red_hat_decision_manager_7.8/index" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "1758619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758619" }, { "category": "external", "summary": "1793154", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793154" }, { "category": "external", "summary": "1796225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796225" }, { "category": "external", "summary": "1796756", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796756" }, { "category": "external", "summary": "1797006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1797006" }, { "category": "external", "summary": "1797011", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1797011" }, { "category": "external", "summary": "1798509", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798509" }, { "category": "external", "summary": "1798524", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798524" }, { "category": "external", "summary": "1801149", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1801149" }, { "category": "external", "summary": "1815470", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1815470" }, { "category": "external", "summary": "1815495", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1815495" }, { "category": "external", "summary": "1816170", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816170" }, { "category": "external", "summary": "1816216", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816216" }, { "category": "external", "summary": "1816330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816330" }, { "category": "external", "summary": "1816332", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816332" }, { "category": "external", "summary": "1816337", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816337" }, { "category": "external", "summary": "1816340", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816340" }, { "category": "external", "summary": "1819208", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819208" }, { "category": "external", "summary": "1819212", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819212" }, { "category": "external", "summary": "1821304", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821304" }, { "category": "external", "summary": "1821311", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821311" }, { "category": "external", "summary": "1821315", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821315" }, { "category": "external", "summary": "1826798", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1826798" }, { "category": "external", "summary": "1826805", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1826805" }, { "category": "external", "summary": "1848960", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848960" }, { "category": "external", "summary": "1848962", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848962" }, { "category": "external", "summary": "1848966", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848966" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_3196.json" } ], "title": "Red Hat Security Advisory: Red Hat Decision Manager 7.8.0 Security Update", "tracking": { "current_release_date": "2025-04-09T17:54:17+00:00", "generator": { "date": "2025-04-09T17:54:17+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.2" } }, "id": "RHSA-2020:3196", "initial_release_date": "2020-07-29T06:06:57+00:00", "revision_history": [ { "date": "2020-07-29T06:06:57+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-07-29T06:06:57+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-04-09T17:54:17+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Decision Manager 7", "product": { "name": "Red Hat Decision Manager 7", "product_id": "Red Hat Decision Manager 7", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_brms_platform:7.8" } } } ], "category": "product_family", "name": "Red Hat Decision Manager" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9518", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735749" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using frames with an empty payload, a flood could occur that results in excessive CPU usage and starvation of other clients. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using empty frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9518" }, { "category": "external", "summary": "RHBZ#1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9518", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using empty frames results in excessive resource consumption" }, { "cve": "CVE-2019-12406", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-03-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816170" } ], "notes": [ { "category": "description", "text": "Apache CXF before 3.3.4 and 3.2.11 does not restrict the number of message attachments present in a given message. This leaves open the possibility of a denial of service type attack, where a malicious user crafts a message containing a very large number of message attachments. From the 3.3.4 and 3.2.11 releases, a default limit of 50 message attachments is enforced. This is configurable via the message property \"attachment-max-count\".", "title": "Vulnerability description" }, { "category": "summary", "text": "cxf: does not restrict the number of message attachments", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-12406" }, { "category": "external", "summary": "RHBZ#1816170", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816170" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-12406", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12406" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-12406", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12406" } ], "release_date": "2019-11-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "cxf: does not restrict the number of message attachments" }, { "cve": "CVE-2019-12423", "cwe": { "id": "CWE-522", "name": "Insufficiently Protected Credentials" }, "discovery_date": "2020-01-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1797006" } ], "notes": [ { "category": "description", "text": "Apache CXF ships with a OpenId Connect JWK Keys service, which allows a client to obtain the public keys in JWK format, which can then be used to verify the signature of tokens issued by the service. Typically, the service obtains the public key from a local keystore (JKS/PKCS12) by specifing the path of the keystore and the alias of the keystore entry. This case is not vulnerable. However it is also possible to obtain the keys from a JWK keystore file, by setting the configuration parameter \"rs.security.keystore.type\" to \"jwk\". For this case all keys are returned in this file \"as is\", including all private key and secret key credentials. This is an obvious security risk if the user has configured the signature keystore file with private or secret key credentials. From CXF 3.3.5 and 3.2.12, it is mandatory to specify an alias corresponding to the id of the key in the JWK file, and only this key is returned. In addition, any private key information is omitted by default. \"oct\" keys, which contain secret keys, are not returned at all.", "title": "Vulnerability description" }, { "category": "summary", "text": "cxf: OpenId Connect token service does not properly validate the clientId", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-12423" }, { "category": "external", "summary": "RHBZ#1797006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1797006" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-12423", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12423" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-12423", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12423" } ], "release_date": "2020-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "cxf: OpenId Connect token service does not properly validate the clientId" }, { "cve": "CVE-2019-13990", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "discovery_date": "2019-07-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1801149" } ], "notes": [ { "category": "description", "text": "The Terracotta Quartz Scheduler is susceptible to an XML external entity attack (XXE) through a job description. This issue stems from inadequate handling of XML external entity (XXE) declarations in the initDocumentParser function within xml/XMLSchedulingDataProcessor.java. By enticing a victim to access a maliciously crafted job description (containing XML content), a remote attacker could exploit this vulnerability to execute an XXE attack on the targeted system.", "title": "Vulnerability description" }, { "category": "summary", "text": "libquartz: XXE attacks via job description", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 uses a vulnerable version of libquartz as a dependency for Candlepin. However, the \u003cjob\u003e\u003cdescrition\u003e entry is not used, and the vulnerability can not be triggered. An update may fix the code in the future.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-13990" }, { "category": "external", "summary": "RHBZ#1801149", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1801149" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-13990", "url": "https://www.cve.org/CVERecord?id=CVE-2019-13990" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-13990", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-13990" } ], "release_date": "2019-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libquartz: XXE attacks via job description" }, { "cve": "CVE-2019-16869", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2019-09-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1758619" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty, where whitespace before the colon in HTTP headers is mishandled. This flaw allows an attacker to cause HTTP request smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that this vulnerability does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships vulnerable netty version embedded in Candlepin, however, is not directly vulnerable since HTTP requests are handled by Tomcat and not netty.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-16869" }, { "category": "external", "summary": "RHBZ#1758619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758619" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16869", "url": "https://www.cve.org/CVERecord?id=CVE-2019-16869" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16869", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16869" } ], "release_date": "2019-09-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers" }, { "cve": "CVE-2019-17573", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2020-01-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1797011" } ], "notes": [ { "category": "description", "text": "By default, Apache CXF creates a /services page containing a listing of the available endpoint names and addresses. This webpage is vulnerable to a reflected Cross-Site Scripting (XSS) attack, which allows a malicious actor to inject javascript into the web page. Please note that the attack exploits a feature which is not typically not present in modern browsers, who remove dot segments before sending the request. However, Mobile applications may be vulnerable.", "title": "Vulnerability description" }, { "category": "summary", "text": "cxf: reflected XSS in the services listing page", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-17573" }, { "category": "external", "summary": "RHBZ#1797011", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1797011" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-17573", "url": "https://www.cve.org/CVERecord?id=CVE-2019-17573" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-17573", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17573" } ], "release_date": "2020-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "Mitigate this flaw by disabling the service listing altogether; via setting the \"hide-service-list-page\" servlet parameter to \"true\".", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "cxf: reflected XSS in the services listing page" }, { "cve": "CVE-2019-20330", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-01-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1793154" } ], "notes": [ { "category": "description", "text": "FasterXML jackson-databind 2.x before 2.9.10.2 lacks certain net.sf.ehcache blocking.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: lacks certain net.sf.ehcache blocking", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20330" }, { "category": "external", "summary": "RHBZ#1793154", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793154" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20330", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20330" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20330", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20330" } ], "release_date": "2020-01-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: lacks certain net.sf.ehcache blocking" }, { "cve": "CVE-2019-20444", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1798524" } ], "notes": [ { "category": "description", "text": "A HTTP smuggling flaw was found in HttpObjectDecoder.java in Netty in versions prior to version 4.1.44. HTTP headers with an invalid fold, in this case CRLF (carriage return, line feed) without being followed by SP (space) or HTAB (horizontal tab), result in situations where headers can be misread. Data integrity is the highest threat with this vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP request smuggling", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that the previous vulnerability, CVE-2019-16869, does not pose a substantial practical threat to ElasticSearch 6. We agree that these issues would be difficult to exploit on OpenShift Container Platform so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships a vulnerable version of netty embedded in Candlepin. However, the flaw can not be triggered in that context, because HTTP requests are handled by Tomcat, not by netty. A future release may fix this.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20444" }, { "category": "external", "summary": "RHBZ#1798524", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798524" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20444", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20444" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20444", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20444" }, { "category": "external", "summary": "https://github.com/elastic/elasticsearch/issues/49396", "url": "https://github.com/elastic/elasticsearch/issues/49396" } ], "release_date": "2020-01-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP request smuggling" }, { "cve": "CVE-2019-20445", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1798509" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty before version 4.1.44, where it accepted multiple Content-Length headers and also accepted both Transfer-Encoding, as well as Content-Length headers where it should reject the message under such circumstances. In circumstances where Netty is used in the context of a server, it could result in a viable HTTP smuggling vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that the previous vulnerability, CVE-2019-16869, does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit both these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships a vulnerable version of netty embedded in Candlepin. However, the flaw can not be triggered in that context, because HTTP requests are handled by Tomcat, not by netty. A future release may fix this.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20445" }, { "category": "external", "summary": "RHBZ#1798509", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798509" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20445", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20445" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20445", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20445" } ], "release_date": "2020-01-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header" }, { "cve": "CVE-2020-1718", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2020-01-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1796756" } ], "notes": [ { "category": "description", "text": "A flaw was found in the reset credential flow in Keycloak. This flaw allows an attacker to gain unauthorized access to the application.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak: security issue on reset credential flow", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-1718" }, { "category": "external", "summary": "RHBZ#1796756", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796756" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-1718", "url": "https://www.cve.org/CVERecord?id=CVE-2020-1718" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1718", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1718" } ], "release_date": "2020-05-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "Disable reset credential flow.", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "keycloak: security issue on reset credential flow" }, { "cve": "CVE-2020-7238", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1796225" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty, where it mishandles Transfer-Encoding whitespace. This flaw allows HTTP Request Smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that the previous vulnerability, CVE-2019-16869, does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit both these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships vulnerable netty version embedded in Candlepin, however, is not directly vulnerable since HTTP requests are handled by Tomcat and not netty.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-7238" }, { "category": "external", "summary": "RHBZ#1796225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796225" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-7238", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7238" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7238", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7238" }, { "category": "external", "summary": "https://netty.io/news/2019/12/18/4-1-44-Final.html", "url": "https://netty.io/news/2019/12/18/4-1-44-Final.html" } ], "release_date": "2020-01-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling" }, { "cve": "CVE-2020-8840", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816330" } ], "notes": [ { "category": "description", "text": "A flaw was found in FasterXML jackson-databind in versions 2.0.0 through 2.9.10.2. A \"gadget\" exploit is possible due to a lack of a Java object being blocking from being deserialized. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Lacks certain xbean-reflect/JNDI blocking", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8840" }, { "category": "external", "summary": "RHBZ#1816330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816330" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8840", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8840" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8840", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8840" } ], "release_date": "2020-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Lacks certain xbean-reflect/JNDI blocking" }, { "cve": "CVE-2020-9546", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816332" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in shaded-hikari-config", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9546" }, { "category": "external", "summary": "RHBZ#1816332", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816332" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9546", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9546" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9546", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9546" } ], "release_date": "2020-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in shaded-hikari-config" }, { "cve": "CVE-2020-9547", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816337" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in ibatis-sqlmap", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9547" }, { "category": "external", "summary": "RHBZ#1816337", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816337" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9547", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9547" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9547", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9547" } ], "release_date": "2020-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in ibatis-sqlmap" }, { "cve": "CVE-2020-9548", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816340" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in anteros-core", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9548" }, { "category": "external", "summary": "RHBZ#1816340", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816340" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9548", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9548" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9548", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9548" } ], "release_date": "2020-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in anteros-core" }, { "cve": "CVE-2020-10672", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2020-03-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1815495" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10672" }, { "category": "external", "summary": "RHBZ#1815495", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1815495" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10672", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10672" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10672", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10672" } ], "release_date": "2020-03-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution" }, { "cve": "CVE-2020-10673", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2020-03-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1815470" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time. Additionally, the gadget is not available within Red Hat Openstack Platform\u0027s OpenDaylight.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10673" }, { "category": "external", "summary": "RHBZ#1815470", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1815470" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10673", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10673" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10673", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10673" } ], "release_date": "2020-03-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution" }, { "cve": "CVE-2020-10968", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1819208" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x prior to version 2.9.10.4. The interaction between serialization gadgets and typing is mishandled in the bus-proxy. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10968" }, { "category": "external", "summary": "RHBZ#1819208", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819208" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10968", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10968" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10968", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10968" } ], "release_date": "2020-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider" }, { "cve": "CVE-2020-10969", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1819212" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in javax.swing.JEditorPane", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10969" }, { "category": "external", "summary": "RHBZ#1819212", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819212" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10969", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10969" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10969", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10969" } ], "release_date": "2020-03-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in javax.swing.JEditorPane" }, { "cve": "CVE-2020-11111", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2020-03-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1821304" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.apache.activemq.jms.pool.XaPooledConnectionFactory", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11111" }, { "category": "external", "summary": "RHBZ#1821304", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821304" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11111", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11111" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11111", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11111" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/2664", "url": "https://github.com/FasterXML/jackson-databind/issues/2664" } ], "release_date": "2020-03-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in org.apache.activemq.jms.pool.XaPooledConnectionFactory" }, { "cve": "CVE-2020-11112", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2020-03-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1821311" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.apache.commons.proxy.provider.remoting.RmiProvider", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11112" }, { "category": "external", "summary": "RHBZ#1821311", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821311" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11112", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11112" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11112", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11112" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/2666", "url": "https://github.com/FasterXML/jackson-databind/issues/2666" } ], "release_date": "2020-03-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in org.apache.commons.proxy.provider.remoting.RmiProvider" }, { "cve": "CVE-2020-11113", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2020-03-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1821315" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11113" }, { "category": "external", "summary": "RHBZ#1821315", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821315" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11113", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11113" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11113", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11113" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/2670", "url": "https://github.com/FasterXML/jackson-databind/issues/2670" } ], "release_date": "2020-03-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime" }, { "cve": "CVE-2020-11612", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-03-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816216" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty in the way it handles the amount of data it compresses and decompresses. The Compression/Decompression codecs should enforce memory allocation size limits to avoid an Out of Memory Error (OOME) or exhaustion of the memory pool.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: compression/decompression codecs don\u0027t enforce limits on buffer allocation sizes", "title": "Vulnerability summary" }, { "category": "other", "text": "In OpenShift Container Platform end users don\u0027t have direct access to send requests to ElasticSearch. A user could need access to the ElasticSearch service on the internal cluster network in order to be able to send malicious requests to it.\n\n\nThird party scanners flagging Red Hat Satellite due to availability of the higher version packages in Red Hat AMQ Clients (through errata RHSA-2020:2605) compare to the qpid packages from Satellite Tools repository. qpid dependency fixed in errata RHSA-2020:2605 was for Red Hat AMQ Clients and it doesn\u0027t necessarily mean that packages from Satellite Tools are affected. These are two different products with different architecture and code-base. Updating the packages from any other repository than the Satellite-tools repository is not recommended for Satellite Customers. \n\nRed Hat Satellite 6.7 and earlier ship affected version of netty, however, there is no external connection being exposed and it is used by only Artemis to open an internal connection within the JVM. Since netty does not come into contact with untrusted data, vulnerability is not exposed in product code and there is no breach of Confidentiality, Integrity or Availability expected from this vulnerability. We may update the netty and its dependency in a future release.\n\nMore information regarding Satellite related packages can be found on KCS: https://access.redhat.com/solutions/5200591", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11612" }, { "category": "external", "summary": "RHBZ#1816216", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816216" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11612", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11612" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11612", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11612" } ], "release_date": "2020-01-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "netty: compression/decompression codecs don\u0027t enforce limits on buffer allocation sizes" }, { "cve": "CVE-2020-11619", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-04-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1826805" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.springframework:spring-aop", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11619" }, { "category": "external", "summary": "RHBZ#1826805", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1826805" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11619", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11619" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11619", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11619" } ], "release_date": "2020-04-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in org.springframework:spring-aop" }, { "cve": "CVE-2020-11620", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-04-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1826798" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in commons-jelly:commons-jelly", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11620" }, { "category": "external", "summary": "RHBZ#1826798", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1826798" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11620", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11620" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11620", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11620" } ], "release_date": "2020-04-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in commons-jelly:commons-jelly" }, { "cve": "CVE-2020-14060", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-06-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1848960" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.5. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: serialization in oadd.org.apache.xalan.lib.sql.JNDIConnectionPool", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 and Red Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.\n\nThe version of jackson-databind as shipped in Red Hat Software Collections rh-maven35 is used only while building maven, thus it does not deserialize data coming from untrusted sources, lowering the impact of the vulnerability for the Product.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14060" }, { "category": "external", "summary": "RHBZ#1848960", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848960" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14060", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14060" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14060", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14060" } ], "release_date": "2020-05-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* enableDefaultTyping()\n* @JsonTypeInfo using id.CLASS or id.MINIMAL_CLASS\n* oadd.org.apache.xalan.lib.sql.JNDIConnectionPool in classpath", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: serialization in oadd.org.apache.xalan.lib.sql.JNDIConnectionPool" }, { "cve": "CVE-2020-14061", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-06-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1848966" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.5. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: serialization in weblogic/oracle-aqjms", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 and Red Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.\n\nThe version of jackson-databind as shipped in Red Hat Software Collections rh-maven35 is used only while building maven, thus it does not deserialize data coming from untrusted sources, lowering the impact of the vulnerability for the Product.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14061" }, { "category": "external", "summary": "RHBZ#1848966", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848966" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14061", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14061" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14061", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14061" } ], "release_date": "2020-05-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* enableDefaultTyping()\n* @JsonTypeInfo using id.CLASS or id.MINIMAL_CLASS\n* oracle.jms.AQjms*ConnectionFactory in classpath", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: serialization in weblogic/oracle-aqjms" }, { "cve": "CVE-2020-14062", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-06-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1848962" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.5. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: serialization in com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 and Red Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.\n\nThe version of jackson-databind as shipped in Red Hat Software Collections rh-maven35 is used only while building maven, thus it does not deserialize data coming from untrusted sources, lowering the impact of the vulnerability for the Product.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14062" }, { "category": "external", "summary": "RHBZ#1848962", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848962" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14062", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14062" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14062", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14062" } ], "release_date": "2020-05-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* enableDefaultTyping()\n* @JsonTypeInfo using id.CLASS or id.MINIMAL_CLASS\n* com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool in classpath", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: serialization in com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool" } ] }
rhsa-2019_4269
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the container-tools:rhel8 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.\n\nSecurity Fix(es):\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* runc: AppArmor/SELinux bypass with malicious image that specifies a volume at /proc (CVE-2019-16884)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* avc: podman run --security-opt label=type:svirt_qemu_net_t (BZ#1764318)\n\n* backport json-file logging support to 1.4.2 (BZ#1770176)\n\n* Selinux won\u0027t allow SCTP inter pod communication (BZ#1774382)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:4269", "url": "https://access.redhat.com/errata/RHSA-2019:4269" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1757214", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1757214" }, { "category": "external", "summary": "1764318", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764318" }, { "category": "external", "summary": "1770176", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770176" }, { "category": "external", "summary": "1774382", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774382" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_4269.json" } ], "title": "Red Hat Security Advisory: container-tools:rhel8 security and bug fix update", "tracking": { "current_release_date": "2024-11-22T14:13:22+00:00", "generator": { "date": "2024-11-22T14:13:22+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2019:4269", "initial_release_date": "2019-12-17T12:56:53+00:00", "revision_history": [ { "date": "2019-12-17T12:56:53+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-12-17T12:56:53+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T14:13:22+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "container-tools:rhel8:8010020191126140055:c294d161", "product": { "name": "container-tools:rhel8:8010020191126140055:c294d161", "product_id": "container-tools:rhel8:8010020191126140055:c294d161", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/container-tools@rhel8:8010020191126140055:c294d161" } } }, { "category": "product_version", "name": "cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.noarch", "product": { "name": "cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.noarch", "product_id": "cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=noarch" } } }, { "category": "product_version", "name": "container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.noarch", "product": { "name": "container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.noarch", "product_id": "container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4900%2B9d7326b8?arch=noarch\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-docker-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "product": { "name": "podman-docker-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "product_id": "podman-docker-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4830%2Bf49150d7?arch=noarch" } } }, { "category": "product_version", "name": "podman-manpages-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "product": { "name": "podman-manpages-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "product_id": "podman-manpages-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4830%2Bf49150d7?arch=noarch" } } }, { "category": "product_version", "name": "python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.noarch", "product": { "name": "python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.noarch", "product_id": "python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.src", "product": { "name": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.src", "product_id": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4240%2B893c1ab8?arch=src" } } }, { "category": "product_version", "name": "cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.src", "product": { "name": "cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.src", "product_id": "cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=src" } } }, { "category": "product_version", "name": "container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.src", "product": { "name": "container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.src", "product_id": "container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4900%2B9d7326b8?arch=src\u0026epoch=2" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.src", "product": { "name": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.src", "product_id": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4881%2B045289ee?arch=src" } } }, { "category": "product_version", "name": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.src", "product": { "name": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.src", "product_id": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=src" } } }, { "category": "product_version", "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.src", "product": { "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.src", "product_id": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.src", "product": { "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.src", "product_id": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=src\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.src", "product": { "name": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.src", "product_id": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4830%2Bf49150d7?arch=src" } } }, { "category": "product_version", "name": "python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.src", "product": { "name": "python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.src", "product_id": "python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=src" } } }, { "category": "product_version", "name": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.src", "product": { "name": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.src", "product_id": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4873%2B4a24e241?arch=src" } } }, { "category": "product_version", "name": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.src", "product": { "name": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.src", "product_id": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4876%2Be678a192?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.src", "product": { "name": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.src", "product_id": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4306%2B1d917805?arch=src" } } }, { "category": "product_version", "name": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.src", "product": { "name": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.src", "product_id": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "product": { "name": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "product_id": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4240%2B893c1ab8?arch=x86_64" } } }, { "category": "product_version", "name": "buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "product": { "name": "buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "product_id": "buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4240%2B893c1ab8?arch=x86_64" } } }, { "category": "product_version", "name": "buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "product": { "name": "buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "product_id": "buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4240%2B893c1ab8?arch=x86_64" } } }, { "category": "product_version", "name": "buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "product": { "name": "buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "product_id": "buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4240%2B893c1ab8?arch=x86_64" } } }, { "category": "product_version", "name": "buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "product": { "name": "buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "product_id": "buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4240%2B893c1ab8?arch=x86_64" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "product": { "name": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "product_id": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4881%2B045289ee?arch=x86_64" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "product": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "product_id": "containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4881%2B045289ee?arch=x86_64" } } }, { "category": "product_version", "name": "containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "product": { "name": "containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "product_id": "containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4881%2B045289ee?arch=x86_64" } } }, { "category": "product_version", "name": "containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "product": { "name": "containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "product_id": "containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4876%2Be678a192?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "product": { "name": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "product_id": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=x86_64" } } }, { "category": "product_version", "name": "fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "product": { "name": "fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "product_id": "fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=x86_64" } } }, { "category": "product_version", "name": "fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "product": { "name": "fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "product_id": "fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=x86_64" } } }, { "category": "product_version", "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "product": { "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "product_id": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "product": { "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "product_id": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "product": { "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "product_id": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "product": { "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "product_id": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "product": { "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "product_id": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "product": { "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "product_id": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "product": { "name": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "product_id": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4830%2Bf49150d7?arch=x86_64" } } }, { "category": "product_version", "name": "podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "product": { "name": "podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "product_id": "podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4830%2Bf49150d7?arch=x86_64" } } }, { "category": "product_version", "name": "podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "product": { "name": "podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "product_id": "podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4830%2Bf49150d7?arch=x86_64" } } }, { "category": "product_version", "name": "podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "product": { "name": "podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "product_id": "podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4830%2Bf49150d7?arch=x86_64" } } }, { "category": "product_version", "name": "podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "product": { "name": "podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "product_id": "podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4830%2Bf49150d7?arch=x86_64" } } }, { "category": "product_version", "name": "podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "product": { "name": "podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "product_id": "podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4830%2Bf49150d7?arch=x86_64" } } }, { "category": "product_version", "name": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "product": { "name": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "product_id": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4873%2B4a24e241?arch=x86_64" } } }, { "category": "product_version", "name": "runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "product": { "name": "runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "product_id": "runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4873%2B4a24e241?arch=x86_64" } } }, { "category": "product_version", "name": "runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "product": { "name": "runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "product_id": "runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4873%2B4a24e241?arch=x86_64" } } }, { "category": "product_version", "name": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "product": { "name": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "product_id": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4876%2Be678a192?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "product": { "name": "skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "product_id": "skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4876%2Be678a192?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "product": { "name": "skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "product_id": "skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4876%2Be678a192?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "product": { "name": "skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "product_id": "skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4876%2Be678a192?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "product": { "name": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "product_id": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4306%2B1d917805?arch=x86_64" } } }, { "category": "product_version", "name": "slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "product": { "name": "slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "product_id": "slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4306%2B1d917805?arch=x86_64" } } }, { "category": "product_version", "name": "slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "product": { "name": "slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "product_id": "slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4306%2B1d917805?arch=x86_64" } } }, { "category": "product_version", "name": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.x86_64", "product": { "name": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.x86_64", "product_id": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "product": { "name": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "product_id": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4240%2B893c1ab8?arch=s390x" } } }, { "category": "product_version", "name": "buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "product": { "name": "buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "product_id": "buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4240%2B893c1ab8?arch=s390x" } } }, { "category": "product_version", "name": "buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "product": { "name": "buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "product_id": "buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4240%2B893c1ab8?arch=s390x" } } }, { "category": "product_version", "name": "buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "product": { "name": "buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "product_id": "buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4240%2B893c1ab8?arch=s390x" } } }, { "category": "product_version", "name": "buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "product": { "name": "buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "product_id": "buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4240%2B893c1ab8?arch=s390x" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "product": { "name": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "product_id": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4881%2B045289ee?arch=s390x" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "product": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "product_id": "containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4881%2B045289ee?arch=s390x" } } }, { "category": "product_version", "name": "containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "product": { "name": "containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "product_id": "containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4881%2B045289ee?arch=s390x" } } }, { "category": "product_version", "name": "containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "product": { "name": "containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "product_id": "containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4876%2Be678a192?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "product": { "name": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "product_id": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=s390x" } } }, { "category": "product_version", "name": "fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "product": { "name": "fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "product_id": "fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=s390x" } } }, { "category": "product_version", "name": "fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "product": { "name": "fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "product_id": "fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=s390x" } } }, { "category": "product_version", "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "product": { "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "product_id": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "product": { "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "product_id": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "product": { "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "product_id": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "product": { "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "product_id": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "product": { "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "product_id": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "product": { "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "product_id": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "product": { "name": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "product_id": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4830%2Bf49150d7?arch=s390x" } } }, { "category": "product_version", "name": "podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "product": { "name": "podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "product_id": "podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4830%2Bf49150d7?arch=s390x" } } }, { "category": "product_version", "name": "podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "product": { "name": "podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "product_id": "podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4830%2Bf49150d7?arch=s390x" } } }, { "category": "product_version", "name": "podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "product": { "name": "podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "product_id": "podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4830%2Bf49150d7?arch=s390x" } } }, { "category": "product_version", "name": "podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "product": { "name": "podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "product_id": "podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4830%2Bf49150d7?arch=s390x" } } }, { "category": "product_version", "name": "podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "product": { "name": "podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "product_id": "podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4830%2Bf49150d7?arch=s390x" } } }, { "category": "product_version", "name": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "product": { "name": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "product_id": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4873%2B4a24e241?arch=s390x" } } }, { "category": "product_version", "name": "runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "product": { "name": "runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "product_id": "runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4873%2B4a24e241?arch=s390x" } } }, { "category": "product_version", "name": "runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "product": { "name": "runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "product_id": "runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4873%2B4a24e241?arch=s390x" } } }, { "category": "product_version", "name": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "product": { "name": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "product_id": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4876%2Be678a192?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "product": { "name": "skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "product_id": "skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4876%2Be678a192?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "product": { "name": "skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "product_id": "skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4876%2Be678a192?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "product": { "name": "skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "product_id": "skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4876%2Be678a192?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "product": { "name": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "product_id": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4306%2B1d917805?arch=s390x" } } }, { "category": "product_version", "name": "slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "product": { "name": "slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "product_id": "slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4306%2B1d917805?arch=s390x" } } }, { "category": "product_version", "name": "slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "product": { "name": "slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "product_id": "slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4306%2B1d917805?arch=s390x" } } }, { "category": "product_version", "name": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.s390x", "product": { "name": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.s390x", "product_id": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "product": { "name": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "product_id": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4240%2B893c1ab8?arch=ppc64le" } } }, { "category": "product_version", "name": "buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "product": { "name": "buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "product_id": "buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4240%2B893c1ab8?arch=ppc64le" } } }, { "category": "product_version", "name": "buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "product": { "name": "buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "product_id": "buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4240%2B893c1ab8?arch=ppc64le" } } }, { "category": "product_version", "name": "buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "product": { "name": "buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "product_id": "buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4240%2B893c1ab8?arch=ppc64le" } } }, { "category": "product_version", "name": "buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "product": { "name": "buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "product_id": "buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4240%2B893c1ab8?arch=ppc64le" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "product": { "name": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "product_id": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4881%2B045289ee?arch=ppc64le" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "product": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "product_id": "containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4881%2B045289ee?arch=ppc64le" } } }, { "category": "product_version", "name": "containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "product": { "name": "containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "product_id": "containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4881%2B045289ee?arch=ppc64le" } } }, { "category": "product_version", "name": "containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "product": { "name": "containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "product_id": "containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4876%2Be678a192?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "product": { "name": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "product_id": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=ppc64le" } } }, { "category": "product_version", "name": "fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "product": { "name": "fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "product_id": "fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=ppc64le" } } }, { "category": "product_version", "name": "fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "product": { "name": "fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "product_id": "fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=ppc64le" } } }, { "category": "product_version", "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "product": { "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "product_id": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "product": { "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "product_id": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "product": { "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "product_id": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "product": { "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "product_id": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "product": { "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "product_id": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "product": { "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "product_id": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "product": { "name": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "product_id": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4830%2Bf49150d7?arch=ppc64le" } } }, { "category": "product_version", "name": "podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "product": { "name": "podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "product_id": "podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4830%2Bf49150d7?arch=ppc64le" } } }, { "category": "product_version", "name": "podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "product": { "name": "podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "product_id": "podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4830%2Bf49150d7?arch=ppc64le" } } }, { "category": "product_version", "name": "podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "product": { "name": "podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "product_id": "podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4830%2Bf49150d7?arch=ppc64le" } } }, { "category": "product_version", "name": "podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "product": { "name": "podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "product_id": "podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4830%2Bf49150d7?arch=ppc64le" } } }, { "category": "product_version", "name": "podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "product": { "name": "podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "product_id": "podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4830%2Bf49150d7?arch=ppc64le" } } }, { "category": "product_version", "name": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "product": { "name": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "product_id": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4873%2B4a24e241?arch=ppc64le" } } }, { "category": "product_version", "name": "runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "product": { "name": "runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "product_id": "runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4873%2B4a24e241?arch=ppc64le" } } }, { "category": "product_version", "name": "runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "product": { "name": "runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "product_id": "runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4873%2B4a24e241?arch=ppc64le" } } }, { "category": "product_version", "name": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "product": { "name": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "product_id": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4876%2Be678a192?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "product": { "name": "skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "product_id": "skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4876%2Be678a192?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "product": { "name": "skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "product_id": "skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4876%2Be678a192?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "product": { "name": "skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "product_id": "skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4876%2Be678a192?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "product": { "name": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "product_id": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4306%2B1d917805?arch=ppc64le" } } }, { "category": "product_version", "name": "slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "product": { "name": "slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "product_id": "slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4306%2B1d917805?arch=ppc64le" } } }, { "category": "product_version", "name": "slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "product": { "name": "slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "product_id": "slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4306%2B1d917805?arch=ppc64le" } } }, { "category": "product_version", "name": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.ppc64le", "product": { "name": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.ppc64le", "product_id": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "product": { "name": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "product_id": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4240%2B893c1ab8?arch=aarch64" } } }, { "category": "product_version", "name": "buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "product": { "name": "buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "product_id": "buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4240%2B893c1ab8?arch=aarch64" } } }, { "category": "product_version", "name": "buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "product": { "name": "buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "product_id": "buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4240%2B893c1ab8?arch=aarch64" } } }, { "category": "product_version", "name": "buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "product": { "name": "buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "product_id": "buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4240%2B893c1ab8?arch=aarch64" } } }, { "category": "product_version", "name": "buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "product": { "name": "buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "product_id": "buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4240%2B893c1ab8?arch=aarch64" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "product": { "name": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "product_id": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4881%2B045289ee?arch=aarch64" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "product": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "product_id": "containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4881%2B045289ee?arch=aarch64" } } }, { "category": "product_version", "name": "containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "product": { "name": "containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "product_id": "containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4881%2B045289ee?arch=aarch64" } } }, { "category": "product_version", "name": "containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "product": { "name": "containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "product_id": "containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4876%2Be678a192?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "product": { "name": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "product_id": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=aarch64" } } }, { "category": "product_version", "name": "fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "product": { "name": "fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "product_id": "fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=aarch64" } } }, { "category": "product_version", "name": "fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "product": { "name": "fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "product_id": "fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=aarch64" } } }, { "category": "product_version", "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "product": { "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "product_id": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "product": { "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "product_id": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "product": { "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "product_id": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "product": { "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "product_id": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "product": { "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "product_id": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "product": { "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "product_id": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "product": { "name": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "product_id": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4830%2Bf49150d7?arch=aarch64" } } }, { "category": "product_version", "name": "podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "product": { "name": "podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "product_id": "podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4830%2Bf49150d7?arch=aarch64" } } }, { "category": "product_version", "name": "podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "product": { "name": "podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "product_id": "podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4830%2Bf49150d7?arch=aarch64" } } }, { "category": "product_version", "name": "podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "product": { "name": "podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "product_id": "podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4830%2Bf49150d7?arch=aarch64" } } }, { "category": "product_version", "name": "podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "product": { "name": "podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "product_id": "podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4830%2Bf49150d7?arch=aarch64" } } }, { "category": "product_version", "name": "podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "product": { "name": "podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "product_id": "podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4830%2Bf49150d7?arch=aarch64" } } }, { "category": "product_version", "name": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "product": { "name": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "product_id": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4873%2B4a24e241?arch=aarch64" } } }, { "category": "product_version", "name": "runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "product": { "name": "runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "product_id": "runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4873%2B4a24e241?arch=aarch64" } } }, { "category": "product_version", "name": "runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "product": { "name": "runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "product_id": "runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4873%2B4a24e241?arch=aarch64" } } }, { "category": "product_version", "name": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "product": { "name": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "product_id": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4876%2Be678a192?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "product": { "name": "skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "product_id": "skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4876%2Be678a192?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "product": { "name": "skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "product_id": "skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4876%2Be678a192?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "product": { "name": "skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "product_id": "skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4876%2Be678a192?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "product": { "name": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "product_id": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4306%2B1d917805?arch=aarch64" } } }, { "category": "product_version", "name": "slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "product": { "name": "slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "product_id": "slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4306%2B1d917805?arch=aarch64" } } }, { "category": "product_version", "name": "slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "product": { "name": "slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "product_id": "slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4306%2B1d917805?arch=aarch64" } } }, { "category": "product_version", "name": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.aarch64", "product": { "name": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.aarch64", "product_id": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, "product_reference": "container-tools:rhel8:8010020191126140055:c294d161", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64" }, "product_reference": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le" }, "product_reference": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x" }, "product_reference": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.src as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.src" }, "product_reference": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64" }, "product_reference": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64" }, "product_reference": "buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le" }, "product_reference": "buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x" }, "product_reference": "buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64" }, "product_reference": "buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64" }, "product_reference": "buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le" }, "product_reference": "buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x" }, "product_reference": "buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64" }, "product_reference": "buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64" }, "product_reference": "buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le" }, "product_reference": "buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x" }, "product_reference": "buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64" }, "product_reference": "buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64" }, "product_reference": "buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le" }, "product_reference": "buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x" }, "product_reference": "buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64" }, "product_reference": "buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.noarch as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.noarch" }, "product_reference": "cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.src as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.src" }, "product_reference": "cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.noarch as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.noarch" }, "product_reference": "container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.src as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.src" }, "product_reference": "container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64" }, "product_reference": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le" }, "product_reference": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x" }, "product_reference": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.src as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.src" }, "product_reference": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64" }, "product_reference": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64" }, "product_reference": "containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le" }, "product_reference": "containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x" }, "product_reference": "containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64" }, "product_reference": "containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64" }, "product_reference": "containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le" }, "product_reference": "containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x" }, "product_reference": "containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64" }, "product_reference": "containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64" }, "product_reference": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le" }, "product_reference": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x" }, "product_reference": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.src as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.src" }, "product_reference": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64" }, "product_reference": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64" }, "product_reference": "fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le" }, "product_reference": "fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x" }, "product_reference": "fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64" }, "product_reference": "fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64" }, "product_reference": "fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le" }, "product_reference": "fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x" }, "product_reference": "fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64" }, "product_reference": "fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64" }, "product_reference": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le" }, "product_reference": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x" }, "product_reference": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.src as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.src" }, "product_reference": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64" }, "product_reference": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64" }, "product_reference": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le" }, "product_reference": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x" }, "product_reference": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64" }, "product_reference": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64" }, "product_reference": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le" }, "product_reference": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x" }, "product_reference": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64" }, "product_reference": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64" }, "product_reference": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le" }, "product_reference": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x" }, "product_reference": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.src as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.src" }, "product_reference": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64" }, "product_reference": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64" }, "product_reference": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le" }, "product_reference": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x" }, "product_reference": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64" }, "product_reference": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64" }, "product_reference": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le" }, "product_reference": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x" }, "product_reference": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64" }, "product_reference": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64" }, "product_reference": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le" }, "product_reference": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x" }, "product_reference": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.src as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.src" }, "product_reference": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64" }, "product_reference": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64" }, "product_reference": "podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le" }, "product_reference": "podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x" }, "product_reference": "podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64" }, "product_reference": "podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64" }, "product_reference": "podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le" }, "product_reference": "podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x" }, "product_reference": "podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64" }, "product_reference": "podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-docker-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-docker-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch" }, "product_reference": "podman-docker-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-manpages-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-manpages-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch" }, "product_reference": "podman-manpages-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64" }, "product_reference": "podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le" }, "product_reference": "podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x" }, "product_reference": "podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64" }, "product_reference": "podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64" }, "product_reference": "podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le" }, "product_reference": "podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x" }, "product_reference": "podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64" }, "product_reference": "podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64" }, "product_reference": "podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le" }, "product_reference": "podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x" }, "product_reference": "podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64" }, "product_reference": "podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.noarch as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.noarch" }, "product_reference": "python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.src as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.src" }, "product_reference": "python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64" }, "product_reference": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le" }, "product_reference": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x" }, "product_reference": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.src as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.src" }, "product_reference": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64" }, "product_reference": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64" }, "product_reference": "runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le" }, "product_reference": "runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x" }, "product_reference": "runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64" }, "product_reference": "runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64" }, "product_reference": "runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le" }, "product_reference": "runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x" }, "product_reference": "runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64" }, "product_reference": "runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64" }, "product_reference": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le" }, "product_reference": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x" }, "product_reference": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.src as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.src" }, "product_reference": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64" }, "product_reference": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64" }, "product_reference": "skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le" }, "product_reference": "skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x" }, "product_reference": "skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64" }, "product_reference": "skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64" }, "product_reference": "skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le" }, "product_reference": "skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x" }, "product_reference": "skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64" }, "product_reference": "skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64" }, "product_reference": "skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le" }, "product_reference": "skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x" }, "product_reference": "skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64" }, "product_reference": "skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64" }, "product_reference": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le" }, "product_reference": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x" }, "product_reference": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.src as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.src" }, "product_reference": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64" }, "product_reference": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64" }, "product_reference": "slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le" }, "product_reference": "slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x" }, "product_reference": "slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64" }, "product_reference": "slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64" }, "product_reference": "slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le" }, "product_reference": "slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x" }, "product_reference": "slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64" }, "product_reference": "slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.aarch64" }, "product_reference": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.ppc64le" }, "product_reference": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.s390x" }, "product_reference": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.src as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.src" }, "product_reference": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.x86_64" }, "product_reference": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-docker-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-manpages-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-17T12:56:53+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-docker-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-manpages-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4269" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-docker-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-manpages-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-docker-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-manpages-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-17T12:56:53+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-docker-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-manpages-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4269" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-docker-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-manpages-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "cve": "CVE-2019-16884", "cwe": { "id": "CWE-41", "name": "Improper Resolution of Path Equivalence" }, "discovery_date": "2019-09-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1757214" } ], "notes": [ { "category": "description", "text": "runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other products, allows AppArmor restriction bypass because libcontainer/rootfs_linux.go incorrectly checks mount targets, and thus a malicious Docker image can mount over a /proc directory.", "title": "Vulnerability description" }, { "category": "summary", "text": "runc: AppArmor/SELinux bypass with malicious image that specifies a volume at /proc", "title": "Vulnerability summary" }, { "category": "other", "text": "The AppArmor security module is not supported by Red Hat, on the other hand the flaw also affects SELinux based distributions like Red Hat Enterprise Linux.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-docker-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-manpages-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-16884" }, { "category": "external", "summary": "RHBZ#1757214", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1757214" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16884", "url": "https://www.cve.org/CVERecord?id=CVE-2019-16884" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16884", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16884" } ], "release_date": "2019-09-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-17T12:56:53+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-docker-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-manpages-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4269" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N", "version": "3.0" }, "products": [ "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-docker-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-manpages-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "runc: AppArmor/SELinux bypass with malicious image that specifies a volume at /proc" }, { "cve": "CVE-2019-18466", "cwe": { "id": "CWE-59", "name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)" }, "discovery_date": "2019-08-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1744588" } ], "notes": [ { "category": "description", "text": "It was discovered that podman resolves a symlink in the host context during a copy operation from the container to the host. An attacker could create a container image containing particular symlinks that, when copied by a victim user to the host filesystem, may overwrite existing files with others from the host.", "title": "Vulnerability description" }, { "category": "summary", "text": "podman: resolving symlink in host filesystem leads to unexpected results of copy operation", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of podman as shipped with Red Hat Enterprise Linux 8 as they did not include support for the copy function.\n\nThis issue did not affect the versions of podman as shipped in OpenShift Container Platform 3.11 and 4.1 as they did not include support for the copy function.\n\nThe version of podman shipped in OpenShift Container Platform 4.2 was superseded by the version delivered Red Hat Enterprise Linux 8.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-docker-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-manpages-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-18466" }, { "category": "external", "summary": "RHBZ#1744588", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1744588" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-18466", "url": "https://www.cve.org/CVERecord?id=CVE-2019-18466" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-18466", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-18466" } ], "release_date": "2019-08-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-17T12:56:53+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-docker-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-manpages-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4269" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-docker-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-manpages-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "podman: resolving symlink in host filesystem leads to unexpected results of copy operation" } ] }
RHSA-2019:2861
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for gRPC, included in sriov-network-device-plugin-container, is now available for Red Hat OpenShift Container Platform 4.1.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains updates gRPC in the sriov-network-device-plugin container in Red Hat OpenShift Container Platform 4.1.18.\n\nSecurity Fix(es):\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:2861", "url": "https://access.redhat.com/errata/RHSA-2019:2861" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2861.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 4.1.18 gRPC security update", "tracking": { "current_release_date": "2025-03-15T19:43:48+00:00", "generator": { "date": "2025-03-15T19:43:48+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.1" } }, "id": "RHSA-2019:2861", "initial_release_date": "2019-09-26T17:19:31+00:00", "revision_history": [ { "date": "2019-09-26T17:19:31+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-09-26T17:19:31+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-03-15T19:43:48+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.1", "product": { "name": "Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.1::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "openshift4/ose-sriov-network-device-plugin@sha256:4493f9c75d46ecfcee81bbb0ca9c2579bac4ffb150b2255f8385eac50a885ca6_amd64", "product": { "name": "openshift4/ose-sriov-network-device-plugin@sha256:4493f9c75d46ecfcee81bbb0ca9c2579bac4ffb150b2255f8385eac50a885ca6_amd64", "product_id": "openshift4/ose-sriov-network-device-plugin@sha256:4493f9c75d46ecfcee81bbb0ca9c2579bac4ffb150b2255f8385eac50a885ca6_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-device-plugin@sha256:4493f9c75d46ecfcee81bbb0ca9c2579bac4ffb150b2255f8385eac50a885ca6?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-device-plugin\u0026tag=v4.1.18-201909201915" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-device-plugin@sha256:4493f9c75d46ecfcee81bbb0ca9c2579bac4ffb150b2255f8385eac50a885ca6_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-network-device-plugin@sha256:4493f9c75d46ecfcee81bbb0ca9c2579bac4ffb150b2255f8385eac50a885ca6_amd64" }, "product_reference": "openshift4/ose-sriov-network-device-plugin@sha256:4493f9c75d46ecfcee81bbb0ca9c2579bac4ffb150b2255f8385eac50a885ca6_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-network-device-plugin@sha256:4493f9c75d46ecfcee81bbb0ca9c2579bac4ffb150b2255f8385eac50a885ca6_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-26T17:19:31+00:00", "details": "For OpenShift Container Platform 4.1 see the following documentation, which\nwill be updated shortly for release 4.1.18, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-release-notes.html", "product_ids": [ "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-network-device-plugin@sha256:4493f9c75d46ecfcee81bbb0ca9c2579bac4ffb150b2255f8385eac50a885ca6_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2861" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-network-device-plugin@sha256:4493f9c75d46ecfcee81bbb0ca9c2579bac4ffb150b2255f8385eac50a885ca6_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-network-device-plugin@sha256:4493f9c75d46ecfcee81bbb0ca9c2579bac4ffb150b2255f8385eac50a885ca6_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-26T17:19:31+00:00", "details": "For OpenShift Container Platform 4.1 see the following documentation, which\nwill be updated shortly for release 4.1.18, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-release-notes.html", "product_ids": [ "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-network-device-plugin@sha256:4493f9c75d46ecfcee81bbb0ca9c2579bac4ffb150b2255f8385eac50a885ca6_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2861" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-network-device-plugin@sha256:4493f9c75d46ecfcee81bbb0ca9c2579bac4ffb150b2255f8385eac50a885ca6_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-network-device-plugin@sha256:4493f9c75d46ecfcee81bbb0ca9c2579bac4ffb150b2255f8385eac50a885ca6_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-26T17:19:31+00:00", "details": "For OpenShift Container Platform 4.1 see the following documentation, which\nwill be updated shortly for release 4.1.18, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-release-notes.html", "product_ids": [ "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-network-device-plugin@sha256:4493f9c75d46ecfcee81bbb0ca9c2579bac4ffb150b2255f8385eac50a885ca6_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2861" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-network-device-plugin@sha256:4493f9c75d46ecfcee81bbb0ca9c2579bac4ffb150b2255f8385eac50a885ca6_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" } ] }
rhsa-2020_3196
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat Decision Manager.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Decision Manager is an open source decision management platform that combines business rules management, complex event processing, Decision Model \u0026 Notation (DMN) execution, and Business Optimizer for solving planning problems. It automates business decisions and makes that logic available to the entire business. \n\nThis release of Red Hat Decision Manager 7.8.0 serves as an update to Red Hat Decision Manager 7.7.1, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* netty: HTTP request smuggling (CVE-2019-20444)\n\n* netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers (CVE-2019-16869)\n\n* netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling (CVE-2020-7238)\n\n* netty: HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)\n\n* netty: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* netty: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* netty: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header (CVE-2019-20445)\n\n* cxf-core: cxf: does not restrict the number of message attachments (CVE-2019-12406)\n\n* cxf-core: cxf: OpenId Connect token service does not properly validate the clientId (CVE-2019-12423)\n\n* cxf-core: cxf: reflected XSS in the services listing page (CVE-2019-17573)\n\n* jackson-databind: lacks certain net.sf.ehcache blocking (CVE-2019-20330)\n\n* jackson-databind: Lacks certain xbean-reflect/JNDI blocking (CVE-2020-8840)\n\n* jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution (CVE-2020-10672)\n\n* jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution (CVE-2020-10673)\n\n* jackson-databind: Serialization gadgets in anteros-core (CVE-2020-9548)\n\n* jackson-databind: Serialization gadgets in commons-jelly:commons-jelly (CVE-2020-11620)\n\n* jackson-databind: Serialization gadgets in ibatis-sqlmap (CVE-2020-9547)\n\n* jackson-databind: Serialization gadgets in javax.swing.JEditorPane (CVE-2020-10969)\n\n* jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider (CVE-2020-10968)\n\n* jackson-databind: Serialization gadgets in org.apache.activemq.jms.pool.XaPooledConnectionFactory (CVE-2020-11111)\n\n* jackson-databind: Serialization gadgets in org.apache.commons.proxy.provider.remoting.RmiProvider (CVE-2020-11112)\n\n* jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime (CVE-2020-11113)\n\n* jackson-databind: Serialization gadgets in org.springframework:spring-aop (CVE-2020-11619)\n\n* jackson-databind: Serialization gadgets in shaded-hikari-config (CVE-2020-9546)\n\n* jackson-databind: serialization in oadd.org.apache.xalan.lib.sql.JNDIConnectionPool (CVE-2020-14060)\n\n* jackson-databind: serialization in weblogic/oracle-aqjms (CVE-2020-14061)\n\n* jackson-databind: serialization in com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool (CVE-2020-14062)\n\n* netty: compression/decompression codecs don\u0027t enforce limits on buffer allocation sizes (CVE-2020-11612)\n\n* quartz: libquartz: XXE attacks via job description (CVE-2019-13990)\n\n* keycloak: security issue on reset credential flow (CVE-2020-1718)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:3196", "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=rhdm\u0026version=7.8.0", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=rhdm\u0026version=7.8.0" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_decision_manager/7.8/html/release_notes_for_red_hat_decision_manager_7.8/index", "url": "https://access.redhat.com/documentation/en-us/red_hat_decision_manager/7.8/html/release_notes_for_red_hat_decision_manager_7.8/index" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "1758619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758619" }, { "category": "external", "summary": "1793154", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793154" }, { "category": "external", "summary": "1796225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796225" }, { "category": "external", "summary": "1796756", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796756" }, { "category": "external", "summary": "1797006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1797006" }, { "category": "external", "summary": "1797011", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1797011" }, { "category": "external", "summary": "1798509", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798509" }, { "category": "external", "summary": "1798524", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798524" }, { "category": "external", "summary": "1801149", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1801149" }, { "category": "external", "summary": "1815470", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1815470" }, { "category": "external", "summary": "1815495", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1815495" }, { "category": "external", "summary": "1816170", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816170" }, { "category": "external", "summary": "1816216", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816216" }, { "category": "external", "summary": "1816330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816330" }, { "category": "external", "summary": "1816332", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816332" }, { "category": "external", "summary": "1816337", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816337" }, { "category": "external", "summary": "1816340", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816340" }, { "category": "external", "summary": "1819208", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819208" }, { "category": "external", "summary": "1819212", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819212" }, { "category": "external", "summary": "1821304", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821304" }, { "category": "external", "summary": "1821311", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821311" }, { "category": "external", "summary": "1821315", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821315" }, { "category": "external", "summary": "1826798", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1826798" }, { "category": "external", "summary": "1826805", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1826805" }, { "category": "external", "summary": "1848960", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848960" }, { "category": "external", "summary": "1848962", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848962" }, { "category": "external", "summary": "1848966", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848966" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_3196.json" } ], "title": "Red Hat Security Advisory: Red Hat Decision Manager 7.8.0 Security Update", "tracking": { "current_release_date": "2024-12-29T18:38:57+00:00", "generator": { "date": "2024-12-29T18:38:57+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.4" } }, "id": "RHSA-2020:3196", "initial_release_date": "2020-07-29T06:06:57+00:00", "revision_history": [ { "date": "2020-07-29T06:06:57+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-07-29T06:06:57+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-29T18:38:57+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Decision Manager 7", "product": { "name": "Red Hat Decision Manager 7", "product_id": "Red Hat Decision Manager 7", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_brms_platform:7.8" } } } ], "category": "product_family", "name": "Red Hat Decision Manager" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9518", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735749" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using frames with an empty payload, a flood could occur that results in excessive CPU usage and starvation of other clients. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using empty frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9518" }, { "category": "external", "summary": "RHBZ#1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9518", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using empty frames results in excessive resource consumption" }, { "cve": "CVE-2019-12406", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-03-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816170" } ], "notes": [ { "category": "description", "text": "Apache CXF before 3.3.4 and 3.2.11 does not restrict the number of message attachments present in a given message. This leaves open the possibility of a denial of service type attack, where a malicious user crafts a message containing a very large number of message attachments. From the 3.3.4 and 3.2.11 releases, a default limit of 50 message attachments is enforced. This is configurable via the message property \"attachment-max-count\".", "title": "Vulnerability description" }, { "category": "summary", "text": "cxf: does not restrict the number of message attachments", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-12406" }, { "category": "external", "summary": "RHBZ#1816170", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816170" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-12406", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12406" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-12406", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12406" } ], "release_date": "2019-11-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "cxf: does not restrict the number of message attachments" }, { "cve": "CVE-2019-12423", "cwe": { "id": "CWE-522", "name": "Insufficiently Protected Credentials" }, "discovery_date": "2020-01-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1797006" } ], "notes": [ { "category": "description", "text": "Apache CXF ships with a OpenId Connect JWK Keys service, which allows a client to obtain the public keys in JWK format, which can then be used to verify the signature of tokens issued by the service. Typically, the service obtains the public key from a local keystore (JKS/PKCS12) by specifing the path of the keystore and the alias of the keystore entry. This case is not vulnerable. However it is also possible to obtain the keys from a JWK keystore file, by setting the configuration parameter \"rs.security.keystore.type\" to \"jwk\". For this case all keys are returned in this file \"as is\", including all private key and secret key credentials. This is an obvious security risk if the user has configured the signature keystore file with private or secret key credentials. From CXF 3.3.5 and 3.2.12, it is mandatory to specify an alias corresponding to the id of the key in the JWK file, and only this key is returned. In addition, any private key information is omitted by default. \"oct\" keys, which contain secret keys, are not returned at all.", "title": "Vulnerability description" }, { "category": "summary", "text": "cxf: OpenId Connect token service does not properly validate the clientId", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-12423" }, { "category": "external", "summary": "RHBZ#1797006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1797006" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-12423", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12423" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-12423", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12423" } ], "release_date": "2020-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "cxf: OpenId Connect token service does not properly validate the clientId" }, { "cve": "CVE-2019-13990", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "discovery_date": "2019-07-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1801149" } ], "notes": [ { "category": "description", "text": "The Terracotta Quartz Scheduler is susceptible to an XML external entity attack (XXE) through a job description. This issue stems from inadequate handling of XML external entity (XXE) declarations in the initDocumentParser function within xml/XMLSchedulingDataProcessor.java. By enticing a victim to access a maliciously crafted job description (containing XML content), a remote attacker could exploit this vulnerability to execute an XXE attack on the targeted system.", "title": "Vulnerability description" }, { "category": "summary", "text": "libquartz: XXE attacks via job description", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 uses a vulnerable version of libquartz as a dependency for Candlepin. However, the \u003cjob\u003e\u003cdescrition\u003e entry is not used, and the vulnerability can not be triggered. An update may fix the code in the future.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-13990" }, { "category": "external", "summary": "RHBZ#1801149", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1801149" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-13990", "url": "https://www.cve.org/CVERecord?id=CVE-2019-13990" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-13990", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-13990" } ], "release_date": "2019-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libquartz: XXE attacks via job description" }, { "cve": "CVE-2019-16869", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2019-09-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1758619" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty, where whitespace before the colon in HTTP headers is mishandled. This flaw allows an attacker to cause HTTP request smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that this vulnerability does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships vulnerable netty version embedded in Candlepin, however, is not directly vulnerable since HTTP requests are handled by Tomcat and not netty.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-16869" }, { "category": "external", "summary": "RHBZ#1758619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758619" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16869", "url": "https://www.cve.org/CVERecord?id=CVE-2019-16869" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16869", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16869" } ], "release_date": "2019-09-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers" }, { "cve": "CVE-2019-17573", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2020-01-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1797011" } ], "notes": [ { "category": "description", "text": "By default, Apache CXF creates a /services page containing a listing of the available endpoint names and addresses. This webpage is vulnerable to a reflected Cross-Site Scripting (XSS) attack, which allows a malicious actor to inject javascript into the web page. Please note that the attack exploits a feature which is not typically not present in modern browsers, who remove dot segments before sending the request. However, Mobile applications may be vulnerable.", "title": "Vulnerability description" }, { "category": "summary", "text": "cxf: reflected XSS in the services listing page", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-17573" }, { "category": "external", "summary": "RHBZ#1797011", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1797011" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-17573", "url": "https://www.cve.org/CVERecord?id=CVE-2019-17573" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-17573", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17573" } ], "release_date": "2020-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "Mitigate this flaw by disabling the service listing altogether; via setting the \"hide-service-list-page\" servlet parameter to \"true\".", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "cxf: reflected XSS in the services listing page" }, { "cve": "CVE-2019-20330", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-01-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1793154" } ], "notes": [ { "category": "description", "text": "FasterXML jackson-databind 2.x before 2.9.10.2 lacks certain net.sf.ehcache blocking.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: lacks certain net.sf.ehcache blocking", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20330" }, { "category": "external", "summary": "RHBZ#1793154", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793154" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20330", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20330" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20330", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20330" } ], "release_date": "2020-01-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: lacks certain net.sf.ehcache blocking" }, { "cve": "CVE-2019-20444", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1798524" } ], "notes": [ { "category": "description", "text": "A HTTP smuggling flaw was found in HttpObjectDecoder.java in Netty in versions prior to version 4.1.44. HTTP headers with an invalid fold, in this case CRLF (carriage return, line feed) without being followed by SP (space) or HTAB (horizontal tab), result in situations where headers can be misread. Data integrity is the highest threat with this vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP request smuggling", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that the previous vulnerability, CVE-2019-16869, does not pose a substantial practical threat to ElasticSearch 6. We agree that these issues would be difficult to exploit on OpenShift Container Platform so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships a vulnerable version of netty embedded in Candlepin. However, the flaw can not be triggered in that context, because HTTP requests are handled by Tomcat, not by netty. A future release may fix this.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20444" }, { "category": "external", "summary": "RHBZ#1798524", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798524" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20444", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20444" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20444", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20444" }, { "category": "external", "summary": "https://github.com/elastic/elasticsearch/issues/49396", "url": "https://github.com/elastic/elasticsearch/issues/49396" } ], "release_date": "2020-01-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP request smuggling" }, { "cve": "CVE-2019-20445", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1798509" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty before version 4.1.44, where it accepted multiple Content-Length headers and also accepted both Transfer-Encoding, as well as Content-Length headers where it should reject the message under such circumstances. In circumstances where Netty is used in the context of a server, it could result in a viable HTTP smuggling vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that the previous vulnerability, CVE-2019-16869, does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit both these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships a vulnerable version of netty embedded in Candlepin. However, the flaw can not be triggered in that context, because HTTP requests are handled by Tomcat, not by netty. A future release may fix this.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20445" }, { "category": "external", "summary": "RHBZ#1798509", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798509" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20445", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20445" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20445", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20445" } ], "release_date": "2020-01-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header" }, { "cve": "CVE-2020-1718", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2020-01-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1796756" } ], "notes": [ { "category": "description", "text": "A flaw was found in the reset credential flow in Keycloak. This flaw allows an attacker to gain unauthorized access to the application.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak: security issue on reset credential flow", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-1718" }, { "category": "external", "summary": "RHBZ#1796756", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796756" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-1718", "url": "https://www.cve.org/CVERecord?id=CVE-2020-1718" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1718", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1718" } ], "release_date": "2020-05-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "Disable reset credential flow.", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "keycloak: security issue on reset credential flow" }, { "cve": "CVE-2020-7238", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1796225" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty, where it mishandles Transfer-Encoding whitespace. This flaw allows HTTP Request Smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that the previous vulnerability, CVE-2019-16869, does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit both these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships vulnerable netty version embedded in Candlepin, however, is not directly vulnerable since HTTP requests are handled by Tomcat and not netty.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-7238" }, { "category": "external", "summary": "RHBZ#1796225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796225" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-7238", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7238" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7238", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7238" }, { "category": "external", "summary": "https://netty.io/news/2019/12/18/4-1-44-Final.html", "url": "https://netty.io/news/2019/12/18/4-1-44-Final.html" } ], "release_date": "2020-01-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling" }, { "cve": "CVE-2020-8840", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816330" } ], "notes": [ { "category": "description", "text": "A flaw was found in FasterXML jackson-databind in versions 2.0.0 through 2.9.10.2. A \"gadget\" exploit is possible due to a lack of a Java object being blocking from being deserialized. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Lacks certain xbean-reflect/JNDI blocking", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8840" }, { "category": "external", "summary": "RHBZ#1816330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816330" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8840", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8840" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8840", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8840" } ], "release_date": "2020-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Lacks certain xbean-reflect/JNDI blocking" }, { "cve": "CVE-2020-9546", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816332" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in shaded-hikari-config", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9546" }, { "category": "external", "summary": "RHBZ#1816332", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816332" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9546", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9546" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9546", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9546" } ], "release_date": "2020-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in shaded-hikari-config" }, { "cve": "CVE-2020-9547", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816337" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in ibatis-sqlmap", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9547" }, { "category": "external", "summary": "RHBZ#1816337", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816337" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9547", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9547" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9547", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9547" } ], "release_date": "2020-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in ibatis-sqlmap" }, { "cve": "CVE-2020-9548", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816340" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in anteros-core", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9548" }, { "category": "external", "summary": "RHBZ#1816340", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816340" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9548", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9548" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9548", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9548" } ], "release_date": "2020-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in anteros-core" }, { "cve": "CVE-2020-10672", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2020-03-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1815495" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10672" }, { "category": "external", "summary": "RHBZ#1815495", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1815495" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10672", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10672" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10672", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10672" } ], "release_date": "2020-03-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution" }, { "cve": "CVE-2020-10673", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2020-03-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1815470" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time. Additionally, the gadget is not available within Red Hat Openstack Platform\u0027s OpenDaylight.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10673" }, { "category": "external", "summary": "RHBZ#1815470", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1815470" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10673", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10673" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10673", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10673" } ], "release_date": "2020-03-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution" }, { "cve": "CVE-2020-10968", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1819208" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x prior to version 2.9.10.4. The interaction between serialization gadgets and typing is mishandled in the bus-proxy. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10968" }, { "category": "external", "summary": "RHBZ#1819208", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819208" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10968", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10968" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10968", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10968" } ], "release_date": "2020-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider" }, { "cve": "CVE-2020-10969", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1819212" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in javax.swing.JEditorPane", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10969" }, { "category": "external", "summary": "RHBZ#1819212", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819212" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10969", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10969" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10969", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10969" } ], "release_date": "2020-03-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in javax.swing.JEditorPane" }, { "cve": "CVE-2020-11111", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2020-03-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1821304" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.apache.activemq.jms.pool.XaPooledConnectionFactory", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11111" }, { "category": "external", "summary": "RHBZ#1821304", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821304" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11111", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11111" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11111", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11111" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/2664", "url": "https://github.com/FasterXML/jackson-databind/issues/2664" } ], "release_date": "2020-03-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in org.apache.activemq.jms.pool.XaPooledConnectionFactory" }, { "cve": "CVE-2020-11112", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2020-03-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1821311" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.apache.commons.proxy.provider.remoting.RmiProvider", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11112" }, { "category": "external", "summary": "RHBZ#1821311", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821311" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11112", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11112" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11112", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11112" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/2666", "url": "https://github.com/FasterXML/jackson-databind/issues/2666" } ], "release_date": "2020-03-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in org.apache.commons.proxy.provider.remoting.RmiProvider" }, { "cve": "CVE-2020-11113", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2020-03-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1821315" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11113" }, { "category": "external", "summary": "RHBZ#1821315", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821315" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11113", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11113" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11113", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11113" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/2670", "url": "https://github.com/FasterXML/jackson-databind/issues/2670" } ], "release_date": "2020-03-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime" }, { "cve": "CVE-2020-11612", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-03-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816216" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty in the way it handles the amount of data it compresses and decompresses. The Compression/Decompression codecs should enforce memory allocation size limits to avoid an Out of Memory Error (OOME) or exhaustion of the memory pool.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: compression/decompression codecs don\u0027t enforce limits on buffer allocation sizes", "title": "Vulnerability summary" }, { "category": "other", "text": "In OpenShift Container Platform end users don\u0027t have direct access to send requests to ElasticSearch. A user could need access to the ElasticSearch service on the internal cluster network in order to be able to send malicious requests to it.\n\n\nThird party scanners flagging Red Hat Satellite due to availability of the higher version packages in Red Hat AMQ Clients (through errata RHSA-2020:2605) compare to the qpid packages from Satellite Tools repository. qpid dependency fixed in errata RHSA-2020:2605 was for Red Hat AMQ Clients and it doesn\u0027t necessarily mean that packages from Satellite Tools are affected. These are two different products with different architecture and code-base. Updating the packages from any other repository than the Satellite-tools repository is not recommended for Satellite Customers. \n\nRed Hat Satellite 6.7 and earlier ship affected version of netty, however, there is no external connection being exposed and it is used by only Artemis to open an internal connection within the JVM. Since netty does not come into contact with untrusted data, vulnerability is not exposed in product code and there is no breach of Confidentiality, Integrity or Availability expected from this vulnerability. We may update the netty and its dependency in a future release.\n\nMore information regarding Satellite related packages can be found on KCS: https://access.redhat.com/solutions/5200591", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11612" }, { "category": "external", "summary": "RHBZ#1816216", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816216" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11612", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11612" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11612", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11612" } ], "release_date": "2020-01-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "netty: compression/decompression codecs don\u0027t enforce limits on buffer allocation sizes" }, { "cve": "CVE-2020-11619", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-04-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1826805" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.springframework:spring-aop", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11619" }, { "category": "external", "summary": "RHBZ#1826805", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1826805" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11619", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11619" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11619", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11619" } ], "release_date": "2020-04-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in org.springframework:spring-aop" }, { "cve": "CVE-2020-11620", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-04-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1826798" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in commons-jelly:commons-jelly", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11620" }, { "category": "external", "summary": "RHBZ#1826798", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1826798" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11620", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11620" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11620", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11620" } ], "release_date": "2020-04-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in commons-jelly:commons-jelly" }, { "cve": "CVE-2020-14060", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-06-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1848960" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.5. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: serialization in oadd.org.apache.xalan.lib.sql.JNDIConnectionPool", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 and Red Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.\n\nThe version of jackson-databind as shipped in Red Hat Software Collections rh-maven35 is used only while building maven, thus it does not deserialize data coming from untrusted sources, lowering the impact of the vulnerability for the Product.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14060" }, { "category": "external", "summary": "RHBZ#1848960", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848960" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14060", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14060" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14060", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14060" } ], "release_date": "2020-05-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* enableDefaultTyping()\n* @JsonTypeInfo using id.CLASS or id.MINIMAL_CLASS\n* oadd.org.apache.xalan.lib.sql.JNDIConnectionPool in classpath", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: serialization in oadd.org.apache.xalan.lib.sql.JNDIConnectionPool" }, { "cve": "CVE-2020-14061", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-06-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1848966" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.5. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: serialization in weblogic/oracle-aqjms", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 and Red Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.\n\nThe version of jackson-databind as shipped in Red Hat Software Collections rh-maven35 is used only while building maven, thus it does not deserialize data coming from untrusted sources, lowering the impact of the vulnerability for the Product.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14061" }, { "category": "external", "summary": "RHBZ#1848966", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848966" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14061", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14061" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14061", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14061" } ], "release_date": "2020-05-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* enableDefaultTyping()\n* @JsonTypeInfo using id.CLASS or id.MINIMAL_CLASS\n* oracle.jms.AQjms*ConnectionFactory in classpath", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: serialization in weblogic/oracle-aqjms" }, { "cve": "CVE-2020-14062", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-06-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1848962" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.5. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: serialization in com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 and Red Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.\n\nThe version of jackson-databind as shipped in Red Hat Software Collections rh-maven35 is used only while building maven, thus it does not deserialize data coming from untrusted sources, lowering the impact of the vulnerability for the Product.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14062" }, { "category": "external", "summary": "RHBZ#1848962", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848962" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14062", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14062" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14062", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14062" } ], "release_date": "2020-05-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* enableDefaultTyping()\n* @JsonTypeInfo using id.CLASS or id.MINIMAL_CLASS\n* com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool in classpath", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: serialization in com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool" } ] }
rhsa-2019_2766
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for gRPC, included in multus-cni-container, operator-lifecycle-manager-container, and operator-registry-container is now available for Red Hat OpenShift Container Platform 4.1.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains updated container images for multus-cni, operator-lifecycle-manager, and operator-registry in Red Hat OpenShift Container Platform 4.1.15. Each of these container images includes gRPC, which has been updated with the below fixes.\n\nSecurity Fix(es):\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:2766", "url": "https://access.redhat.com/errata/RHSA-2019:2766" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2766.json" } ], "title": "Red Hat Security Advisory: Red Hat OpenShift Enterprise 4.1.15 gRPC security update", "tracking": { "current_release_date": "2024-11-13T22:09:31+00:00", "generator": { "date": "2024-11-13T22:09:31+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2019:2766", "initial_release_date": "2019-09-12T18:32:52+00:00", "revision_history": [ { "date": "2019-09-12T18:32:52+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-09-12T18:32:52+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-13T22:09:31+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.1", "product": { "name": "Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.1::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "openshift4/ose-multus-cni@sha256:38bc93888a2577e90168a0d4f7996d43f38878e11db255b26e58f5aa50b9df56_amd64", "product": { "name": "openshift4/ose-multus-cni@sha256:38bc93888a2577e90168a0d4f7996d43f38878e11db255b26e58f5aa50b9df56_amd64", "product_id": "openshift4/ose-multus-cni@sha256:38bc93888a2577e90168a0d4f7996d43f38878e11db255b26e58f5aa50b9df56_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-multus-cni@sha256:38bc93888a2577e90168a0d4f7996d43f38878e11db255b26e58f5aa50b9df56?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-cni\u0026tag=v4.1.15-201909041605" } } }, { "category": "product_version", "name": "openshift4/ose-operator-lifecycle-manager@sha256:0eca3cf5068a4c366f8f8a0fd4891d9cd86fe239764d189d37b8938196e323a1_amd64", "product": { "name": "openshift4/ose-operator-lifecycle-manager@sha256:0eca3cf5068a4c366f8f8a0fd4891d9cd86fe239764d189d37b8938196e323a1_amd64", "product_id": "openshift4/ose-operator-lifecycle-manager@sha256:0eca3cf5068a4c366f8f8a0fd4891d9cd86fe239764d189d37b8938196e323a1_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-operator-lifecycle-manager@sha256:0eca3cf5068a4c366f8f8a0fd4891d9cd86fe239764d189d37b8938196e323a1?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-lifecycle-manager\u0026tag=v4.1.15-201909041605" } } }, { "category": "product_version", "name": "openshift4/ose-operator-registry@sha256:79a386249506345846398f6bb26963f2d1e19dde1242003f42332718847be9c5_amd64", "product": { "name": "openshift4/ose-operator-registry@sha256:79a386249506345846398f6bb26963f2d1e19dde1242003f42332718847be9c5_amd64", "product_id": "openshift4/ose-operator-registry@sha256:79a386249506345846398f6bb26963f2d1e19dde1242003f42332718847be9c5_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-operator-registry@sha256:79a386249506345846398f6bb26963f2d1e19dde1242003f42332718847be9c5?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-registry\u0026tag=v4.1.15-201909041605" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-cni@sha256:38bc93888a2577e90168a0d4f7996d43f38878e11db255b26e58f5aa50b9df56_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-cni@sha256:38bc93888a2577e90168a0d4f7996d43f38878e11db255b26e58f5aa50b9df56_amd64" }, "product_reference": "openshift4/ose-multus-cni@sha256:38bc93888a2577e90168a0d4f7996d43f38878e11db255b26e58f5aa50b9df56_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-lifecycle-manager@sha256:0eca3cf5068a4c366f8f8a0fd4891d9cd86fe239764d189d37b8938196e323a1_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-lifecycle-manager@sha256:0eca3cf5068a4c366f8f8a0fd4891d9cd86fe239764d189d37b8938196e323a1_amd64" }, "product_reference": "openshift4/ose-operator-lifecycle-manager@sha256:0eca3cf5068a4c366f8f8a0fd4891d9cd86fe239764d189d37b8938196e323a1_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-registry@sha256:79a386249506345846398f6bb26963f2d1e19dde1242003f42332718847be9c5_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-registry@sha256:79a386249506345846398f6bb26963f2d1e19dde1242003f42332718847be9c5_amd64" }, "product_reference": "openshift4/ose-operator-registry@sha256:79a386249506345846398f6bb26963f2d1e19dde1242003f42332718847be9c5_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-cni@sha256:38bc93888a2577e90168a0d4f7996d43f38878e11db255b26e58f5aa50b9df56_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-lifecycle-manager@sha256:0eca3cf5068a4c366f8f8a0fd4891d9cd86fe239764d189d37b8938196e323a1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-registry@sha256:79a386249506345846398f6bb26963f2d1e19dde1242003f42332718847be9c5_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-12T18:32:52+00:00", "details": "For OpenShift Container Platform 4.1 see the following documentation, which\nwill be updated shortly for release 4.1.z, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-release-notes.html", "product_ids": [ "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-cni@sha256:38bc93888a2577e90168a0d4f7996d43f38878e11db255b26e58f5aa50b9df56_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-lifecycle-manager@sha256:0eca3cf5068a4c366f8f8a0fd4891d9cd86fe239764d189d37b8938196e323a1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-registry@sha256:79a386249506345846398f6bb26963f2d1e19dde1242003f42332718847be9c5_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2766" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-cni@sha256:38bc93888a2577e90168a0d4f7996d43f38878e11db255b26e58f5aa50b9df56_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-lifecycle-manager@sha256:0eca3cf5068a4c366f8f8a0fd4891d9cd86fe239764d189d37b8938196e323a1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-registry@sha256:79a386249506345846398f6bb26963f2d1e19dde1242003f42332718847be9c5_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-cni@sha256:38bc93888a2577e90168a0d4f7996d43f38878e11db255b26e58f5aa50b9df56_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-lifecycle-manager@sha256:0eca3cf5068a4c366f8f8a0fd4891d9cd86fe239764d189d37b8938196e323a1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-registry@sha256:79a386249506345846398f6bb26963f2d1e19dde1242003f42332718847be9c5_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-12T18:32:52+00:00", "details": "For OpenShift Container Platform 4.1 see the following documentation, which\nwill be updated shortly for release 4.1.z, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-release-notes.html", "product_ids": [ "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-cni@sha256:38bc93888a2577e90168a0d4f7996d43f38878e11db255b26e58f5aa50b9df56_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-lifecycle-manager@sha256:0eca3cf5068a4c366f8f8a0fd4891d9cd86fe239764d189d37b8938196e323a1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-registry@sha256:79a386249506345846398f6bb26963f2d1e19dde1242003f42332718847be9c5_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2766" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-cni@sha256:38bc93888a2577e90168a0d4f7996d43f38878e11db255b26e58f5aa50b9df56_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-lifecycle-manager@sha256:0eca3cf5068a4c366f8f8a0fd4891d9cd86fe239764d189d37b8938196e323a1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-registry@sha256:79a386249506345846398f6bb26963f2d1e19dde1242003f42332718847be9c5_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-cni@sha256:38bc93888a2577e90168a0d4f7996d43f38878e11db255b26e58f5aa50b9df56_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-lifecycle-manager@sha256:0eca3cf5068a4c366f8f8a0fd4891d9cd86fe239764d189d37b8938196e323a1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-registry@sha256:79a386249506345846398f6bb26963f2d1e19dde1242003f42332718847be9c5_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-12T18:32:52+00:00", "details": "For OpenShift Container Platform 4.1 see the following documentation, which\nwill be updated shortly for release 4.1.z, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-release-notes.html", "product_ids": [ "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-cni@sha256:38bc93888a2577e90168a0d4f7996d43f38878e11db255b26e58f5aa50b9df56_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-lifecycle-manager@sha256:0eca3cf5068a4c366f8f8a0fd4891d9cd86fe239764d189d37b8938196e323a1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-registry@sha256:79a386249506345846398f6bb26963f2d1e19dde1242003f42332718847be9c5_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2766" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-cni@sha256:38bc93888a2577e90168a0d4f7996d43f38878e11db255b26e58f5aa50b9df56_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-lifecycle-manager@sha256:0eca3cf5068a4c366f8f8a0fd4891d9cd86fe239764d189d37b8938196e323a1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-registry@sha256:79a386249506345846398f6bb26963f2d1e19dde1242003f42332718847be9c5_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" } ] }
rhsa-2019_4018
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat JBoss Enterprise Application Platform 7.2 for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime.\n\nThis release of Red Hat JBoss Enterprise Application Platform 7.2.5 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.2.4, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.2.5 Release Notes for information about the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* undertow: HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511)\n\n* undertow: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* undertow: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* undertow: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default (CVE-2019-14838)\n\n* wildfly: wildfly-security-manager: security manager authorization bypass (CVE-2019-14843)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:4018", "url": "https://access.redhat.com/errata/RHSA-2019:4018" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/", "url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/html-single/installation_guide/", "url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/html-single/installation_guide/" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "1751227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751227" }, { "category": "external", "summary": "1752980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752980" }, { "category": "external", "summary": "JBEAP-17075", "url": "https://issues.redhat.com/browse/JBEAP-17075" }, { "category": "external", "summary": "JBEAP-17220", "url": "https://issues.redhat.com/browse/JBEAP-17220" }, { "category": "external", "summary": "JBEAP-17365", "url": "https://issues.redhat.com/browse/JBEAP-17365" }, { "category": "external", "summary": "JBEAP-17476", "url": "https://issues.redhat.com/browse/JBEAP-17476" }, { "category": "external", "summary": "JBEAP-17478", "url": "https://issues.redhat.com/browse/JBEAP-17478" }, { "category": "external", "summary": "JBEAP-17483", "url": "https://issues.redhat.com/browse/JBEAP-17483" }, { "category": "external", "summary": "JBEAP-17495", "url": "https://issues.redhat.com/browse/JBEAP-17495" }, { "category": "external", "summary": "JBEAP-17496", "url": "https://issues.redhat.com/browse/JBEAP-17496" }, { "category": "external", "summary": "JBEAP-17513", "url": "https://issues.redhat.com/browse/JBEAP-17513" }, { "category": "external", "summary": "JBEAP-17521", "url": "https://issues.redhat.com/browse/JBEAP-17521" }, { "category": "external", "summary": "JBEAP-17523", "url": "https://issues.redhat.com/browse/JBEAP-17523" }, { "category": "external", "summary": "JBEAP-17547", "url": "https://issues.redhat.com/browse/JBEAP-17547" }, { "category": "external", "summary": "JBEAP-17548", "url": "https://issues.redhat.com/browse/JBEAP-17548" }, { "category": "external", "summary": "JBEAP-17560", "url": "https://issues.redhat.com/browse/JBEAP-17560" }, { "category": "external", "summary": "JBEAP-17579", "url": "https://issues.redhat.com/browse/JBEAP-17579" }, { "category": "external", "summary": "JBEAP-17582", "url": "https://issues.redhat.com/browse/JBEAP-17582" }, { "category": "external", "summary": "JBEAP-17603", "url": "https://issues.redhat.com/browse/JBEAP-17603" }, { "category": "external", "summary": "JBEAP-17631", "url": "https://issues.redhat.com/browse/JBEAP-17631" }, { "category": "external", "summary": "JBEAP-17647", "url": "https://issues.redhat.com/browse/JBEAP-17647" }, { "category": "external", "summary": "JBEAP-17665", "url": "https://issues.redhat.com/browse/JBEAP-17665" }, { "category": "external", "summary": "JBEAP-17722", "url": "https://issues.redhat.com/browse/JBEAP-17722" }, { "category": "external", "summary": "JBEAP-17874", "url": "https://issues.redhat.com/browse/JBEAP-17874" }, { "category": "external", "summary": "JBEAP-17880", "url": "https://issues.redhat.com/browse/JBEAP-17880" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_4018.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 6 security update", "tracking": { "current_release_date": "2024-11-15T04:13:14+00:00", "generator": { "date": "2024-11-15T04:13:14+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2019:4018", "initial_release_date": "2019-11-26T19:57:07+00:00", "revision_history": [ { "date": "2019-11-26T19:57:07+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-11-26T19:57:07+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T04:13:14+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product": { "name": "Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el6" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" }, { "branches": [ { "category": "product_version", "name": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "product_id": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "product_id": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "product_id": "eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "product_id": "eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "product_id": "eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "product": { "name": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "product_id": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00003.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "product": { "name": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "product_id": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00002.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "product": { "name": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "product_id": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00005.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "product": { "name": "eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "product_id": "eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00005.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product": { "name": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product_id": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product": { "name": "eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product_id": "eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product": { "name": "eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product_id": "eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product": { "name": "eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product_id": "eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product": { "name": "eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product_id": "eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product": { "name": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product_id": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product": { "name": "eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product_id": "eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product": { "name": "eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product_id": "eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product": { "name": "eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product_id": "eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product": { "name": "eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product_id": "eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "product_id": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "product_id": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "product": { "name": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "product_id": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00002.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "product": { "name": "eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "product_id": "eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00002.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "product": { "name": "eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "product_id": "eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00002.1.el6eap?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "product": { "name": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "product_id": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "product": { "name": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "product_id": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00001.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "product": { "name": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "product_id": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00003.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "product": { "name": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "product_id": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00002.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "product": { "name": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "product_id": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "product": { "name": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "product_id": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "product": { "name": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "product_id": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "product": { "name": "eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "product_id": "eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "product": { "name": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "product_id": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "product": { "name": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "product_id": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "product": { "name": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "product_id": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "product": { "name": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "product_id": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00005.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "product": { "name": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "product_id": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "product": { "name": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "product_id": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "product": { "name": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "product_id": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "product": { "name": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "product_id": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "product": { "name": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "product_id": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "product": { "name": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "product_id": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src", "product": { "name": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src", "product_id": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00001.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "product": { "name": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "product_id": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "product": { "name": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "product_id": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "product": { "name": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "product_id": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00002.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "product": { "name": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "product_id": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "product": { "name": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "product_id": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=x86_64" } } }, { "category": "product_version", "name": "eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "product": { "name": "eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "product_id": "eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src" }, "product_reference": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch" }, "product_reference": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src" }, "product_reference": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch" }, "product_reference": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src" }, "product_reference": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src" }, "product_reference": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src" }, "product_reference": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src" }, "product_reference": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src" }, "product_reference": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src" }, "product_reference": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src" }, "product_reference": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src" }, "product_reference": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src" }, "product_reference": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch" }, "product_reference": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src" }, "product_reference": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch" }, "product_reference": "eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch" }, "product_reference": "eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch" }, "product_reference": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src" }, "product_reference": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch" }, "product_reference": "eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch" }, "product_reference": "eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch" }, "product_reference": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src" }, "product_reference": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch" }, "product_reference": "eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch" }, "product_reference": "eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch" }, "product_reference": "eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch" }, "product_reference": "eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch" }, "product_reference": "eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src" }, "product_reference": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src" }, "product_reference": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch" }, "product_reference": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src" }, "product_reference": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src" }, "product_reference": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src" }, "product_reference": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src" }, "product_reference": "eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch" }, "product_reference": "eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch" }, "product_reference": "eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src" }, "product_reference": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src" }, "product_reference": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64 as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64" }, "product_reference": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64 as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64" }, "product_reference": "eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" }, "product_reference": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-9511", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741860" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker can request a large amount of data by manipulating window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this queue can consume excess CPU, memory, or both, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: large amount of data requests leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "There are no mitigations available for nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "RHBZ#1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9511", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T19:57:07+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details about how to apply this update, which includes the changes described in this advisory, see:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4018" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: large amount of data requests leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T19:57:07+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details about how to apply this update, which includes the changes described in this advisory, see:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4018" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T19:57:07+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details about how to apply this update, which includes the changes described in this advisory, see:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4018" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T19:57:07+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details about how to apply this update, which includes the changes described in this advisory, see:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4018" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "F\u00e1bio Magalh\u00e3es de Andrade" ], "organization": "Sonda Ativas" }, { "names": [ "Juliano de Castro Santos", "Leonard Lunardi" ], "organization": "UnimedBH" } ], "cve": "CVE-2019-14838", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2019-08-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1751227" } ], "notes": [ { "category": "description", "text": "It was found that Wildfly users had default user permissions set incorrectly. A malicious user could use this flaw to access unauthorized controls for the application server.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14838" }, { "category": "external", "summary": "RHBZ#1751227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751227" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14838", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14838" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14838", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14838" }, { "category": "external", "summary": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14838", "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14838" } ], "release_date": "2019-10-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T19:57:07+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details about how to apply this update, which includes the changes described in this advisory, see:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4018" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default" }, { "cve": "CVE-2019-14843", "cwe": { "id": "CWE-592", "name": "CWE-592" }, "discovery_date": "2019-09-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1752980" } ], "notes": [ { "category": "description", "text": "A flaw was found in Wildfly Security Manager, running under JDK 11 or 8, that authorized requests for any requester. This flaw could be used by a malicious app deployed on the app server to access unauthorized information and possibly conduct further attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-security-manager: security manager authorization bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14843" }, { "category": "external", "summary": "RHBZ#1752980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752980" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14843", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14843" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14843", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14843" } ], "release_date": "2019-09-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T19:57:07+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details about how to apply this update, which includes the changes described in this advisory, see:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4018" }, { "category": "workaround", "details": "This flaw only affects the Security Manager running under JDK 11 or 8. To mitigate exposure to this flaw, do not run under those JDK versions.", "product_ids": [ "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "wildfly-security-manager: security manager authorization bypass" } ] }
rhsa-2019:2955
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for rh-nodejs8-nodejs is now available for Red Hat Software Collections.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.\n\nThe following packages have been upgraded to a later upstream version: rh-nodejs8-nodejs (8.16.1).\n\nSecurity Fix(es):\n\n* HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511)\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using PRIORITY frames results in excessive resource consumption (CVE-2019-9513)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* HTTP/2: 0-length headers lead to denial of service (CVE-2019-9516)\n\n* HTTP/2: request for large response leads to denial of service (CVE-2019-9517)\n\n* HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:2955", "url": "https://access.redhat.com/errata/RHSA-2019:2955" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735741" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2955.json" } ], "title": "Red Hat Security Advisory: rh-nodejs8-nodejs security update", "tracking": { "current_release_date": "2025-03-15T19:44:23+00:00", "generator": { "date": "2025-03-15T19:44:23+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.1" } }, "id": "RHSA-2019:2955", "initial_release_date": "2019-10-02T14:29:13+00:00", "revision_history": [ { "date": "2019-10-02T14:29:13+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-10-02T14:29:13+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-03-15T19:44:23+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } } ], "category": "product_family", "name": "Red Hat Software Collections" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs8-0:3.0-5.el7.ppc64le", "product": { "name": "rh-nodejs8-0:3.0-5.el7.ppc64le", "product_id": "rh-nodejs8-0:3.0-5.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "product": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "product_id": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "product": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "product_id": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "product": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "product_id": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "product": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "product_id": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "product": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "product_id": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "product": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "product_id": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs8-0:3.0-5.el7.s390x", "product": { "name": "rh-nodejs8-0:3.0-5.el7.s390x", "product_id": "rh-nodejs8-0:3.0-5.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs8-runtime-0:3.0-5.el7.s390x", "product": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.s390x", "product_id": "rh-nodejs8-runtime-0:3.0-5.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "product": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "product_id": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "product": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "product_id": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "product": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "product_id": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "product": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "product_id": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "product": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "product_id": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs8-0:3.0-5.el7.aarch64", "product": { "name": "rh-nodejs8-0:3.0-5.el7.aarch64", "product_id": "rh-nodejs8-0:3.0-5.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=aarch64" } } }, { "category": "product_version", "name": "rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "product": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "product_id": "rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=aarch64" } } }, { "category": "product_version", "name": "rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "product": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "product_id": "rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=aarch64" } } }, { "category": "product_version", "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "product": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "product_id": "rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=aarch64" } } }, { "category": "product_version", "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "product": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "product_id": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=aarch64" } } }, { "category": "product_version", "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "product": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "product_id": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=aarch64" } } }, { "category": "product_version", "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "product": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "product_id": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs8-0:3.0-5.el7.src", "product": { "name": "rh-nodejs8-0:3.0-5.el7.src", "product_id": "rh-nodejs8-0:3.0-5.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "product": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "product_id": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs8-0:3.0-5.el7.x86_64", "product": { "name": "rh-nodejs8-0:3.0-5.el7.x86_64", "product_id": "rh-nodejs8-0:3.0-5.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "product": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "product_id": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "product": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "product_id": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "product": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "product_id": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "product": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "product_id": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "product": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "product_id": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "product": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "product_id": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "product": { "name": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "product_id": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.src", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch" }, "product_reference": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch" }, "product_reference": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch" }, "product_reference": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch" }, "product_reference": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch" }, "product_reference": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.src", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch" }, "product_reference": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-9511", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741860" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker can request a large amount of data by manipulating window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this queue can consume excess CPU, memory, or both, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: large amount of data requests leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "There are no mitigations available for nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "RHBZ#1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9511", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-02T14:29:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2955" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: large amount of data requests leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-02T14:29:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2955" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9513", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735741" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker, using PRIORITY frames to flood the system, could cause excessive CPU usage and starvation of other clients. The largest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PRIORITY frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for packages nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9513" }, { "category": "external", "summary": "RHBZ#1735741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735741" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9513", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9513" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9513", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9513" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nghttp2.org/blog/2019/08/19/nghttp2-v1-39-2/", "url": "https://nghttp2.org/blog/2019/08/19/nghttp2-v1-39-2/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-02T14:29:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2955" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PRIORITY frames results in excessive resource consumption" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-02T14:29:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2955" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-02T14:29:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2955" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "cve": "CVE-2019-9516", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741864" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker, sending a stream of header with a 0-length header name and a 0-length header value, could cause some implementations to allocate memory for these headers and keep the allocations alive until the session dies. The can consume excess memory, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: 0-length headers lead to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9516" }, { "category": "external", "summary": "RHBZ#1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9516", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9516" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://github.com/nghttp2/nghttp2/issues/1382#", "url": "https://github.com/nghttp2/nghttp2/issues/1382#" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-02T14:29:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2955" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: 0-length headers lead to denial of service" }, { "cve": "CVE-2019-9517", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741868" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in HTTP/2. An attacker can open a HTTP/2 window so the peer can send without constraint. The TCP window remains closed so the peer cannot write the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the server\u0027s queue is setup, the responses can consume excess memory, CPU, or both, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: request for large response leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "The package httpd versions as shipped with Red Hat Enterprise Linux 5, 6 and 7 are not affected by this issue as HTTP/2 support is not provided.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9517" }, { "category": "external", "summary": "RHBZ#1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9517", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9517" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-02T14:29:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2955" }, { "category": "workaround", "details": "The httpd version shipped with Red Hat Enterprise Linux 8 provides HTTP/2 support through mod_http2 package. While mod_http2 package is not updated, users can disable HTTP/2 support as mitigation action by executing the following steps:\n\n1. Stop httpd service:\n$ systemctl stop httpd\n\n2. Remove http/2 protocol support from configuration files:\n$ sed -i \u0027s/\\(h2\\)\\|\\(h2c\\)//g\u0027 \u003chttpd_config_file\u003e\n\n3. Validate configuration files to make sure all syntax is valid:\n$ apachectl configtest\n\n4. Restart httpd service:\n$ systemctl start httpd", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: request for large response leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9518", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735749" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using frames with an empty payload, a flood could occur that results in excessive CPU usage and starvation of other clients. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using empty frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9518" }, { "category": "external", "summary": "RHBZ#1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9518", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-02T14:29:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2955" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using empty frames results in excessive resource consumption" } ] }
rhsa-2019:2594
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat OpenShift Container Platform 4.1.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the container images for Red Hat\nOpenShift Container Platform 4.1.14. All container images have been rebuilt with updated versions of golang. See the following advisory for the\nRPM packages for this release:\n\nhttps://access.redhat.com/errata/RHBA-2019:2660\n\nSecurity Fix(es):\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nThis release also includes the following bugs: \n\n* Previously, users would see an error in the web console when navigating to the ClusterResourceQuota instances from the CRD list. The problem has been fixed, and you can now successfully list ClusterResourceQuota instances from the CRD page. (BZ#1743259)\n\nSpace precludes documenting all of the container images in this advisory.\nSee the following Release Notes documentation, which will be updated\nshortly for this release, for details about these changes:\n\nhttps://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-rel\nease-notes.html\n\nYou may download the oc tool and use it to inspect release image metadata\nas follows:\n\n $ oc adm release info quay.io/openshift-release-dev/ocp-release:4.1.14\n\nThe image digest is sha256:fd41c9bda9e0ff306954f1fd7af6428edff8c3989b75f9fe984968db66846231\n\nAll OpenShift Container Platform 4.1 users are advised to upgrade to these\nupdated packages and images.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:2594", "url": "https://access.redhat.com/errata/RHSA-2019:2594" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1717794", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1717794" }, { "category": "external", "summary": "1729510", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1729510" }, { "category": "external", "summary": "1735363", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735363" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1737156", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1737156" }, { "category": "external", "summary": "1737164", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1737164" }, { "category": "external", "summary": "1737386", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1737386" }, { "category": "external", "summary": "1740044", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1740044" }, { "category": "external", "summary": "1741067", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741067" }, { "category": "external", "summary": "1741499", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741499" }, { "category": "external", "summary": "1741694", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741694" }, { "category": "external", "summary": "1743119", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1743119" }, { "category": "external", "summary": "1743259", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1743259" }, { "category": "external", "summary": "1743418", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1743418" }, { "category": "external", "summary": "1743587", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1743587" }, { "category": "external", "summary": "1743748", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1743748" }, { "category": "external", "summary": "1743771", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1743771" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2594.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 4.1.14 security and bug fix update", "tracking": { "current_release_date": "2025-03-19T15:00:09+00:00", "generator": { "date": "2025-03-19T15:00:09+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.1" } }, "id": "RHSA-2019:2594", "initial_release_date": "2019-09-10T15:58:57+00:00", "revision_history": [ { "date": "2019-09-10T15:58:57+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-09-10T15:58:57+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-03-19T15:00:09+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.1", "product": { "name": "Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.1::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "openshift4/ose-cluster-autoscaler@sha256:b995c30d43493a8d393282c760584605951048dbe395eeac6b6b1bec269ff3ad_amd64", "product": { "name": "openshift4/ose-cluster-autoscaler@sha256:b995c30d43493a8d393282c760584605951048dbe395eeac6b6b1bec269ff3ad_amd64", "product_id": "openshift4/ose-cluster-autoscaler@sha256:b995c30d43493a8d393282c760584605951048dbe395eeac6b6b1bec269ff3ad_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-autoscaler@sha256:b995c30d43493a8d393282c760584605951048dbe395eeac6b6b1bec269ff3ad?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-autoscaler\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-descheduler@sha256:f7527c56780840d4062768e88f098229effd9796639ad67f6cdf841941a7e4a1_amd64", "product": { "name": "openshift4/ose-descheduler@sha256:f7527c56780840d4062768e88f098229effd9796639ad67f6cdf841941a7e4a1_amd64", "product_id": "openshift4/ose-descheduler@sha256:f7527c56780840d4062768e88f098229effd9796639ad67f6cdf841941a7e4a1_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-descheduler@sha256:f7527c56780840d4062768e88f098229effd9796639ad67f6cdf841941a7e4a1?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-descheduler\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-baremetal-machine-controllers@sha256:d9ca5e81aa2fb401f9c5bfb63e85fc5d93ae1e657ab992e879a2b9d520f3fea3_amd64", "product": { "name": "openshift4/ose-baremetal-machine-controllers@sha256:d9ca5e81aa2fb401f9c5bfb63e85fc5d93ae1e657ab992e879a2b9d520f3fea3_amd64", "product_id": "openshift4/ose-baremetal-machine-controllers@sha256:d9ca5e81aa2fb401f9c5bfb63e85fc5d93ae1e657ab992e879a2b9d520f3fea3_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-baremetal-machine-controllers@sha256:d9ca5e81aa2fb401f9c5bfb63e85fc5d93ae1e657ab992e879a2b9d520f3fea3?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-machine-controllers\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-logging-operator@sha256:7926e2be0854ff3edac0ced6950a0be04ad26d46a5da638611457c3fe0f1a19a_amd64", "product": { "name": "openshift4/ose-cluster-logging-operator@sha256:7926e2be0854ff3edac0ced6950a0be04ad26d46a5da638611457c3fe0f1a19a_amd64", "product_id": "openshift4/ose-cluster-logging-operator@sha256:7926e2be0854ff3edac0ced6950a0be04ad26d46a5da638611457c3fe0f1a19a_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-logging-operator@sha256:7926e2be0854ff3edac0ced6950a0be04ad26d46a5da638611457c3fe0f1a19a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-logging-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-monitoring-operator@sha256:05d69056c09c34d095ccedc757ecf2692690c72d2bee4e6b6afc58b01ec55d9c_amd64", "product": { "name": "openshift4/ose-cluster-monitoring-operator@sha256:05d69056c09c34d095ccedc757ecf2692690c72d2bee4e6b6afc58b01ec55d9c_amd64", "product_id": "openshift4/ose-cluster-monitoring-operator@sha256:05d69056c09c34d095ccedc757ecf2692690c72d2bee4e6b6afc58b01ec55d9c_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-monitoring-operator@sha256:05d69056c09c34d095ccedc757ecf2692690c72d2bee4e6b6afc58b01ec55d9c?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-monitoring-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-network-operator@sha256:2561079cceff11035c216fea71c0a10622696266aa5a9323ef13806c91537a68_amd64", "product": { "name": "openshift4/ose-cluster-network-operator@sha256:2561079cceff11035c216fea71c0a10622696266aa5a9323ef13806c91537a68_amd64", "product_id": "openshift4/ose-cluster-network-operator@sha256:2561079cceff11035c216fea71c0a10622696266aa5a9323ef13806c91537a68_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-network-operator@sha256:2561079cceff11035c216fea71c0a10622696266aa5a9323ef13806c91537a68?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-network-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-node-tuning-operator@sha256:b6fa66947d674eb2fc12b38fb9355c43c57a484d85e56dd013960a760046b793_amd64", "product": { "name": "openshift4/ose-cluster-node-tuning-operator@sha256:b6fa66947d674eb2fc12b38fb9355c43c57a484d85e56dd013960a760046b793_amd64", "product_id": "openshift4/ose-cluster-node-tuning-operator@sha256:b6fa66947d674eb2fc12b38fb9355c43c57a484d85e56dd013960a760046b793_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-node-tuning-operator@sha256:b6fa66947d674eb2fc12b38fb9355c43c57a484d85e56dd013960a760046b793?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-node-tuning-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-version-operator@sha256:2d99cc15d95e08541d60ebc1966b534fda48d00ee69c7c226996ac407a813d6b_amd64", "product": { "name": "openshift4/ose-cluster-version-operator@sha256:2d99cc15d95e08541d60ebc1966b534fda48d00ee69c7c226996ac407a813d6b_amd64", "product_id": "openshift4/ose-cluster-version-operator@sha256:2d99cc15d95e08541d60ebc1966b534fda48d00ee69c7c226996ac407a813d6b_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-version-operator@sha256:2d99cc15d95e08541d60ebc1966b534fda48d00ee69c7c226996ac407a813d6b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-version-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-configmap-reloader@sha256:84bb7a8504eb34ff5e4e9ca92aab960c078ededed07ab0fe79620c0b9f32a51f_amd64", "product": { "name": "openshift4/ose-configmap-reloader@sha256:84bb7a8504eb34ff5e4e9ca92aab960c078ededed07ab0fe79620c0b9f32a51f_amd64", "product_id": "openshift4/ose-configmap-reloader@sha256:84bb7a8504eb34ff5e4e9ca92aab960c078ededed07ab0fe79620c0b9f32a51f_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-configmap-reloader@sha256:84bb7a8504eb34ff5e4e9ca92aab960c078ededed07ab0fe79620c0b9f32a51f?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-configmap-reloader\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-coredns@sha256:9a330c9540816c13ddbbc93e99107f3d2a194c79eae20d81e8b8d252e9282c14_amd64", "product": { "name": "openshift4/ose-coredns@sha256:9a330c9540816c13ddbbc93e99107f3d2a194c79eae20d81e8b8d252e9282c14_amd64", "product_id": "openshift4/ose-coredns@sha256:9a330c9540816c13ddbbc93e99107f3d2a194c79eae20d81e8b8d252e9282c14_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-coredns@sha256:9a330c9540816c13ddbbc93e99107f3d2a194c79eae20d81e8b8d252e9282c14?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-coredns\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-descheduler-operator@sha256:71ba5a71c71074c282634a6261825c57977abd4999cc03957b8c407808a72902_amd64", "product": { "name": "openshift4/ose-descheduler-operator@sha256:71ba5a71c71074c282634a6261825c57977abd4999cc03957b8c407808a72902_amd64", "product_id": "openshift4/ose-descheduler-operator@sha256:71ba5a71c71074c282634a6261825c57977abd4999cc03957b8c407808a72902_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-descheduler-operator@sha256:71ba5a71c71074c282634a6261825c57977abd4999cc03957b8c407808a72902?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-descheduler-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-elasticsearch-operator@sha256:6b153238aa96aa4128de68a8df8dde185ebb930d2cee6fe1c033ff7b713fb6f9_amd64", "product": { "name": "openshift4/ose-elasticsearch-operator@sha256:6b153238aa96aa4128de68a8df8dde185ebb930d2cee6fe1c033ff7b713fb6f9_amd64", "product_id": "openshift4/ose-elasticsearch-operator@sha256:6b153238aa96aa4128de68a8df8dde185ebb930d2cee6fe1c033ff7b713fb6f9_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-elasticsearch-operator@sha256:6b153238aa96aa4128de68a8df8dde185ebb930d2cee6fe1c033ff7b713fb6f9?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-elasticsearch-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-oauth-proxy@sha256:383360705efc0605760c3b2b1d0fa288094eb6dad8158c540d950f661b4ba880_amd64", "product": { "name": "openshift4/ose-oauth-proxy@sha256:383360705efc0605760c3b2b1d0fa288094eb6dad8158c540d950f661b4ba880_amd64", "product_id": "openshift4/ose-oauth-proxy@sha256:383360705efc0605760c3b2b1d0fa288094eb6dad8158c540d950f661b4ba880_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-oauth-proxy@sha256:383360705efc0605760c3b2b1d0fa288094eb6dad8158c540d950f661b4ba880?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-proxy\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-prometheus-alertmanager@sha256:ef6c822baa9167856e613e7f1c14a1b44da42a394d91b9e0407d01d769a8fb40_amd64", "product": { "name": "openshift4/ose-prometheus-alertmanager@sha256:ef6c822baa9167856e613e7f1c14a1b44da42a394d91b9e0407d01d769a8fb40_amd64", "product_id": "openshift4/ose-prometheus-alertmanager@sha256:ef6c822baa9167856e613e7f1c14a1b44da42a394d91b9e0407d01d769a8fb40_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-prometheus-alertmanager@sha256:ef6c822baa9167856e613e7f1c14a1b44da42a394d91b9e0407d01d769a8fb40?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-alertmanager\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-prometheus-node-exporter@sha256:56c31eb82f202b0ab38bc600ef01ef68302a0a57b7274c9537d3518855e2da1d_amd64", "product": { "name": "openshift4/ose-prometheus-node-exporter@sha256:56c31eb82f202b0ab38bc600ef01ef68302a0a57b7274c9537d3518855e2da1d_amd64", "product_id": "openshift4/ose-prometheus-node-exporter@sha256:56c31eb82f202b0ab38bc600ef01ef68302a0a57b7274c9537d3518855e2da1d_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-prometheus-node-exporter@sha256:56c31eb82f202b0ab38bc600ef01ef68302a0a57b7274c9537d3518855e2da1d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-node-exporter\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-prometheus@sha256:38e663d919d2c96af52656b42d18556cf457b84ef3160e27496f6db36ffa92a3_amd64", "product": { "name": "openshift4/ose-prometheus@sha256:38e663d919d2c96af52656b42d18556cf457b84ef3160e27496f6db36ffa92a3_amd64", "product_id": "openshift4/ose-prometheus@sha256:38e663d919d2c96af52656b42d18556cf457b84ef3160e27496f6db36ffa92a3_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-prometheus@sha256:38e663d919d2c96af52656b42d18556cf457b84ef3160e27496f6db36ffa92a3?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-grafana@sha256:4304ba0edd79f4b2b7b6f4766dd696e8fb21423ff0dc50a18388e2163d9df3de_amd64", "product": { "name": "openshift4/ose-grafana@sha256:4304ba0edd79f4b2b7b6f4766dd696e8fb21423ff0dc50a18388e2163d9df3de_amd64", "product_id": "openshift4/ose-grafana@sha256:4304ba0edd79f4b2b7b6f4766dd696e8fb21423ff0dc50a18388e2163d9df3de_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-grafana@sha256:4304ba0edd79f4b2b7b6f4766dd696e8fb21423ff0dc50a18388e2163d9df3de?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-grafana\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-jenkins-agent-maven@sha256:ce5dd50d7005ed2d5ef36de673a2cf2cec07ad997ed93956605fe8fc8836d15c_amd64", "product": { "name": "openshift4/ose-jenkins-agent-maven@sha256:ce5dd50d7005ed2d5ef36de673a2cf2cec07ad997ed93956605fe8fc8836d15c_amd64", "product_id": "openshift4/ose-jenkins-agent-maven@sha256:ce5dd50d7005ed2d5ef36de673a2cf2cec07ad997ed93956605fe8fc8836d15c_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-jenkins-agent-maven@sha256:ce5dd50d7005ed2d5ef36de673a2cf2cec07ad997ed93956605fe8fc8836d15c?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-maven\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-jenkins-agent-base@sha256:c29122b0ed52c031f5f99ddb3338b6515bc05ac1e90864dda1131dcf9af87924_amd64", "product": { "name": "openshift4/ose-jenkins-agent-base@sha256:c29122b0ed52c031f5f99ddb3338b6515bc05ac1e90864dda1131dcf9af87924_amd64", "product_id": "openshift4/ose-jenkins-agent-base@sha256:c29122b0ed52c031f5f99ddb3338b6515bc05ac1e90864dda1131dcf9af87924_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-jenkins-agent-base@sha256:c29122b0ed52c031f5f99ddb3338b6515bc05ac1e90864dda1131dcf9af87924?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-base\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-kube-proxy@sha256:3afce3e28952226f1bb959b2859050e848ed5d4549ac5e2fc267f51b11fc6ec3_amd64", "product": { "name": "openshift4/ose-kube-proxy@sha256:3afce3e28952226f1bb959b2859050e848ed5d4549ac5e2fc267f51b11fc6ec3_amd64", "product_id": "openshift4/ose-kube-proxy@sha256:3afce3e28952226f1bb959b2859050e848ed5d4549ac5e2fc267f51b11fc6ec3_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-kube-proxy@sha256:3afce3e28952226f1bb959b2859050e848ed5d4549ac5e2fc267f51b11fc6ec3?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kube-proxy\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-kube-rbac-proxy@sha256:dab4af2713fa59499ee8d2cb169d636ddb425590e6924bc2c03597c0b10bd246_amd64", "product": { "name": "openshift4/ose-kube-rbac-proxy@sha256:dab4af2713fa59499ee8d2cb169d636ddb425590e6924bc2c03597c0b10bd246_amd64", "product_id": "openshift4/ose-kube-rbac-proxy@sha256:dab4af2713fa59499ee8d2cb169d636ddb425590e6924bc2c03597c0b10bd246_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-kube-rbac-proxy@sha256:dab4af2713fa59499ee8d2cb169d636ddb425590e6924bc2c03597c0b10bd246?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kube-rbac-proxy\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-kube-state-metrics@sha256:4ff6cd48b319093041c2fa9c32ce16c6ea4dffb1c66ef4923f9cfc108cdfe6cc_amd64", "product": { "name": "openshift4/ose-kube-state-metrics@sha256:4ff6cd48b319093041c2fa9c32ce16c6ea4dffb1c66ef4923f9cfc108cdfe6cc_amd64", "product_id": "openshift4/ose-kube-state-metrics@sha256:4ff6cd48b319093041c2fa9c32ce16c6ea4dffb1c66ef4923f9cfc108cdfe6cc_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-kube-state-metrics@sha256:4ff6cd48b319093041c2fa9c32ce16c6ea4dffb1c66ef4923f9cfc108cdfe6cc?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kube-state-metrics\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-logging-curator5@sha256:91942a469532fda2a4609f2d7ddf693cca5b2ccd8c770d0e36823f0cc67d884c_amd64", "product": { "name": "openshift4/ose-logging-curator5@sha256:91942a469532fda2a4609f2d7ddf693cca5b2ccd8c770d0e36823f0cc67d884c_amd64", "product_id": "openshift4/ose-logging-curator5@sha256:91942a469532fda2a4609f2d7ddf693cca5b2ccd8c770d0e36823f0cc67d884c_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-logging-curator5@sha256:91942a469532fda2a4609f2d7ddf693cca5b2ccd8c770d0e36823f0cc67d884c?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-logging-curator5\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-logging-elasticsearch5@sha256:c4693439c2f0f114238cc4034bfc6cd17f93bb9562ac2c0f9feb30f9c657fcd7_amd64", "product": { "name": "openshift4/ose-logging-elasticsearch5@sha256:c4693439c2f0f114238cc4034bfc6cd17f93bb9562ac2c0f9feb30f9c657fcd7_amd64", "product_id": "openshift4/ose-logging-elasticsearch5@sha256:c4693439c2f0f114238cc4034bfc6cd17f93bb9562ac2c0f9feb30f9c657fcd7_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-logging-elasticsearch5@sha256:c4693439c2f0f114238cc4034bfc6cd17f93bb9562ac2c0f9feb30f9c657fcd7?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-logging-elasticsearch5\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-logging-eventrouter@sha256:7668a706700163a35def516d1e1be336fef418ea477ef014ba90f5317569384b_amd64", "product": { "name": "openshift4/ose-logging-eventrouter@sha256:7668a706700163a35def516d1e1be336fef418ea477ef014ba90f5317569384b_amd64", "product_id": "openshift4/ose-logging-eventrouter@sha256:7668a706700163a35def516d1e1be336fef418ea477ef014ba90f5317569384b_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-logging-eventrouter@sha256:7668a706700163a35def516d1e1be336fef418ea477ef014ba90f5317569384b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-logging-eventrouter\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-logging-fluentd@sha256:3ef99bc79d891b111828c6c29faa8f3cd37d8ab8897186eff2bc85824939f632_amd64", "product": { "name": "openshift4/ose-logging-fluentd@sha256:3ef99bc79d891b111828c6c29faa8f3cd37d8ab8897186eff2bc85824939f632_amd64", "product_id": "openshift4/ose-logging-fluentd@sha256:3ef99bc79d891b111828c6c29faa8f3cd37d8ab8897186eff2bc85824939f632_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-logging-fluentd@sha256:3ef99bc79d891b111828c6c29faa8f3cd37d8ab8897186eff2bc85824939f632?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-logging-fluentd\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-operator-marketplace@sha256:3c5b9b86c9a9cd3c11290a44e29f016fe054b7068dd5b8469956909a63813db8_amd64", "product": { "name": "openshift4/ose-operator-marketplace@sha256:3c5b9b86c9a9cd3c11290a44e29f016fe054b7068dd5b8469956909a63813db8_amd64", "product_id": "openshift4/ose-operator-marketplace@sha256:3c5b9b86c9a9cd3c11290a44e29f016fe054b7068dd5b8469956909a63813db8_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-operator-marketplace@sha256:3c5b9b86c9a9cd3c11290a44e29f016fe054b7068dd5b8469956909a63813db8?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-marketplace\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-multus-cni@sha256:9be2123934d7f80af6439a84b5a9887459c1655549c7790fd080e965e89049b4_amd64", "product": { "name": "openshift4/ose-multus-cni@sha256:9be2123934d7f80af6439a84b5a9887459c1655549c7790fd080e965e89049b4_amd64", "product_id": "openshift4/ose-multus-cni@sha256:9be2123934d7f80af6439a84b5a9887459c1655549c7790fd080e965e89049b4_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-multus-cni@sha256:9be2123934d7f80af6439a84b5a9887459c1655549c7790fd080e965e89049b4?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-cni\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-ansible-operator@sha256:9469e5ed49937aeb64f0a3dbb5332f087c8498494127a5c507c02c3d4286afb1_amd64", "product": { "name": "openshift4/ose-ansible-operator@sha256:9469e5ed49937aeb64f0a3dbb5332f087c8498494127a5c507c02c3d4286afb1_amd64", "product_id": "openshift4/ose-ansible-operator@sha256:9469e5ed49937aeb64f0a3dbb5332f087c8498494127a5c507c02c3d4286afb1_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-ansible-operator@sha256:9469e5ed49937aeb64f0a3dbb5332f087c8498494127a5c507c02c3d4286afb1?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ansible-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/apb-base@sha256:183441575a8a0ba144fdd346e5ab560a067725a9b66d890493c326e14135512e_amd64", "product": { "name": "openshift4/apb-base@sha256:183441575a8a0ba144fdd346e5ab560a067725a9b66d890493c326e14135512e_amd64", "product_id": "openshift4/apb-base@sha256:183441575a8a0ba144fdd346e5ab560a067725a9b66d890493c326e14135512e_amd64", "product_identification_helper": { "purl": "pkg:oci/apb-base@sha256:183441575a8a0ba144fdd346e5ab560a067725a9b66d890493c326e14135512e?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/apb-base\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-docker-builder@sha256:25b131fc577def1179ce8a2022211d366fa461b6afef2f566b3f177930a3d0db_amd64", "product": { "name": "openshift4/ose-docker-builder@sha256:25b131fc577def1179ce8a2022211d366fa461b6afef2f566b3f177930a3d0db_amd64", "product_id": "openshift4/ose-docker-builder@sha256:25b131fc577def1179ce8a2022211d366fa461b6afef2f566b3f177930a3d0db_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-docker-builder@sha256:25b131fc577def1179ce8a2022211d366fa461b6afef2f566b3f177930a3d0db?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-docker-builder\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cli@sha256:bb846647aa233adddf5ed39056fdf98a7d9dc3abef4c985df3de698a44ecc7fd_amd64", "product": { "name": "openshift4/ose-cli@sha256:bb846647aa233adddf5ed39056fdf98a7d9dc3abef4c985df3de698a44ecc7fd_amd64", "product_id": "openshift4/ose-cli@sha256:bb846647aa233adddf5ed39056fdf98a7d9dc3abef4c985df3de698a44ecc7fd_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cli@sha256:bb846647aa233adddf5ed39056fdf98a7d9dc3abef4c985df3de698a44ecc7fd?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cli\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-capacity@sha256:24db95a9d24960c14775136419eed7dfddb7b7d70577fab77a63b64fc66d53a7_amd64", "product": { "name": "openshift4/ose-cluster-capacity@sha256:24db95a9d24960c14775136419eed7dfddb7b7d70577fab77a63b64fc66d53a7_amd64", "product_id": "openshift4/ose-cluster-capacity@sha256:24db95a9d24960c14775136419eed7dfddb7b7d70577fab77a63b64fc66d53a7_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-capacity@sha256:24db95a9d24960c14775136419eed7dfddb7b7d70577fab77a63b64fc66d53a7?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-capacity\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-console@sha256:68c4a7514623c31f7fdf7058a0dcd968dc4e4a63bcf0236ff21333bfb27cc4aa_amd64", "product": { "name": "openshift4/ose-console@sha256:68c4a7514623c31f7fdf7058a0dcd968dc4e4a63bcf0236ff21333bfb27cc4aa_amd64", "product_id": "openshift4/ose-console@sha256:68c4a7514623c31f7fdf7058a0dcd968dc4e4a63bcf0236ff21333bfb27cc4aa_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-console@sha256:68c4a7514623c31f7fdf7058a0dcd968dc4e4a63bcf0236ff21333bfb27cc4aa?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-console\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-console-operator@sha256:665d6d89d83c51de08526c08365317b3dbb9f20e1528ffb35697f6c8bd409ca3_amd64", "product": { "name": "openshift4/ose-console-operator@sha256:665d6d89d83c51de08526c08365317b3dbb9f20e1528ffb35697f6c8bd409ca3_amd64", "product_id": "openshift4/ose-console-operator@sha256:665d6d89d83c51de08526c08365317b3dbb9f20e1528ffb35697f6c8bd409ca3_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-console-operator@sha256:665d6d89d83c51de08526c08365317b3dbb9f20e1528ffb35697f6c8bd409ca3?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-console-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-deployer@sha256:ab62d8277ea2e69cf6697343c4b6bfef67f04c5f31cdf47fc510cb76969ca2ca_amd64", "product": { "name": "openshift4/ose-deployer@sha256:ab62d8277ea2e69cf6697343c4b6bfef67f04c5f31cdf47fc510cb76969ca2ca_amd64", "product_id": "openshift4/ose-deployer@sha256:ab62d8277ea2e69cf6697343c4b6bfef67f04c5f31cdf47fc510cb76969ca2ca_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-deployer@sha256:ab62d8277ea2e69cf6697343c4b6bfef67f04c5f31cdf47fc510cb76969ca2ca?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-deployer\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-egress-dns-proxy@sha256:2c00e51829c679d3573f813b0eced5c16382966ecf609915b47a8472872bbb64_amd64", "product": { "name": "openshift4/ose-egress-dns-proxy@sha256:2c00e51829c679d3573f813b0eced5c16382966ecf609915b47a8472872bbb64_amd64", "product_id": "openshift4/ose-egress-dns-proxy@sha256:2c00e51829c679d3573f813b0eced5c16382966ecf609915b47a8472872bbb64_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-egress-dns-proxy@sha256:2c00e51829c679d3573f813b0eced5c16382966ecf609915b47a8472872bbb64?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-egress-dns-proxy\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-egress-router@sha256:c46ed6f837821decadaaf07266b9d67f89b98621618bc073abdc38db51bc692a_amd64", "product": { "name": "openshift4/ose-egress-router@sha256:c46ed6f837821decadaaf07266b9d67f89b98621618bc073abdc38db51bc692a_amd64", "product_id": "openshift4/ose-egress-router@sha256:c46ed6f837821decadaaf07266b9d67f89b98621618bc073abdc38db51bc692a_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-egress-router@sha256:c46ed6f837821decadaaf07266b9d67f89b98621618bc073abdc38db51bc692a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-egress-router\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-haproxy-router@sha256:e0c7adba792e43e96c8d6f4e0845e2d001d0f652ece6f567b09ac481b07eafdc_amd64", "product": { "name": "openshift4/ose-haproxy-router@sha256:e0c7adba792e43e96c8d6f4e0845e2d001d0f652ece6f567b09ac481b07eafdc_amd64", "product_id": "openshift4/ose-haproxy-router@sha256:e0c7adba792e43e96c8d6f4e0845e2d001d0f652ece6f567b09ac481b07eafdc_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-haproxy-router@sha256:e0c7adba792e43e96c8d6f4e0845e2d001d0f652ece6f567b09ac481b07eafdc?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-haproxy-router\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-hyperkube@sha256:150fe3e51c75f09bd366d06a96749e17cd01aa845319032c327387950b52a34e_amd64", "product": { "name": "openshift4/ose-hyperkube@sha256:150fe3e51c75f09bd366d06a96749e17cd01aa845319032c327387950b52a34e_amd64", "product_id": "openshift4/ose-hyperkube@sha256:150fe3e51c75f09bd366d06a96749e17cd01aa845319032c327387950b52a34e_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-hyperkube@sha256:150fe3e51c75f09bd366d06a96749e17cd01aa845319032c327387950b52a34e?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-hyperkube\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-hypershift@sha256:48392b80092bca63f2969b14412017601ebfda1b54141db53c2bc5b2317c389a_amd64", "product": { "name": "openshift4/ose-hypershift@sha256:48392b80092bca63f2969b14412017601ebfda1b54141db53c2bc5b2317c389a_amd64", "product_id": "openshift4/ose-hypershift@sha256:48392b80092bca63f2969b14412017601ebfda1b54141db53c2bc5b2317c389a_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-hypershift@sha256:48392b80092bca63f2969b14412017601ebfda1b54141db53c2bc5b2317c389a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-hypershift\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-keepalived-ipfailover@sha256:1c0b3bde2963560aa0c50bd8365abd39bc5cfae28409fbdc60abf786546eb2e8_amd64", "product": { "name": "openshift4/ose-keepalived-ipfailover@sha256:1c0b3bde2963560aa0c50bd8365abd39bc5cfae28409fbdc60abf786546eb2e8_amd64", "product_id": "openshift4/ose-keepalived-ipfailover@sha256:1c0b3bde2963560aa0c50bd8365abd39bc5cfae28409fbdc60abf786546eb2e8_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-keepalived-ipfailover@sha256:1c0b3bde2963560aa0c50bd8365abd39bc5cfae28409fbdc60abf786546eb2e8?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-keepalived-ipfailover\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/mariadb-apb@sha256:a446829513325ac146b2aa1b555347b57a2377712df6cd8a431c1dbec0614331_amd64", "product": { "name": "openshift4/mariadb-apb@sha256:a446829513325ac146b2aa1b555347b57a2377712df6cd8a431c1dbec0614331_amd64", "product_id": "openshift4/mariadb-apb@sha256:a446829513325ac146b2aa1b555347b57a2377712df6cd8a431c1dbec0614331_amd64", "product_identification_helper": { "purl": "pkg:oci/mariadb-apb@sha256:a446829513325ac146b2aa1b555347b57a2377712df6cd8a431c1dbec0614331?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/mariadb-apb\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/mediawiki-apb@sha256:0a1ab047c6a93e3531f20673b275854361f36e2ebd4894b5ad1705c3dde42a76_amd64", "product": { "name": "openshift4/mediawiki-apb@sha256:0a1ab047c6a93e3531f20673b275854361f36e2ebd4894b5ad1705c3dde42a76_amd64", "product_id": "openshift4/mediawiki-apb@sha256:0a1ab047c6a93e3531f20673b275854361f36e2ebd4894b5ad1705c3dde42a76_amd64", "product_identification_helper": { "purl": "pkg:oci/mediawiki-apb@sha256:0a1ab047c6a93e3531f20673b275854361f36e2ebd4894b5ad1705c3dde42a76?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/mediawiki-apb\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/mediawiki@sha256:8014f0d73799f7f26b56a3d908b55de3103103f57a507d48fe9830c7d605f85d_amd64", "product": { "name": "openshift4/mediawiki@sha256:8014f0d73799f7f26b56a3d908b55de3103103f57a507d48fe9830c7d605f85d_amd64", "product_id": "openshift4/mediawiki@sha256:8014f0d73799f7f26b56a3d908b55de3103103f57a507d48fe9830c7d605f85d_amd64", "product_identification_helper": { "purl": "pkg:oci/mediawiki@sha256:8014f0d73799f7f26b56a3d908b55de3103103f57a507d48fe9830c7d605f85d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/mediawiki\u0026tag=v4.1.14-201909040920" } } }, { "category": "product_version", "name": "openshift4/mysql-apb@sha256:5772d2a584b96249c535df55b501ffe891162d7651b18244cdc16ab2f0d563dc_amd64", "product": { "name": "openshift4/mysql-apb@sha256:5772d2a584b96249c535df55b501ffe891162d7651b18244cdc16ab2f0d563dc_amd64", "product_id": "openshift4/mysql-apb@sha256:5772d2a584b96249c535df55b501ffe891162d7651b18244cdc16ab2f0d563dc_amd64", "product_identification_helper": { "purl": "pkg:oci/mysql-apb@sha256:5772d2a584b96249c535df55b501ffe891162d7651b18244cdc16ab2f0d563dc?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/mysql-apb\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-pod@sha256:40b2f3ff0b5ff873669613882579b2a714aed77e1fea4e28a26ebf2726177707_amd64", "product": { "name": "openshift4/ose-pod@sha256:40b2f3ff0b5ff873669613882579b2a714aed77e1fea4e28a26ebf2726177707_amd64", "product_id": "openshift4/ose-pod@sha256:40b2f3ff0b5ff873669613882579b2a714aed77e1fea4e28a26ebf2726177707_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-pod@sha256:40b2f3ff0b5ff873669613882579b2a714aed77e1fea4e28a26ebf2726177707?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-pod\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/postgresql-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64", "product": { "name": "openshift4/postgresql-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64", "product_id": "openshift4/postgresql-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64", "product_identification_helper": { "purl": "pkg:oci/postgresql-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/postgresql-apb\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/postgres-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64", "product": { "name": "openshift4/postgres-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64", "product_id": "openshift4/postgres-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64", "product_identification_helper": { "purl": "pkg:oci/postgres-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/postgres-apb\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-docker-registry@sha256:f7bd292dde7bd96195b313b4c459980fe8541bd89c442a4065a0114f42f3fe46_amd64", "product": { "name": "openshift4/ose-docker-registry@sha256:f7bd292dde7bd96195b313b4c459980fe8541bd89c442a4065a0114f42f3fe46_amd64", "product_id": "openshift4/ose-docker-registry@sha256:f7bd292dde7bd96195b313b4c459980fe8541bd89c442a4065a0114f42f3fe46_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-docker-registry@sha256:f7bd292dde7bd96195b313b4c459980fe8541bd89c442a4065a0114f42f3fe46?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-docker-registry\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-tests@sha256:28866a167dd7df474b053e92de3ba9bc0d95d918180b1e676637df30c2a27ef4_amd64", "product": { "name": "openshift4/ose-tests@sha256:28866a167dd7df474b053e92de3ba9bc0d95d918180b1e676637df30c2a27ef4_amd64", "product_id": "openshift4/ose-tests@sha256:28866a167dd7df474b053e92de3ba9bc0d95d918180b1e676637df30c2a27ef4_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-tests@sha256:28866a167dd7df474b053e92de3ba9bc0d95d918180b1e676637df30c2a27ef4?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-tests\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-jenkins@sha256:8da877d1df3fbb0fd4df607718847382d3ab38b862f868077c8938a1a7014f71_amd64", "product": { "name": "openshift4/ose-jenkins@sha256:8da877d1df3fbb0fd4df607718847382d3ab38b862f868077c8938a1a7014f71_amd64", "product_id": "openshift4/ose-jenkins@sha256:8da877d1df3fbb0fd4df607718847382d3ab38b862f868077c8938a1a7014f71_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-jenkins@sha256:8da877d1df3fbb0fd4df607718847382d3ab38b862f868077c8938a1a7014f71?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-operator-lifecycle-manager@sha256:9254b8d3097a0d067f07bcf735b3530eccc888466f99a6282aebb7bbdd9cbcc8_amd64", "product": { "name": "openshift4/ose-operator-lifecycle-manager@sha256:9254b8d3097a0d067f07bcf735b3530eccc888466f99a6282aebb7bbdd9cbcc8_amd64", "product_id": "openshift4/ose-operator-lifecycle-manager@sha256:9254b8d3097a0d067f07bcf735b3530eccc888466f99a6282aebb7bbdd9cbcc8_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-operator-lifecycle-manager@sha256:9254b8d3097a0d067f07bcf735b3530eccc888466f99a6282aebb7bbdd9cbcc8?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-lifecycle-manager\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-operator-registry@sha256:5eecc9d91c1ae4f0af586aa7d97fce8a32f23dfcdd64dcc61b9c536fbf4e8663_amd64", "product": { "name": "openshift4/ose-operator-registry@sha256:5eecc9d91c1ae4f0af586aa7d97fce8a32f23dfcdd64dcc61b9c536fbf4e8663_amd64", "product_id": "openshift4/ose-operator-registry@sha256:5eecc9d91c1ae4f0af586aa7d97fce8a32f23dfcdd64dcc61b9c536fbf4e8663_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-operator-registry@sha256:5eecc9d91c1ae4f0af586aa7d97fce8a32f23dfcdd64dcc61b9c536fbf4e8663?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-registry\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-aws-machine-controllers@sha256:e5f585aa452461ee95d55e84d81be54a82a458a54dbcad1f68a8f28edeb7638b_amd64", "product": { "name": "openshift4/ose-aws-machine-controllers@sha256:e5f585aa452461ee95d55e84d81be54a82a458a54dbcad1f68a8f28edeb7638b_amd64", "product_id": "openshift4/ose-aws-machine-controllers@sha256:e5f585aa452461ee95d55e84d81be54a82a458a54dbcad1f68a8f28edeb7638b_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-aws-machine-controllers@sha256:e5f585aa452461ee95d55e84d81be54a82a458a54dbcad1f68a8f28edeb7638b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-aws-machine-controllers\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-azure-machine-controllers@sha256:9f3199e5226fdcd5abe34a6f2e3a6ad7e7ad3f59edbff2bfd9b4c84566897eae_amd64", "product": { "name": "openshift4/ose-azure-machine-controllers@sha256:9f3199e5226fdcd5abe34a6f2e3a6ad7e7ad3f59edbff2bfd9b4c84566897eae_amd64", "product_id": "openshift4/ose-azure-machine-controllers@sha256:9f3199e5226fdcd5abe34a6f2e3a6ad7e7ad3f59edbff2bfd9b4c84566897eae_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-azure-machine-controllers@sha256:9f3199e5226fdcd5abe34a6f2e3a6ad7e7ad3f59edbff2bfd9b4c84566897eae?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-azure-machine-controllers\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cli-artifacts@sha256:bacaec21f6101ef686bb07b5d6e80b0b3ad06ab9a4d4f6e611ca3103c0030d7e_amd64", "product": { "name": "openshift4/ose-cli-artifacts@sha256:bacaec21f6101ef686bb07b5d6e80b0b3ad06ab9a4d4f6e611ca3103c0030d7e_amd64", "product_id": "openshift4/ose-cli-artifacts@sha256:bacaec21f6101ef686bb07b5d6e80b0b3ad06ab9a4d4f6e611ca3103c0030d7e_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cli-artifacts@sha256:bacaec21f6101ef686bb07b5d6e80b0b3ad06ab9a4d4f6e611ca3103c0030d7e?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cli-artifacts\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cloud-credential-operator@sha256:27c7bac07c2a2a38ddb65a9997b22946fbe37ddd06ecf52eccd0ef9235ae47ba_amd64", "product": { "name": "openshift4/ose-cloud-credential-operator@sha256:27c7bac07c2a2a38ddb65a9997b22946fbe37ddd06ecf52eccd0ef9235ae47ba_amd64", "product_id": "openshift4/ose-cloud-credential-operator@sha256:27c7bac07c2a2a38ddb65a9997b22946fbe37ddd06ecf52eccd0ef9235ae47ba_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cloud-credential-operator@sha256:27c7bac07c2a2a38ddb65a9997b22946fbe37ddd06ecf52eccd0ef9235ae47ba?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cloud-credential-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-authentication-operator@sha256:67dc9d9d90e5b37c73eda524a13e0bd98834b225adbfccc9d6c09a35a130c8f4_amd64", "product": { "name": "openshift4/ose-cluster-authentication-operator@sha256:67dc9d9d90e5b37c73eda524a13e0bd98834b225adbfccc9d6c09a35a130c8f4_amd64", "product_id": "openshift4/ose-cluster-authentication-operator@sha256:67dc9d9d90e5b37c73eda524a13e0bd98834b225adbfccc9d6c09a35a130c8f4_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-authentication-operator@sha256:67dc9d9d90e5b37c73eda524a13e0bd98834b225adbfccc9d6c09a35a130c8f4?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-authentication-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-autoscaler-operator@sha256:989948cb9998b518f3c325a2af3b24cfb7033ad2ac8be96cb3fafce2b4077435_amd64", "product": { "name": "openshift4/ose-cluster-autoscaler-operator@sha256:989948cb9998b518f3c325a2af3b24cfb7033ad2ac8be96cb3fafce2b4077435_amd64", "product_id": "openshift4/ose-cluster-autoscaler-operator@sha256:989948cb9998b518f3c325a2af3b24cfb7033ad2ac8be96cb3fafce2b4077435_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-autoscaler-operator@sha256:989948cb9998b518f3c325a2af3b24cfb7033ad2ac8be96cb3fafce2b4077435?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-autoscaler-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-bootstrap@sha256:9a676b7e363f022a511ab07ae81242b5c6d03523db11c37b0bf47e0f0324c9d8_amd64", "product": { "name": "openshift4/ose-cluster-bootstrap@sha256:9a676b7e363f022a511ab07ae81242b5c6d03523db11c37b0bf47e0f0324c9d8_amd64", "product_id": "openshift4/ose-cluster-bootstrap@sha256:9a676b7e363f022a511ab07ae81242b5c6d03523db11c37b0bf47e0f0324c9d8_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-bootstrap@sha256:9a676b7e363f022a511ab07ae81242b5c6d03523db11c37b0bf47e0f0324c9d8?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-bootstrap\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-config-operator@sha256:3b210b7313b4853f777d19248ba746b3d29251a3409124f984ae212809930427_amd64", "product": { "name": "openshift4/ose-cluster-config-operator@sha256:3b210b7313b4853f777d19248ba746b3d29251a3409124f984ae212809930427_amd64", "product_id": "openshift4/ose-cluster-config-operator@sha256:3b210b7313b4853f777d19248ba746b3d29251a3409124f984ae212809930427_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-config-operator@sha256:3b210b7313b4853f777d19248ba746b3d29251a3409124f984ae212809930427?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-config-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-dns-operator@sha256:5f70ba7ebcee1ecb9f65c8b43280935866607fc3dee6329ed473169f2acebe05_amd64", "product": { "name": "openshift4/ose-cluster-dns-operator@sha256:5f70ba7ebcee1ecb9f65c8b43280935866607fc3dee6329ed473169f2acebe05_amd64", "product_id": "openshift4/ose-cluster-dns-operator@sha256:5f70ba7ebcee1ecb9f65c8b43280935866607fc3dee6329ed473169f2acebe05_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-dns-operator@sha256:5f70ba7ebcee1ecb9f65c8b43280935866607fc3dee6329ed473169f2acebe05?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-dns-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-image-registry-operator@sha256:5c8fa5eb3828277f31ca0d4f7aedfee8e66dc0cfa3542772e6ac13c6b131644d_amd64", "product": { "name": "openshift4/ose-cluster-image-registry-operator@sha256:5c8fa5eb3828277f31ca0d4f7aedfee8e66dc0cfa3542772e6ac13c6b131644d_amd64", "product_id": "openshift4/ose-cluster-image-registry-operator@sha256:5c8fa5eb3828277f31ca0d4f7aedfee8e66dc0cfa3542772e6ac13c6b131644d_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-image-registry-operator@sha256:5c8fa5eb3828277f31ca0d4f7aedfee8e66dc0cfa3542772e6ac13c6b131644d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-image-registry-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-ingress-operator@sha256:b33e32eaac7d15947e32cbeb9d45e9ae3e6fbe470611ab78f28cfc99d8759b68_amd64", "product": { "name": "openshift4/ose-cluster-ingress-operator@sha256:b33e32eaac7d15947e32cbeb9d45e9ae3e6fbe470611ab78f28cfc99d8759b68_amd64", "product_id": "openshift4/ose-cluster-ingress-operator@sha256:b33e32eaac7d15947e32cbeb9d45e9ae3e6fbe470611ab78f28cfc99d8759b68_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-ingress-operator@sha256:b33e32eaac7d15947e32cbeb9d45e9ae3e6fbe470611ab78f28cfc99d8759b68?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-ingress-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:af88e84a2957ba9eeb1e5e3cdf9cf559ccb0de08d7a16c58a19c8eb805ba5a39_amd64", "product": { "name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:af88e84a2957ba9eeb1e5e3cdf9cf559ccb0de08d7a16c58a19c8eb805ba5a39_amd64", "product_id": "openshift4/ose-cluster-kube-apiserver-operator@sha256:af88e84a2957ba9eeb1e5e3cdf9cf559ccb0de08d7a16c58a19c8eb805ba5a39_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-apiserver-operator@sha256:af88e84a2957ba9eeb1e5e3cdf9cf559ccb0de08d7a16c58a19c8eb805ba5a39?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-apiserver-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:ca1e29c0c4eb029ed4d5544d5fde000000aa007f1d8e0fcf0fc0d317b5e06784_amd64", "product": { "name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:ca1e29c0c4eb029ed4d5544d5fde000000aa007f1d8e0fcf0fc0d317b5e06784_amd64", "product_id": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:ca1e29c0c4eb029ed4d5544d5fde000000aa007f1d8e0fcf0fc0d317b5e06784_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-controller-manager-operator@sha256:ca1e29c0c4eb029ed4d5544d5fde000000aa007f1d8e0fcf0fc0d317b5e06784?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-controller-manager-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:6f30eebebe4b774acd19eadeae80c4a7c8ccb503389c354bc76fc0f778cefe2b_amd64", "product": { "name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:6f30eebebe4b774acd19eadeae80c4a7c8ccb503389c354bc76fc0f778cefe2b_amd64", "product_id": "openshift4/ose-cluster-kube-scheduler-operator@sha256:6f30eebebe4b774acd19eadeae80c4a7c8ccb503389c354bc76fc0f778cefe2b_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-scheduler-operator@sha256:6f30eebebe4b774acd19eadeae80c4a7c8ccb503389c354bc76fc0f778cefe2b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-scheduler-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-machine-approver@sha256:3535b9ccd701ac3fa6b6a8339f6c10d6e74dd4d8f5f810690fa7e272ee82f837_amd64", "product": { "name": "openshift4/ose-cluster-machine-approver@sha256:3535b9ccd701ac3fa6b6a8339f6c10d6e74dd4d8f5f810690fa7e272ee82f837_amd64", "product_id": "openshift4/ose-cluster-machine-approver@sha256:3535b9ccd701ac3fa6b6a8339f6c10d6e74dd4d8f5f810690fa7e272ee82f837_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-machine-approver@sha256:3535b9ccd701ac3fa6b6a8339f6c10d6e74dd4d8f5f810690fa7e272ee82f837?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-machine-approver\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:1291555580ce58d7855c7b93ace6826cd2b1a22499fc5df3aad7d36a30b880ee_amd64", "product": { "name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:1291555580ce58d7855c7b93ace6826cd2b1a22499fc5df3aad7d36a30b880ee_amd64", "product_id": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:1291555580ce58d7855c7b93ace6826cd2b1a22499fc5df3aad7d36a30b880ee_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-openshift-apiserver-operator@sha256:1291555580ce58d7855c7b93ace6826cd2b1a22499fc5df3aad7d36a30b880ee?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-openshift-apiserver-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:3bdcfac3e9dcd30754f1e4158706bbcef77449fc3893521c86fd793cc1f7f32a_amd64", "product": { "name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:3bdcfac3e9dcd30754f1e4158706bbcef77449fc3893521c86fd793cc1f7f32a_amd64", "product_id": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:3bdcfac3e9dcd30754f1e4158706bbcef77449fc3893521c86fd793cc1f7f32a_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-openshift-controller-manager-operator@sha256:3bdcfac3e9dcd30754f1e4158706bbcef77449fc3893521c86fd793cc1f7f32a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-openshift-controller-manager-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-samples-operator@sha256:79ba26ee177bc7cd2ab89ddaa6c66b5dcfc6970dc457cc737d64b18b5d378637_amd64", "product": { "name": "openshift4/ose-cluster-samples-operator@sha256:79ba26ee177bc7cd2ab89ddaa6c66b5dcfc6970dc457cc737d64b18b5d378637_amd64", "product_id": "openshift4/ose-cluster-samples-operator@sha256:79ba26ee177bc7cd2ab89ddaa6c66b5dcfc6970dc457cc737d64b18b5d378637_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-samples-operator@sha256:79ba26ee177bc7cd2ab89ddaa6c66b5dcfc6970dc457cc737d64b18b5d378637?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-samples-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-storage-operator@sha256:95ad59eb2e2cc58f7ae6b850f648259687f266f05ac91166a39da6bf441e3e86_amd64", "product": { "name": "openshift4/ose-cluster-storage-operator@sha256:95ad59eb2e2cc58f7ae6b850f648259687f266f05ac91166a39da6bf441e3e86_amd64", "product_id": "openshift4/ose-cluster-storage-operator@sha256:95ad59eb2e2cc58f7ae6b850f648259687f266f05ac91166a39da6bf441e3e86_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-storage-operator@sha256:95ad59eb2e2cc58f7ae6b850f648259687f266f05ac91166a39da6bf441e3e86?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-storage-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-update-keys@sha256:f919d82bd99ecd768271c8ef7ad6bf6d2b5cb902410b93bbafc829c58b59a48f_amd64", "product": { "name": "openshift4/ose-cluster-update-keys@sha256:f919d82bd99ecd768271c8ef7ad6bf6d2b5cb902410b93bbafc829c58b59a48f_amd64", "product_id": "openshift4/ose-cluster-update-keys@sha256:f919d82bd99ecd768271c8ef7ad6bf6d2b5cb902410b93bbafc829c58b59a48f_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-update-keys@sha256:f919d82bd99ecd768271c8ef7ad6bf6d2b5cb902410b93bbafc829c58b59a48f?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-update-keys\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-egress-http-proxy@sha256:77ffd3c6dbb51743a13ce6a9cbd385602c24165848c205aca864b88af5b3c503_amd64", "product": { "name": "openshift4/ose-egress-http-proxy@sha256:77ffd3c6dbb51743a13ce6a9cbd385602c24165848c205aca864b88af5b3c503_amd64", "product_id": "openshift4/ose-egress-http-proxy@sha256:77ffd3c6dbb51743a13ce6a9cbd385602c24165848c205aca864b88af5b3c503_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-egress-http-proxy@sha256:77ffd3c6dbb51743a13ce6a9cbd385602c24165848c205aca864b88af5b3c503?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-egress-http-proxy\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-etcd@sha256:3df453713db7ea9a1bd8556a0a986fcd8d8c0a4649c262b9d8652ccfe648bb1e_amd64", "product": { "name": "openshift4/ose-etcd@sha256:3df453713db7ea9a1bd8556a0a986fcd8d8c0a4649c262b9d8652ccfe648bb1e_amd64", "product_id": "openshift4/ose-etcd@sha256:3df453713db7ea9a1bd8556a0a986fcd8d8c0a4649c262b9d8652ccfe648bb1e_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-etcd@sha256:3df453713db7ea9a1bd8556a0a986fcd8d8c0a4649c262b9d8652ccfe648bb1e?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-etcd\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-installer-artifacts@sha256:7f3e05fa013dead5501513b86c19719973d0f9ee5dbdd4d3f5264fe601dbf809_amd64", "product": { "name": "openshift4/ose-installer-artifacts@sha256:7f3e05fa013dead5501513b86c19719973d0f9ee5dbdd4d3f5264fe601dbf809_amd64", "product_id": "openshift4/ose-installer-artifacts@sha256:7f3e05fa013dead5501513b86c19719973d0f9ee5dbdd4d3f5264fe601dbf809_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-installer-artifacts@sha256:7f3e05fa013dead5501513b86c19719973d0f9ee5dbdd4d3f5264fe601dbf809?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-installer-artifacts\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-installer@sha256:7f0fb099018d7fba695adfff2c6cec1af789e3c3ccab61bb084a30ae1bdff79f_amd64", "product": { "name": "openshift4/ose-installer@sha256:7f0fb099018d7fba695adfff2c6cec1af789e3c3ccab61bb084a30ae1bdff79f_amd64", "product_id": "openshift4/ose-installer@sha256:7f0fb099018d7fba695adfff2c6cec1af789e3c3ccab61bb084a30ae1bdff79f_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-installer@sha256:7f0fb099018d7fba695adfff2c6cec1af789e3c3ccab61bb084a30ae1bdff79f?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-installer\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-libvirt-machine-controllers@sha256:2446ea720c26b213b9419bd2ad867c0ca1ec6df6d972cd5ffd6037b8fe0fbc88_amd64", "product": { "name": "openshift4/ose-libvirt-machine-controllers@sha256:2446ea720c26b213b9419bd2ad867c0ca1ec6df6d972cd5ffd6037b8fe0fbc88_amd64", "product_id": "openshift4/ose-libvirt-machine-controllers@sha256:2446ea720c26b213b9419bd2ad867c0ca1ec6df6d972cd5ffd6037b8fe0fbc88_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-libvirt-machine-controllers@sha256:2446ea720c26b213b9419bd2ad867c0ca1ec6df6d972cd5ffd6037b8fe0fbc88?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-libvirt-machine-controllers\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-machine-api-operator@sha256:6dfe7c13a6ae6c6e509f0d8cd0cb6e5284f9efd8cc2c949d87a471643e730957_amd64", "product": { "name": "openshift4/ose-machine-api-operator@sha256:6dfe7c13a6ae6c6e509f0d8cd0cb6e5284f9efd8cc2c949d87a471643e730957_amd64", "product_id": "openshift4/ose-machine-api-operator@sha256:6dfe7c13a6ae6c6e509f0d8cd0cb6e5284f9efd8cc2c949d87a471643e730957_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-machine-api-operator@sha256:6dfe7c13a6ae6c6e509f0d8cd0cb6e5284f9efd8cc2c949d87a471643e730957?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-machine-api-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-machine-config-operator@sha256:ebffd73f3e4ff92792bad0cfa5bba5bec17e2124c7618ae7c4bd49ac777b7deb_amd64", "product": { "name": "openshift4/ose-machine-config-operator@sha256:ebffd73f3e4ff92792bad0cfa5bba5bec17e2124c7618ae7c4bd49ac777b7deb_amd64", "product_id": "openshift4/ose-machine-config-operator@sha256:ebffd73f3e4ff92792bad0cfa5bba5bec17e2124c7618ae7c4bd49ac777b7deb_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-machine-config-operator@sha256:ebffd73f3e4ff92792bad0cfa5bba5bec17e2124c7618ae7c4bd49ac777b7deb?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-machine-config-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-multus-admission-controller@sha256:101d1c2eeebf1c5e336238056ff9415de50855363eebce3b75cf6ac562adca05_amd64", "product": { "name": "openshift4/ose-multus-admission-controller@sha256:101d1c2eeebf1c5e336238056ff9415de50855363eebce3b75cf6ac562adca05_amd64", "product_id": "openshift4/ose-multus-admission-controller@sha256:101d1c2eeebf1c5e336238056ff9415de50855363eebce3b75cf6ac562adca05_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-multus-admission-controller@sha256:101d1c2eeebf1c5e336238056ff9415de50855363eebce3b75cf6ac562adca05?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-admission-controller\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-must-gather@sha256:1acef66db6179f4289fc4abbb297df32c01d3b13fd85530ac6a0d925b517c3df_amd64", "product": { "name": "openshift4/ose-must-gather@sha256:1acef66db6179f4289fc4abbb297df32c01d3b13fd85530ac6a0d925b517c3df_amd64", "product_id": "openshift4/ose-must-gather@sha256:1acef66db6179f4289fc4abbb297df32c01d3b13fd85530ac6a0d925b517c3df_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-must-gather@sha256:1acef66db6179f4289fc4abbb297df32c01d3b13fd85530ac6a0d925b517c3df?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-must-gather\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-openstack-machine-controllers@sha256:1779881159f1548a75e4dfd8a285e6ecab2ceede42acd9d07f036ec28bf1e6f9_amd64", "product": { "name": "openshift4/ose-openstack-machine-controllers@sha256:1779881159f1548a75e4dfd8a285e6ecab2ceede42acd9d07f036ec28bf1e6f9_amd64", "product_id": "openshift4/ose-openstack-machine-controllers@sha256:1779881159f1548a75e4dfd8a285e6ecab2ceede42acd9d07f036ec28bf1e6f9_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-openstack-machine-controllers@sha256:1779881159f1548a75e4dfd8a285e6ecab2ceede42acd9d07f036ec28bf1e6f9?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-machine-controllers\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-ovn-kubernetes@sha256:d4234553bb7e59323ee19b5d87d189f78fb4cd747551af6a6413b88001e27e13_amd64", "product": { "name": "openshift4/ose-ovn-kubernetes@sha256:d4234553bb7e59323ee19b5d87d189f78fb4cd747551af6a6413b88001e27e13_amd64", "product_id": "openshift4/ose-ovn-kubernetes@sha256:d4234553bb7e59323ee19b5d87d189f78fb4cd747551af6a6413b88001e27e13_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-ovn-kubernetes@sha256:d4234553bb7e59323ee19b5d87d189f78fb4cd747551af6a6413b88001e27e13?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ovn-kubernetes\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-k8s-prometheus-adapter@sha256:95e7924437a3d110b334b1b03c01e2a65292f092110acde1a59db280ce8c7bda_amd64", "product": { "name": "openshift4/ose-k8s-prometheus-adapter@sha256:95e7924437a3d110b334b1b03c01e2a65292f092110acde1a59db280ce8c7bda_amd64", "product_id": "openshift4/ose-k8s-prometheus-adapter@sha256:95e7924437a3d110b334b1b03c01e2a65292f092110acde1a59db280ce8c7bda_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-k8s-prometheus-adapter@sha256:95e7924437a3d110b334b1b03c01e2a65292f092110acde1a59db280ce8c7bda?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-k8s-prometheus-adapter\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-service-ca-operator@sha256:ba2867ef0021af24b6667d114983400a0f7f5824842f1e11d1cda5aa91286737_amd64", "product": { "name": "openshift4/ose-service-ca-operator@sha256:ba2867ef0021af24b6667d114983400a0f7f5824842f1e11d1cda5aa91286737_amd64", "product_id": "openshift4/ose-service-ca-operator@sha256:ba2867ef0021af24b6667d114983400a0f7f5824842f1e11d1cda5aa91286737_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-service-ca-operator@sha256:ba2867ef0021af24b6667d114983400a0f7f5824842f1e11d1cda5aa91286737?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-service-ca-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-prometheus-config-reloader@sha256:6c0551dd87cc7eacc18ccbac093043b1178225f64843f13435f02ae7c2b4d91e_amd64", "product": { "name": "openshift4/ose-prometheus-config-reloader@sha256:6c0551dd87cc7eacc18ccbac093043b1178225f64843f13435f02ae7c2b4d91e_amd64", "product_id": "openshift4/ose-prometheus-config-reloader@sha256:6c0551dd87cc7eacc18ccbac093043b1178225f64843f13435f02ae7c2b4d91e_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-prometheus-config-reloader@sha256:6c0551dd87cc7eacc18ccbac093043b1178225f64843f13435f02ae7c2b4d91e?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-config-reloader\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-prometheus-operator@sha256:a5f9da1798e6b598157343e8751eda45ead551ddfb34ac5e742c6b1d8c8bf0d4_amd64", "product": { "name": "openshift4/ose-prometheus-operator@sha256:a5f9da1798e6b598157343e8751eda45ead551ddfb34ac5e742c6b1d8c8bf0d4_amd64", "product_id": "openshift4/ose-prometheus-operator@sha256:a5f9da1798e6b598157343e8751eda45ead551ddfb34ac5e742c6b1d8c8bf0d4_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-prometheus-operator@sha256:a5f9da1798e6b598157343e8751eda45ead551ddfb34ac5e742c6b1d8c8bf0d4?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-prom-label-proxy@sha256:c77261cc981cc8a5193ca1199c0a119db5757de135f4f7f5e558744371d2bd8a_amd64", "product": { "name": "openshift4/ose-prom-label-proxy@sha256:c77261cc981cc8a5193ca1199c0a119db5757de135f4f7f5e558744371d2bd8a_amd64", "product_id": "openshift4/ose-prom-label-proxy@sha256:c77261cc981cc8a5193ca1199c0a119db5757de135f4f7f5e558744371d2bd8a_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-prom-label-proxy@sha256:c77261cc981cc8a5193ca1199c0a119db5757de135f4f7f5e558744371d2bd8a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prom-label-proxy\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-cni@sha256:7a129a17d719761425ce26a47eaa115789be893f4a1054e37f3c76f891157886_amd64", "product": { "name": "openshift4/ose-sriov-cni@sha256:7a129a17d719761425ce26a47eaa115789be893f4a1054e37f3c76f891157886_amd64", "product_id": "openshift4/ose-sriov-cni@sha256:7a129a17d719761425ce26a47eaa115789be893f4a1054e37f3c76f891157886_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-cni@sha256:7a129a17d719761425ce26a47eaa115789be893f4a1054e37f3c76f891157886?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-cni\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-dp-admission-controller@sha256:e98327978a09c28baa5f10365d2df1e2c33bb689644d581aa6f7ff095e0c1c5d_amd64", "product": { "name": "openshift4/ose-sriov-dp-admission-controller@sha256:e98327978a09c28baa5f10365d2df1e2c33bb689644d581aa6f7ff095e0c1c5d_amd64", "product_id": "openshift4/ose-sriov-dp-admission-controller@sha256:e98327978a09c28baa5f10365d2df1e2c33bb689644d581aa6f7ff095e0c1c5d_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-dp-admission-controller@sha256:e98327978a09c28baa5f10365d2df1e2c33bb689644d581aa6f7ff095e0c1c5d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-dp-admission-controller\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-device-plugin@sha256:4dc4017eee056448d0192834de329c6563c48f625f21ca9db59b22d54db70de8_amd64", "product": { "name": "openshift4/ose-sriov-network-device-plugin@sha256:4dc4017eee056448d0192834de329c6563c48f625f21ca9db59b22d54db70de8_amd64", "product_id": "openshift4/ose-sriov-network-device-plugin@sha256:4dc4017eee056448d0192834de329c6563c48f625f21ca9db59b22d54db70de8_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-device-plugin@sha256:4dc4017eee056448d0192834de329c6563c48f625f21ca9db59b22d54db70de8?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-device-plugin\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-telemeter@sha256:5abb2f8cd1758441ba75e07e0a2f1180dbda0f13e6b51993d7c945b3d91b3bef_amd64", "product": { "name": "openshift4/ose-telemeter@sha256:5abb2f8cd1758441ba75e07e0a2f1180dbda0f13e6b51993d7c945b3d91b3bef_amd64", "product_id": "openshift4/ose-telemeter@sha256:5abb2f8cd1758441ba75e07e0a2f1180dbda0f13e6b51993d7c945b3d91b3bef_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-telemeter@sha256:5abb2f8cd1758441ba75e07e0a2f1180dbda0f13e6b51993d7c945b3d91b3bef?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-telemeter\u0026tag=v4.1.14-201908291507" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift4/apb-base@sha256:183441575a8a0ba144fdd346e5ab560a067725a9b66d890493c326e14135512e_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/apb-base@sha256:183441575a8a0ba144fdd346e5ab560a067725a9b66d890493c326e14135512e_amd64" }, "product_reference": "openshift4/apb-base@sha256:183441575a8a0ba144fdd346e5ab560a067725a9b66d890493c326e14135512e_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/mariadb-apb@sha256:a446829513325ac146b2aa1b555347b57a2377712df6cd8a431c1dbec0614331_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/mariadb-apb@sha256:a446829513325ac146b2aa1b555347b57a2377712df6cd8a431c1dbec0614331_amd64" }, "product_reference": "openshift4/mariadb-apb@sha256:a446829513325ac146b2aa1b555347b57a2377712df6cd8a431c1dbec0614331_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/mediawiki-apb@sha256:0a1ab047c6a93e3531f20673b275854361f36e2ebd4894b5ad1705c3dde42a76_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/mediawiki-apb@sha256:0a1ab047c6a93e3531f20673b275854361f36e2ebd4894b5ad1705c3dde42a76_amd64" }, "product_reference": "openshift4/mediawiki-apb@sha256:0a1ab047c6a93e3531f20673b275854361f36e2ebd4894b5ad1705c3dde42a76_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/mediawiki@sha256:8014f0d73799f7f26b56a3d908b55de3103103f57a507d48fe9830c7d605f85d_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/mediawiki@sha256:8014f0d73799f7f26b56a3d908b55de3103103f57a507d48fe9830c7d605f85d_amd64" }, "product_reference": "openshift4/mediawiki@sha256:8014f0d73799f7f26b56a3d908b55de3103103f57a507d48fe9830c7d605f85d_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/mysql-apb@sha256:5772d2a584b96249c535df55b501ffe891162d7651b18244cdc16ab2f0d563dc_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/mysql-apb@sha256:5772d2a584b96249c535df55b501ffe891162d7651b18244cdc16ab2f0d563dc_amd64" }, "product_reference": "openshift4/mysql-apb@sha256:5772d2a584b96249c535df55b501ffe891162d7651b18244cdc16ab2f0d563dc_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ansible-operator@sha256:9469e5ed49937aeb64f0a3dbb5332f087c8498494127a5c507c02c3d4286afb1_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-ansible-operator@sha256:9469e5ed49937aeb64f0a3dbb5332f087c8498494127a5c507c02c3d4286afb1_amd64" }, "product_reference": "openshift4/ose-ansible-operator@sha256:9469e5ed49937aeb64f0a3dbb5332f087c8498494127a5c507c02c3d4286afb1_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-aws-machine-controllers@sha256:e5f585aa452461ee95d55e84d81be54a82a458a54dbcad1f68a8f28edeb7638b_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-aws-machine-controllers@sha256:e5f585aa452461ee95d55e84d81be54a82a458a54dbcad1f68a8f28edeb7638b_amd64" }, "product_reference": "openshift4/ose-aws-machine-controllers@sha256:e5f585aa452461ee95d55e84d81be54a82a458a54dbcad1f68a8f28edeb7638b_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-azure-machine-controllers@sha256:9f3199e5226fdcd5abe34a6f2e3a6ad7e7ad3f59edbff2bfd9b4c84566897eae_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-azure-machine-controllers@sha256:9f3199e5226fdcd5abe34a6f2e3a6ad7e7ad3f59edbff2bfd9b4c84566897eae_amd64" }, "product_reference": "openshift4/ose-azure-machine-controllers@sha256:9f3199e5226fdcd5abe34a6f2e3a6ad7e7ad3f59edbff2bfd9b4c84566897eae_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-baremetal-machine-controllers@sha256:d9ca5e81aa2fb401f9c5bfb63e85fc5d93ae1e657ab992e879a2b9d520f3fea3_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-baremetal-machine-controllers@sha256:d9ca5e81aa2fb401f9c5bfb63e85fc5d93ae1e657ab992e879a2b9d520f3fea3_amd64" }, "product_reference": "openshift4/ose-baremetal-machine-controllers@sha256:d9ca5e81aa2fb401f9c5bfb63e85fc5d93ae1e657ab992e879a2b9d520f3fea3_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cli-artifacts@sha256:bacaec21f6101ef686bb07b5d6e80b0b3ad06ab9a4d4f6e611ca3103c0030d7e_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cli-artifacts@sha256:bacaec21f6101ef686bb07b5d6e80b0b3ad06ab9a4d4f6e611ca3103c0030d7e_amd64" }, "product_reference": "openshift4/ose-cli-artifacts@sha256:bacaec21f6101ef686bb07b5d6e80b0b3ad06ab9a4d4f6e611ca3103c0030d7e_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cli@sha256:bb846647aa233adddf5ed39056fdf98a7d9dc3abef4c985df3de698a44ecc7fd_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cli@sha256:bb846647aa233adddf5ed39056fdf98a7d9dc3abef4c985df3de698a44ecc7fd_amd64" }, "product_reference": "openshift4/ose-cli@sha256:bb846647aa233adddf5ed39056fdf98a7d9dc3abef4c985df3de698a44ecc7fd_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cloud-credential-operator@sha256:27c7bac07c2a2a38ddb65a9997b22946fbe37ddd06ecf52eccd0ef9235ae47ba_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cloud-credential-operator@sha256:27c7bac07c2a2a38ddb65a9997b22946fbe37ddd06ecf52eccd0ef9235ae47ba_amd64" }, "product_reference": "openshift4/ose-cloud-credential-operator@sha256:27c7bac07c2a2a38ddb65a9997b22946fbe37ddd06ecf52eccd0ef9235ae47ba_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-authentication-operator@sha256:67dc9d9d90e5b37c73eda524a13e0bd98834b225adbfccc9d6c09a35a130c8f4_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-authentication-operator@sha256:67dc9d9d90e5b37c73eda524a13e0bd98834b225adbfccc9d6c09a35a130c8f4_amd64" }, "product_reference": "openshift4/ose-cluster-authentication-operator@sha256:67dc9d9d90e5b37c73eda524a13e0bd98834b225adbfccc9d6c09a35a130c8f4_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-autoscaler-operator@sha256:989948cb9998b518f3c325a2af3b24cfb7033ad2ac8be96cb3fafce2b4077435_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-autoscaler-operator@sha256:989948cb9998b518f3c325a2af3b24cfb7033ad2ac8be96cb3fafce2b4077435_amd64" }, "product_reference": "openshift4/ose-cluster-autoscaler-operator@sha256:989948cb9998b518f3c325a2af3b24cfb7033ad2ac8be96cb3fafce2b4077435_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-autoscaler@sha256:b995c30d43493a8d393282c760584605951048dbe395eeac6b6b1bec269ff3ad_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-autoscaler@sha256:b995c30d43493a8d393282c760584605951048dbe395eeac6b6b1bec269ff3ad_amd64" }, "product_reference": "openshift4/ose-cluster-autoscaler@sha256:b995c30d43493a8d393282c760584605951048dbe395eeac6b6b1bec269ff3ad_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-bootstrap@sha256:9a676b7e363f022a511ab07ae81242b5c6d03523db11c37b0bf47e0f0324c9d8_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-bootstrap@sha256:9a676b7e363f022a511ab07ae81242b5c6d03523db11c37b0bf47e0f0324c9d8_amd64" }, "product_reference": "openshift4/ose-cluster-bootstrap@sha256:9a676b7e363f022a511ab07ae81242b5c6d03523db11c37b0bf47e0f0324c9d8_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-capacity@sha256:24db95a9d24960c14775136419eed7dfddb7b7d70577fab77a63b64fc66d53a7_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-capacity@sha256:24db95a9d24960c14775136419eed7dfddb7b7d70577fab77a63b64fc66d53a7_amd64" }, "product_reference": "openshift4/ose-cluster-capacity@sha256:24db95a9d24960c14775136419eed7dfddb7b7d70577fab77a63b64fc66d53a7_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-config-operator@sha256:3b210b7313b4853f777d19248ba746b3d29251a3409124f984ae212809930427_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-config-operator@sha256:3b210b7313b4853f777d19248ba746b3d29251a3409124f984ae212809930427_amd64" }, "product_reference": "openshift4/ose-cluster-config-operator@sha256:3b210b7313b4853f777d19248ba746b3d29251a3409124f984ae212809930427_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-dns-operator@sha256:5f70ba7ebcee1ecb9f65c8b43280935866607fc3dee6329ed473169f2acebe05_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-dns-operator@sha256:5f70ba7ebcee1ecb9f65c8b43280935866607fc3dee6329ed473169f2acebe05_amd64" }, "product_reference": "openshift4/ose-cluster-dns-operator@sha256:5f70ba7ebcee1ecb9f65c8b43280935866607fc3dee6329ed473169f2acebe05_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-image-registry-operator@sha256:5c8fa5eb3828277f31ca0d4f7aedfee8e66dc0cfa3542772e6ac13c6b131644d_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-image-registry-operator@sha256:5c8fa5eb3828277f31ca0d4f7aedfee8e66dc0cfa3542772e6ac13c6b131644d_amd64" }, "product_reference": "openshift4/ose-cluster-image-registry-operator@sha256:5c8fa5eb3828277f31ca0d4f7aedfee8e66dc0cfa3542772e6ac13c6b131644d_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-ingress-operator@sha256:b33e32eaac7d15947e32cbeb9d45e9ae3e6fbe470611ab78f28cfc99d8759b68_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-ingress-operator@sha256:b33e32eaac7d15947e32cbeb9d45e9ae3e6fbe470611ab78f28cfc99d8759b68_amd64" }, "product_reference": "openshift4/ose-cluster-ingress-operator@sha256:b33e32eaac7d15947e32cbeb9d45e9ae3e6fbe470611ab78f28cfc99d8759b68_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:af88e84a2957ba9eeb1e5e3cdf9cf559ccb0de08d7a16c58a19c8eb805ba5a39_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-apiserver-operator@sha256:af88e84a2957ba9eeb1e5e3cdf9cf559ccb0de08d7a16c58a19c8eb805ba5a39_amd64" }, "product_reference": "openshift4/ose-cluster-kube-apiserver-operator@sha256:af88e84a2957ba9eeb1e5e3cdf9cf559ccb0de08d7a16c58a19c8eb805ba5a39_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:ca1e29c0c4eb029ed4d5544d5fde000000aa007f1d8e0fcf0fc0d317b5e06784_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-controller-manager-operator@sha256:ca1e29c0c4eb029ed4d5544d5fde000000aa007f1d8e0fcf0fc0d317b5e06784_amd64" }, "product_reference": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:ca1e29c0c4eb029ed4d5544d5fde000000aa007f1d8e0fcf0fc0d317b5e06784_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:6f30eebebe4b774acd19eadeae80c4a7c8ccb503389c354bc76fc0f778cefe2b_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-scheduler-operator@sha256:6f30eebebe4b774acd19eadeae80c4a7c8ccb503389c354bc76fc0f778cefe2b_amd64" }, "product_reference": "openshift4/ose-cluster-kube-scheduler-operator@sha256:6f30eebebe4b774acd19eadeae80c4a7c8ccb503389c354bc76fc0f778cefe2b_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-logging-operator@sha256:7926e2be0854ff3edac0ced6950a0be04ad26d46a5da638611457c3fe0f1a19a_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-logging-operator@sha256:7926e2be0854ff3edac0ced6950a0be04ad26d46a5da638611457c3fe0f1a19a_amd64" }, "product_reference": "openshift4/ose-cluster-logging-operator@sha256:7926e2be0854ff3edac0ced6950a0be04ad26d46a5da638611457c3fe0f1a19a_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-machine-approver@sha256:3535b9ccd701ac3fa6b6a8339f6c10d6e74dd4d8f5f810690fa7e272ee82f837_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-machine-approver@sha256:3535b9ccd701ac3fa6b6a8339f6c10d6e74dd4d8f5f810690fa7e272ee82f837_amd64" }, "product_reference": "openshift4/ose-cluster-machine-approver@sha256:3535b9ccd701ac3fa6b6a8339f6c10d6e74dd4d8f5f810690fa7e272ee82f837_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-monitoring-operator@sha256:05d69056c09c34d095ccedc757ecf2692690c72d2bee4e6b6afc58b01ec55d9c_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-monitoring-operator@sha256:05d69056c09c34d095ccedc757ecf2692690c72d2bee4e6b6afc58b01ec55d9c_amd64" }, "product_reference": "openshift4/ose-cluster-monitoring-operator@sha256:05d69056c09c34d095ccedc757ecf2692690c72d2bee4e6b6afc58b01ec55d9c_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-network-operator@sha256:2561079cceff11035c216fea71c0a10622696266aa5a9323ef13806c91537a68_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-network-operator@sha256:2561079cceff11035c216fea71c0a10622696266aa5a9323ef13806c91537a68_amd64" }, "product_reference": "openshift4/ose-cluster-network-operator@sha256:2561079cceff11035c216fea71c0a10622696266aa5a9323ef13806c91537a68_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-node-tuning-operator@sha256:b6fa66947d674eb2fc12b38fb9355c43c57a484d85e56dd013960a760046b793_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-node-tuning-operator@sha256:b6fa66947d674eb2fc12b38fb9355c43c57a484d85e56dd013960a760046b793_amd64" }, "product_reference": "openshift4/ose-cluster-node-tuning-operator@sha256:b6fa66947d674eb2fc12b38fb9355c43c57a484d85e56dd013960a760046b793_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:1291555580ce58d7855c7b93ace6826cd2b1a22499fc5df3aad7d36a30b880ee_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-openshift-apiserver-operator@sha256:1291555580ce58d7855c7b93ace6826cd2b1a22499fc5df3aad7d36a30b880ee_amd64" }, "product_reference": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:1291555580ce58d7855c7b93ace6826cd2b1a22499fc5df3aad7d36a30b880ee_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:3bdcfac3e9dcd30754f1e4158706bbcef77449fc3893521c86fd793cc1f7f32a_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:3bdcfac3e9dcd30754f1e4158706bbcef77449fc3893521c86fd793cc1f7f32a_amd64" }, "product_reference": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:3bdcfac3e9dcd30754f1e4158706bbcef77449fc3893521c86fd793cc1f7f32a_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-samples-operator@sha256:79ba26ee177bc7cd2ab89ddaa6c66b5dcfc6970dc457cc737d64b18b5d378637_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-samples-operator@sha256:79ba26ee177bc7cd2ab89ddaa6c66b5dcfc6970dc457cc737d64b18b5d378637_amd64" }, "product_reference": "openshift4/ose-cluster-samples-operator@sha256:79ba26ee177bc7cd2ab89ddaa6c66b5dcfc6970dc457cc737d64b18b5d378637_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-storage-operator@sha256:95ad59eb2e2cc58f7ae6b850f648259687f266f05ac91166a39da6bf441e3e86_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-storage-operator@sha256:95ad59eb2e2cc58f7ae6b850f648259687f266f05ac91166a39da6bf441e3e86_amd64" }, "product_reference": "openshift4/ose-cluster-storage-operator@sha256:95ad59eb2e2cc58f7ae6b850f648259687f266f05ac91166a39da6bf441e3e86_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-update-keys@sha256:f919d82bd99ecd768271c8ef7ad6bf6d2b5cb902410b93bbafc829c58b59a48f_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-update-keys@sha256:f919d82bd99ecd768271c8ef7ad6bf6d2b5cb902410b93bbafc829c58b59a48f_amd64" }, "product_reference": "openshift4/ose-cluster-update-keys@sha256:f919d82bd99ecd768271c8ef7ad6bf6d2b5cb902410b93bbafc829c58b59a48f_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-version-operator@sha256:2d99cc15d95e08541d60ebc1966b534fda48d00ee69c7c226996ac407a813d6b_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-version-operator@sha256:2d99cc15d95e08541d60ebc1966b534fda48d00ee69c7c226996ac407a813d6b_amd64" }, "product_reference": "openshift4/ose-cluster-version-operator@sha256:2d99cc15d95e08541d60ebc1966b534fda48d00ee69c7c226996ac407a813d6b_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-configmap-reloader@sha256:84bb7a8504eb34ff5e4e9ca92aab960c078ededed07ab0fe79620c0b9f32a51f_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-configmap-reloader@sha256:84bb7a8504eb34ff5e4e9ca92aab960c078ededed07ab0fe79620c0b9f32a51f_amd64" }, "product_reference": "openshift4/ose-configmap-reloader@sha256:84bb7a8504eb34ff5e4e9ca92aab960c078ededed07ab0fe79620c0b9f32a51f_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-console-operator@sha256:665d6d89d83c51de08526c08365317b3dbb9f20e1528ffb35697f6c8bd409ca3_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-console-operator@sha256:665d6d89d83c51de08526c08365317b3dbb9f20e1528ffb35697f6c8bd409ca3_amd64" }, "product_reference": "openshift4/ose-console-operator@sha256:665d6d89d83c51de08526c08365317b3dbb9f20e1528ffb35697f6c8bd409ca3_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-console@sha256:68c4a7514623c31f7fdf7058a0dcd968dc4e4a63bcf0236ff21333bfb27cc4aa_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-console@sha256:68c4a7514623c31f7fdf7058a0dcd968dc4e4a63bcf0236ff21333bfb27cc4aa_amd64" }, "product_reference": "openshift4/ose-console@sha256:68c4a7514623c31f7fdf7058a0dcd968dc4e4a63bcf0236ff21333bfb27cc4aa_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-coredns@sha256:9a330c9540816c13ddbbc93e99107f3d2a194c79eae20d81e8b8d252e9282c14_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-coredns@sha256:9a330c9540816c13ddbbc93e99107f3d2a194c79eae20d81e8b8d252e9282c14_amd64" }, "product_reference": "openshift4/ose-coredns@sha256:9a330c9540816c13ddbbc93e99107f3d2a194c79eae20d81e8b8d252e9282c14_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-deployer@sha256:ab62d8277ea2e69cf6697343c4b6bfef67f04c5f31cdf47fc510cb76969ca2ca_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-deployer@sha256:ab62d8277ea2e69cf6697343c4b6bfef67f04c5f31cdf47fc510cb76969ca2ca_amd64" }, "product_reference": "openshift4/ose-deployer@sha256:ab62d8277ea2e69cf6697343c4b6bfef67f04c5f31cdf47fc510cb76969ca2ca_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-descheduler-operator@sha256:71ba5a71c71074c282634a6261825c57977abd4999cc03957b8c407808a72902_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-descheduler-operator@sha256:71ba5a71c71074c282634a6261825c57977abd4999cc03957b8c407808a72902_amd64" }, "product_reference": "openshift4/ose-descheduler-operator@sha256:71ba5a71c71074c282634a6261825c57977abd4999cc03957b8c407808a72902_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-descheduler@sha256:f7527c56780840d4062768e88f098229effd9796639ad67f6cdf841941a7e4a1_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-descheduler@sha256:f7527c56780840d4062768e88f098229effd9796639ad67f6cdf841941a7e4a1_amd64" }, "product_reference": "openshift4/ose-descheduler@sha256:f7527c56780840d4062768e88f098229effd9796639ad67f6cdf841941a7e4a1_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-docker-builder@sha256:25b131fc577def1179ce8a2022211d366fa461b6afef2f566b3f177930a3d0db_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-docker-builder@sha256:25b131fc577def1179ce8a2022211d366fa461b6afef2f566b3f177930a3d0db_amd64" }, "product_reference": "openshift4/ose-docker-builder@sha256:25b131fc577def1179ce8a2022211d366fa461b6afef2f566b3f177930a3d0db_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-docker-registry@sha256:f7bd292dde7bd96195b313b4c459980fe8541bd89c442a4065a0114f42f3fe46_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-docker-registry@sha256:f7bd292dde7bd96195b313b4c459980fe8541bd89c442a4065a0114f42f3fe46_amd64" }, "product_reference": "openshift4/ose-docker-registry@sha256:f7bd292dde7bd96195b313b4c459980fe8541bd89c442a4065a0114f42f3fe46_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-egress-dns-proxy@sha256:2c00e51829c679d3573f813b0eced5c16382966ecf609915b47a8472872bbb64_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-dns-proxy@sha256:2c00e51829c679d3573f813b0eced5c16382966ecf609915b47a8472872bbb64_amd64" }, "product_reference": "openshift4/ose-egress-dns-proxy@sha256:2c00e51829c679d3573f813b0eced5c16382966ecf609915b47a8472872bbb64_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-egress-http-proxy@sha256:77ffd3c6dbb51743a13ce6a9cbd385602c24165848c205aca864b88af5b3c503_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-http-proxy@sha256:77ffd3c6dbb51743a13ce6a9cbd385602c24165848c205aca864b88af5b3c503_amd64" }, "product_reference": "openshift4/ose-egress-http-proxy@sha256:77ffd3c6dbb51743a13ce6a9cbd385602c24165848c205aca864b88af5b3c503_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-egress-router@sha256:c46ed6f837821decadaaf07266b9d67f89b98621618bc073abdc38db51bc692a_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-router@sha256:c46ed6f837821decadaaf07266b9d67f89b98621618bc073abdc38db51bc692a_amd64" }, "product_reference": "openshift4/ose-egress-router@sha256:c46ed6f837821decadaaf07266b9d67f89b98621618bc073abdc38db51bc692a_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-elasticsearch-operator@sha256:6b153238aa96aa4128de68a8df8dde185ebb930d2cee6fe1c033ff7b713fb6f9_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-elasticsearch-operator@sha256:6b153238aa96aa4128de68a8df8dde185ebb930d2cee6fe1c033ff7b713fb6f9_amd64" }, "product_reference": "openshift4/ose-elasticsearch-operator@sha256:6b153238aa96aa4128de68a8df8dde185ebb930d2cee6fe1c033ff7b713fb6f9_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-etcd@sha256:3df453713db7ea9a1bd8556a0a986fcd8d8c0a4649c262b9d8652ccfe648bb1e_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-etcd@sha256:3df453713db7ea9a1bd8556a0a986fcd8d8c0a4649c262b9d8652ccfe648bb1e_amd64" }, "product_reference": "openshift4/ose-etcd@sha256:3df453713db7ea9a1bd8556a0a986fcd8d8c0a4649c262b9d8652ccfe648bb1e_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-grafana@sha256:4304ba0edd79f4b2b7b6f4766dd696e8fb21423ff0dc50a18388e2163d9df3de_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-grafana@sha256:4304ba0edd79f4b2b7b6f4766dd696e8fb21423ff0dc50a18388e2163d9df3de_amd64" }, "product_reference": "openshift4/ose-grafana@sha256:4304ba0edd79f4b2b7b6f4766dd696e8fb21423ff0dc50a18388e2163d9df3de_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-haproxy-router@sha256:e0c7adba792e43e96c8d6f4e0845e2d001d0f652ece6f567b09ac481b07eafdc_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-haproxy-router@sha256:e0c7adba792e43e96c8d6f4e0845e2d001d0f652ece6f567b09ac481b07eafdc_amd64" }, "product_reference": "openshift4/ose-haproxy-router@sha256:e0c7adba792e43e96c8d6f4e0845e2d001d0f652ece6f567b09ac481b07eafdc_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-hyperkube@sha256:150fe3e51c75f09bd366d06a96749e17cd01aa845319032c327387950b52a34e_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-hyperkube@sha256:150fe3e51c75f09bd366d06a96749e17cd01aa845319032c327387950b52a34e_amd64" }, "product_reference": "openshift4/ose-hyperkube@sha256:150fe3e51c75f09bd366d06a96749e17cd01aa845319032c327387950b52a34e_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-hypershift@sha256:48392b80092bca63f2969b14412017601ebfda1b54141db53c2bc5b2317c389a_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-hypershift@sha256:48392b80092bca63f2969b14412017601ebfda1b54141db53c2bc5b2317c389a_amd64" }, "product_reference": "openshift4/ose-hypershift@sha256:48392b80092bca63f2969b14412017601ebfda1b54141db53c2bc5b2317c389a_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-installer-artifacts@sha256:7f3e05fa013dead5501513b86c19719973d0f9ee5dbdd4d3f5264fe601dbf809_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-installer-artifacts@sha256:7f3e05fa013dead5501513b86c19719973d0f9ee5dbdd4d3f5264fe601dbf809_amd64" }, "product_reference": "openshift4/ose-installer-artifacts@sha256:7f3e05fa013dead5501513b86c19719973d0f9ee5dbdd4d3f5264fe601dbf809_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-installer@sha256:7f0fb099018d7fba695adfff2c6cec1af789e3c3ccab61bb084a30ae1bdff79f_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-installer@sha256:7f0fb099018d7fba695adfff2c6cec1af789e3c3ccab61bb084a30ae1bdff79f_amd64" }, "product_reference": "openshift4/ose-installer@sha256:7f0fb099018d7fba695adfff2c6cec1af789e3c3ccab61bb084a30ae1bdff79f_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins-agent-base@sha256:c29122b0ed52c031f5f99ddb3338b6515bc05ac1e90864dda1131dcf9af87924_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins-agent-base@sha256:c29122b0ed52c031f5f99ddb3338b6515bc05ac1e90864dda1131dcf9af87924_amd64" }, "product_reference": "openshift4/ose-jenkins-agent-base@sha256:c29122b0ed52c031f5f99ddb3338b6515bc05ac1e90864dda1131dcf9af87924_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins-agent-maven@sha256:ce5dd50d7005ed2d5ef36de673a2cf2cec07ad997ed93956605fe8fc8836d15c_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins-agent-maven@sha256:ce5dd50d7005ed2d5ef36de673a2cf2cec07ad997ed93956605fe8fc8836d15c_amd64" }, "product_reference": "openshift4/ose-jenkins-agent-maven@sha256:ce5dd50d7005ed2d5ef36de673a2cf2cec07ad997ed93956605fe8fc8836d15c_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins@sha256:8da877d1df3fbb0fd4df607718847382d3ab38b862f868077c8938a1a7014f71_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins@sha256:8da877d1df3fbb0fd4df607718847382d3ab38b862f868077c8938a1a7014f71_amd64" }, "product_reference": "openshift4/ose-jenkins@sha256:8da877d1df3fbb0fd4df607718847382d3ab38b862f868077c8938a1a7014f71_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-k8s-prometheus-adapter@sha256:95e7924437a3d110b334b1b03c01e2a65292f092110acde1a59db280ce8c7bda_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-k8s-prometheus-adapter@sha256:95e7924437a3d110b334b1b03c01e2a65292f092110acde1a59db280ce8c7bda_amd64" }, "product_reference": "openshift4/ose-k8s-prometheus-adapter@sha256:95e7924437a3d110b334b1b03c01e2a65292f092110acde1a59db280ce8c7bda_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-keepalived-ipfailover@sha256:1c0b3bde2963560aa0c50bd8365abd39bc5cfae28409fbdc60abf786546eb2e8_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-keepalived-ipfailover@sha256:1c0b3bde2963560aa0c50bd8365abd39bc5cfae28409fbdc60abf786546eb2e8_amd64" }, "product_reference": "openshift4/ose-keepalived-ipfailover@sha256:1c0b3bde2963560aa0c50bd8365abd39bc5cfae28409fbdc60abf786546eb2e8_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kube-proxy@sha256:3afce3e28952226f1bb959b2859050e848ed5d4549ac5e2fc267f51b11fc6ec3_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-proxy@sha256:3afce3e28952226f1bb959b2859050e848ed5d4549ac5e2fc267f51b11fc6ec3_amd64" }, "product_reference": "openshift4/ose-kube-proxy@sha256:3afce3e28952226f1bb959b2859050e848ed5d4549ac5e2fc267f51b11fc6ec3_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kube-rbac-proxy@sha256:dab4af2713fa59499ee8d2cb169d636ddb425590e6924bc2c03597c0b10bd246_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-rbac-proxy@sha256:dab4af2713fa59499ee8d2cb169d636ddb425590e6924bc2c03597c0b10bd246_amd64" }, "product_reference": "openshift4/ose-kube-rbac-proxy@sha256:dab4af2713fa59499ee8d2cb169d636ddb425590e6924bc2c03597c0b10bd246_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kube-state-metrics@sha256:4ff6cd48b319093041c2fa9c32ce16c6ea4dffb1c66ef4923f9cfc108cdfe6cc_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-state-metrics@sha256:4ff6cd48b319093041c2fa9c32ce16c6ea4dffb1c66ef4923f9cfc108cdfe6cc_amd64" }, "product_reference": "openshift4/ose-kube-state-metrics@sha256:4ff6cd48b319093041c2fa9c32ce16c6ea4dffb1c66ef4923f9cfc108cdfe6cc_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-libvirt-machine-controllers@sha256:2446ea720c26b213b9419bd2ad867c0ca1ec6df6d972cd5ffd6037b8fe0fbc88_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-libvirt-machine-controllers@sha256:2446ea720c26b213b9419bd2ad867c0ca1ec6df6d972cd5ffd6037b8fe0fbc88_amd64" }, "product_reference": "openshift4/ose-libvirt-machine-controllers@sha256:2446ea720c26b213b9419bd2ad867c0ca1ec6df6d972cd5ffd6037b8fe0fbc88_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-logging-curator5@sha256:91942a469532fda2a4609f2d7ddf693cca5b2ccd8c770d0e36823f0cc67d884c_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-curator5@sha256:91942a469532fda2a4609f2d7ddf693cca5b2ccd8c770d0e36823f0cc67d884c_amd64" }, "product_reference": "openshift4/ose-logging-curator5@sha256:91942a469532fda2a4609f2d7ddf693cca5b2ccd8c770d0e36823f0cc67d884c_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-logging-elasticsearch5@sha256:c4693439c2f0f114238cc4034bfc6cd17f93bb9562ac2c0f9feb30f9c657fcd7_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-elasticsearch5@sha256:c4693439c2f0f114238cc4034bfc6cd17f93bb9562ac2c0f9feb30f9c657fcd7_amd64" }, "product_reference": "openshift4/ose-logging-elasticsearch5@sha256:c4693439c2f0f114238cc4034bfc6cd17f93bb9562ac2c0f9feb30f9c657fcd7_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-logging-eventrouter@sha256:7668a706700163a35def516d1e1be336fef418ea477ef014ba90f5317569384b_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-eventrouter@sha256:7668a706700163a35def516d1e1be336fef418ea477ef014ba90f5317569384b_amd64" }, "product_reference": "openshift4/ose-logging-eventrouter@sha256:7668a706700163a35def516d1e1be336fef418ea477ef014ba90f5317569384b_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-logging-fluentd@sha256:3ef99bc79d891b111828c6c29faa8f3cd37d8ab8897186eff2bc85824939f632_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-fluentd@sha256:3ef99bc79d891b111828c6c29faa8f3cd37d8ab8897186eff2bc85824939f632_amd64" }, "product_reference": "openshift4/ose-logging-fluentd@sha256:3ef99bc79d891b111828c6c29faa8f3cd37d8ab8897186eff2bc85824939f632_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-machine-api-operator@sha256:6dfe7c13a6ae6c6e509f0d8cd0cb6e5284f9efd8cc2c949d87a471643e730957_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-machine-api-operator@sha256:6dfe7c13a6ae6c6e509f0d8cd0cb6e5284f9efd8cc2c949d87a471643e730957_amd64" }, "product_reference": "openshift4/ose-machine-api-operator@sha256:6dfe7c13a6ae6c6e509f0d8cd0cb6e5284f9efd8cc2c949d87a471643e730957_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-machine-config-operator@sha256:ebffd73f3e4ff92792bad0cfa5bba5bec17e2124c7618ae7c4bd49ac777b7deb_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-machine-config-operator@sha256:ebffd73f3e4ff92792bad0cfa5bba5bec17e2124c7618ae7c4bd49ac777b7deb_amd64" }, "product_reference": "openshift4/ose-machine-config-operator@sha256:ebffd73f3e4ff92792bad0cfa5bba5bec17e2124c7618ae7c4bd49ac777b7deb_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-admission-controller@sha256:101d1c2eeebf1c5e336238056ff9415de50855363eebce3b75cf6ac562adca05_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-admission-controller@sha256:101d1c2eeebf1c5e336238056ff9415de50855363eebce3b75cf6ac562adca05_amd64" }, "product_reference": "openshift4/ose-multus-admission-controller@sha256:101d1c2eeebf1c5e336238056ff9415de50855363eebce3b75cf6ac562adca05_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-cni@sha256:9be2123934d7f80af6439a84b5a9887459c1655549c7790fd080e965e89049b4_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-cni@sha256:9be2123934d7f80af6439a84b5a9887459c1655549c7790fd080e965e89049b4_amd64" }, "product_reference": "openshift4/ose-multus-cni@sha256:9be2123934d7f80af6439a84b5a9887459c1655549c7790fd080e965e89049b4_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-must-gather@sha256:1acef66db6179f4289fc4abbb297df32c01d3b13fd85530ac6a0d925b517c3df_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-must-gather@sha256:1acef66db6179f4289fc4abbb297df32c01d3b13fd85530ac6a0d925b517c3df_amd64" }, "product_reference": "openshift4/ose-must-gather@sha256:1acef66db6179f4289fc4abbb297df32c01d3b13fd85530ac6a0d925b517c3df_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-oauth-proxy@sha256:383360705efc0605760c3b2b1d0fa288094eb6dad8158c540d950f661b4ba880_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-oauth-proxy@sha256:383360705efc0605760c3b2b1d0fa288094eb6dad8158c540d950f661b4ba880_amd64" }, "product_reference": "openshift4/ose-oauth-proxy@sha256:383360705efc0605760c3b2b1d0fa288094eb6dad8158c540d950f661b4ba880_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openstack-machine-controllers@sha256:1779881159f1548a75e4dfd8a285e6ecab2ceede42acd9d07f036ec28bf1e6f9_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-openstack-machine-controllers@sha256:1779881159f1548a75e4dfd8a285e6ecab2ceede42acd9d07f036ec28bf1e6f9_amd64" }, "product_reference": "openshift4/ose-openstack-machine-controllers@sha256:1779881159f1548a75e4dfd8a285e6ecab2ceede42acd9d07f036ec28bf1e6f9_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-lifecycle-manager@sha256:9254b8d3097a0d067f07bcf735b3530eccc888466f99a6282aebb7bbdd9cbcc8_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-lifecycle-manager@sha256:9254b8d3097a0d067f07bcf735b3530eccc888466f99a6282aebb7bbdd9cbcc8_amd64" }, "product_reference": "openshift4/ose-operator-lifecycle-manager@sha256:9254b8d3097a0d067f07bcf735b3530eccc888466f99a6282aebb7bbdd9cbcc8_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-marketplace@sha256:3c5b9b86c9a9cd3c11290a44e29f016fe054b7068dd5b8469956909a63813db8_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-marketplace@sha256:3c5b9b86c9a9cd3c11290a44e29f016fe054b7068dd5b8469956909a63813db8_amd64" }, "product_reference": "openshift4/ose-operator-marketplace@sha256:3c5b9b86c9a9cd3c11290a44e29f016fe054b7068dd5b8469956909a63813db8_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-registry@sha256:5eecc9d91c1ae4f0af586aa7d97fce8a32f23dfcdd64dcc61b9c536fbf4e8663_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-registry@sha256:5eecc9d91c1ae4f0af586aa7d97fce8a32f23dfcdd64dcc61b9c536fbf4e8663_amd64" }, "product_reference": "openshift4/ose-operator-registry@sha256:5eecc9d91c1ae4f0af586aa7d97fce8a32f23dfcdd64dcc61b9c536fbf4e8663_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ovn-kubernetes@sha256:d4234553bb7e59323ee19b5d87d189f78fb4cd747551af6a6413b88001e27e13_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-ovn-kubernetes@sha256:d4234553bb7e59323ee19b5d87d189f78fb4cd747551af6a6413b88001e27e13_amd64" }, "product_reference": "openshift4/ose-ovn-kubernetes@sha256:d4234553bb7e59323ee19b5d87d189f78fb4cd747551af6a6413b88001e27e13_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-pod@sha256:40b2f3ff0b5ff873669613882579b2a714aed77e1fea4e28a26ebf2726177707_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-pod@sha256:40b2f3ff0b5ff873669613882579b2a714aed77e1fea4e28a26ebf2726177707_amd64" }, "product_reference": "openshift4/ose-pod@sha256:40b2f3ff0b5ff873669613882579b2a714aed77e1fea4e28a26ebf2726177707_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prom-label-proxy@sha256:c77261cc981cc8a5193ca1199c0a119db5757de135f4f7f5e558744371d2bd8a_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-prom-label-proxy@sha256:c77261cc981cc8a5193ca1199c0a119db5757de135f4f7f5e558744371d2bd8a_amd64" }, "product_reference": "openshift4/ose-prom-label-proxy@sha256:c77261cc981cc8a5193ca1199c0a119db5757de135f4f7f5e558744371d2bd8a_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus-alertmanager@sha256:ef6c822baa9167856e613e7f1c14a1b44da42a394d91b9e0407d01d769a8fb40_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-alertmanager@sha256:ef6c822baa9167856e613e7f1c14a1b44da42a394d91b9e0407d01d769a8fb40_amd64" }, "product_reference": "openshift4/ose-prometheus-alertmanager@sha256:ef6c822baa9167856e613e7f1c14a1b44da42a394d91b9e0407d01d769a8fb40_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus-config-reloader@sha256:6c0551dd87cc7eacc18ccbac093043b1178225f64843f13435f02ae7c2b4d91e_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-config-reloader@sha256:6c0551dd87cc7eacc18ccbac093043b1178225f64843f13435f02ae7c2b4d91e_amd64" }, "product_reference": "openshift4/ose-prometheus-config-reloader@sha256:6c0551dd87cc7eacc18ccbac093043b1178225f64843f13435f02ae7c2b4d91e_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus-node-exporter@sha256:56c31eb82f202b0ab38bc600ef01ef68302a0a57b7274c9537d3518855e2da1d_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-node-exporter@sha256:56c31eb82f202b0ab38bc600ef01ef68302a0a57b7274c9537d3518855e2da1d_amd64" }, "product_reference": "openshift4/ose-prometheus-node-exporter@sha256:56c31eb82f202b0ab38bc600ef01ef68302a0a57b7274c9537d3518855e2da1d_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus-operator@sha256:a5f9da1798e6b598157343e8751eda45ead551ddfb34ac5e742c6b1d8c8bf0d4_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-operator@sha256:a5f9da1798e6b598157343e8751eda45ead551ddfb34ac5e742c6b1d8c8bf0d4_amd64" }, "product_reference": "openshift4/ose-prometheus-operator@sha256:a5f9da1798e6b598157343e8751eda45ead551ddfb34ac5e742c6b1d8c8bf0d4_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus@sha256:38e663d919d2c96af52656b42d18556cf457b84ef3160e27496f6db36ffa92a3_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus@sha256:38e663d919d2c96af52656b42d18556cf457b84ef3160e27496f6db36ffa92a3_amd64" }, "product_reference": "openshift4/ose-prometheus@sha256:38e663d919d2c96af52656b42d18556cf457b84ef3160e27496f6db36ffa92a3_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-service-ca-operator@sha256:ba2867ef0021af24b6667d114983400a0f7f5824842f1e11d1cda5aa91286737_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-service-ca-operator@sha256:ba2867ef0021af24b6667d114983400a0f7f5824842f1e11d1cda5aa91286737_amd64" }, "product_reference": "openshift4/ose-service-ca-operator@sha256:ba2867ef0021af24b6667d114983400a0f7f5824842f1e11d1cda5aa91286737_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-cni@sha256:7a129a17d719761425ce26a47eaa115789be893f4a1054e37f3c76f891157886_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-cni@sha256:7a129a17d719761425ce26a47eaa115789be893f4a1054e37f3c76f891157886_amd64" }, "product_reference": "openshift4/ose-sriov-cni@sha256:7a129a17d719761425ce26a47eaa115789be893f4a1054e37f3c76f891157886_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-dp-admission-controller@sha256:e98327978a09c28baa5f10365d2df1e2c33bb689644d581aa6f7ff095e0c1c5d_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-dp-admission-controller@sha256:e98327978a09c28baa5f10365d2df1e2c33bb689644d581aa6f7ff095e0c1c5d_amd64" }, "product_reference": "openshift4/ose-sriov-dp-admission-controller@sha256:e98327978a09c28baa5f10365d2df1e2c33bb689644d581aa6f7ff095e0c1c5d_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-device-plugin@sha256:4dc4017eee056448d0192834de329c6563c48f625f21ca9db59b22d54db70de8_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-network-device-plugin@sha256:4dc4017eee056448d0192834de329c6563c48f625f21ca9db59b22d54db70de8_amd64" }, "product_reference": "openshift4/ose-sriov-network-device-plugin@sha256:4dc4017eee056448d0192834de329c6563c48f625f21ca9db59b22d54db70de8_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-telemeter@sha256:5abb2f8cd1758441ba75e07e0a2f1180dbda0f13e6b51993d7c945b3d91b3bef_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-telemeter@sha256:5abb2f8cd1758441ba75e07e0a2f1180dbda0f13e6b51993d7c945b3d91b3bef_amd64" }, "product_reference": "openshift4/ose-telemeter@sha256:5abb2f8cd1758441ba75e07e0a2f1180dbda0f13e6b51993d7c945b3d91b3bef_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-tests@sha256:28866a167dd7df474b053e92de3ba9bc0d95d918180b1e676637df30c2a27ef4_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-tests@sha256:28866a167dd7df474b053e92de3ba9bc0d95d918180b1e676637df30c2a27ef4_amd64" }, "product_reference": "openshift4/ose-tests@sha256:28866a167dd7df474b053e92de3ba9bc0d95d918180b1e676637df30c2a27ef4_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/postgres-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/postgres-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64" }, "product_reference": "openshift4/postgres-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/postgresql-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/postgresql-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64" }, "product_reference": "openshift4/postgresql-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.1:openshift4/apb-base@sha256:183441575a8a0ba144fdd346e5ab560a067725a9b66d890493c326e14135512e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mariadb-apb@sha256:a446829513325ac146b2aa1b555347b57a2377712df6cd8a431c1dbec0614331_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mediawiki-apb@sha256:0a1ab047c6a93e3531f20673b275854361f36e2ebd4894b5ad1705c3dde42a76_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mediawiki@sha256:8014f0d73799f7f26b56a3d908b55de3103103f57a507d48fe9830c7d605f85d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mysql-apb@sha256:5772d2a584b96249c535df55b501ffe891162d7651b18244cdc16ab2f0d563dc_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-ansible-operator@sha256:9469e5ed49937aeb64f0a3dbb5332f087c8498494127a5c507c02c3d4286afb1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-aws-machine-controllers@sha256:e5f585aa452461ee95d55e84d81be54a82a458a54dbcad1f68a8f28edeb7638b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-azure-machine-controllers@sha256:9f3199e5226fdcd5abe34a6f2e3a6ad7e7ad3f59edbff2bfd9b4c84566897eae_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-baremetal-machine-controllers@sha256:d9ca5e81aa2fb401f9c5bfb63e85fc5d93ae1e657ab992e879a2b9d520f3fea3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cli-artifacts@sha256:bacaec21f6101ef686bb07b5d6e80b0b3ad06ab9a4d4f6e611ca3103c0030d7e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cli@sha256:bb846647aa233adddf5ed39056fdf98a7d9dc3abef4c985df3de698a44ecc7fd_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cloud-credential-operator@sha256:27c7bac07c2a2a38ddb65a9997b22946fbe37ddd06ecf52eccd0ef9235ae47ba_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-authentication-operator@sha256:67dc9d9d90e5b37c73eda524a13e0bd98834b225adbfccc9d6c09a35a130c8f4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-autoscaler-operator@sha256:989948cb9998b518f3c325a2af3b24cfb7033ad2ac8be96cb3fafce2b4077435_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-autoscaler@sha256:b995c30d43493a8d393282c760584605951048dbe395eeac6b6b1bec269ff3ad_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-bootstrap@sha256:9a676b7e363f022a511ab07ae81242b5c6d03523db11c37b0bf47e0f0324c9d8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-capacity@sha256:24db95a9d24960c14775136419eed7dfddb7b7d70577fab77a63b64fc66d53a7_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-config-operator@sha256:3b210b7313b4853f777d19248ba746b3d29251a3409124f984ae212809930427_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-dns-operator@sha256:5f70ba7ebcee1ecb9f65c8b43280935866607fc3dee6329ed473169f2acebe05_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-image-registry-operator@sha256:5c8fa5eb3828277f31ca0d4f7aedfee8e66dc0cfa3542772e6ac13c6b131644d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-ingress-operator@sha256:b33e32eaac7d15947e32cbeb9d45e9ae3e6fbe470611ab78f28cfc99d8759b68_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-apiserver-operator@sha256:af88e84a2957ba9eeb1e5e3cdf9cf559ccb0de08d7a16c58a19c8eb805ba5a39_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-controller-manager-operator@sha256:ca1e29c0c4eb029ed4d5544d5fde000000aa007f1d8e0fcf0fc0d317b5e06784_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-scheduler-operator@sha256:6f30eebebe4b774acd19eadeae80c4a7c8ccb503389c354bc76fc0f778cefe2b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-logging-operator@sha256:7926e2be0854ff3edac0ced6950a0be04ad26d46a5da638611457c3fe0f1a19a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-machine-approver@sha256:3535b9ccd701ac3fa6b6a8339f6c10d6e74dd4d8f5f810690fa7e272ee82f837_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-monitoring-operator@sha256:05d69056c09c34d095ccedc757ecf2692690c72d2bee4e6b6afc58b01ec55d9c_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-network-operator@sha256:2561079cceff11035c216fea71c0a10622696266aa5a9323ef13806c91537a68_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-node-tuning-operator@sha256:b6fa66947d674eb2fc12b38fb9355c43c57a484d85e56dd013960a760046b793_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-openshift-apiserver-operator@sha256:1291555580ce58d7855c7b93ace6826cd2b1a22499fc5df3aad7d36a30b880ee_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:3bdcfac3e9dcd30754f1e4158706bbcef77449fc3893521c86fd793cc1f7f32a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-samples-operator@sha256:79ba26ee177bc7cd2ab89ddaa6c66b5dcfc6970dc457cc737d64b18b5d378637_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-storage-operator@sha256:95ad59eb2e2cc58f7ae6b850f648259687f266f05ac91166a39da6bf441e3e86_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-update-keys@sha256:f919d82bd99ecd768271c8ef7ad6bf6d2b5cb902410b93bbafc829c58b59a48f_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-version-operator@sha256:2d99cc15d95e08541d60ebc1966b534fda48d00ee69c7c226996ac407a813d6b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-configmap-reloader@sha256:84bb7a8504eb34ff5e4e9ca92aab960c078ededed07ab0fe79620c0b9f32a51f_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-console-operator@sha256:665d6d89d83c51de08526c08365317b3dbb9f20e1528ffb35697f6c8bd409ca3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-console@sha256:68c4a7514623c31f7fdf7058a0dcd968dc4e4a63bcf0236ff21333bfb27cc4aa_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-coredns@sha256:9a330c9540816c13ddbbc93e99107f3d2a194c79eae20d81e8b8d252e9282c14_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-deployer@sha256:ab62d8277ea2e69cf6697343c4b6bfef67f04c5f31cdf47fc510cb76969ca2ca_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-descheduler-operator@sha256:71ba5a71c71074c282634a6261825c57977abd4999cc03957b8c407808a72902_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-descheduler@sha256:f7527c56780840d4062768e88f098229effd9796639ad67f6cdf841941a7e4a1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-docker-builder@sha256:25b131fc577def1179ce8a2022211d366fa461b6afef2f566b3f177930a3d0db_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-docker-registry@sha256:f7bd292dde7bd96195b313b4c459980fe8541bd89c442a4065a0114f42f3fe46_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-dns-proxy@sha256:2c00e51829c679d3573f813b0eced5c16382966ecf609915b47a8472872bbb64_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-http-proxy@sha256:77ffd3c6dbb51743a13ce6a9cbd385602c24165848c205aca864b88af5b3c503_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-router@sha256:c46ed6f837821decadaaf07266b9d67f89b98621618bc073abdc38db51bc692a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-elasticsearch-operator@sha256:6b153238aa96aa4128de68a8df8dde185ebb930d2cee6fe1c033ff7b713fb6f9_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-etcd@sha256:3df453713db7ea9a1bd8556a0a986fcd8d8c0a4649c262b9d8652ccfe648bb1e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-grafana@sha256:4304ba0edd79f4b2b7b6f4766dd696e8fb21423ff0dc50a18388e2163d9df3de_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-haproxy-router@sha256:e0c7adba792e43e96c8d6f4e0845e2d001d0f652ece6f567b09ac481b07eafdc_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-hyperkube@sha256:150fe3e51c75f09bd366d06a96749e17cd01aa845319032c327387950b52a34e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-hypershift@sha256:48392b80092bca63f2969b14412017601ebfda1b54141db53c2bc5b2317c389a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-installer-artifacts@sha256:7f3e05fa013dead5501513b86c19719973d0f9ee5dbdd4d3f5264fe601dbf809_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-installer@sha256:7f0fb099018d7fba695adfff2c6cec1af789e3c3ccab61bb084a30ae1bdff79f_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins-agent-base@sha256:c29122b0ed52c031f5f99ddb3338b6515bc05ac1e90864dda1131dcf9af87924_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins-agent-maven@sha256:ce5dd50d7005ed2d5ef36de673a2cf2cec07ad997ed93956605fe8fc8836d15c_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins@sha256:8da877d1df3fbb0fd4df607718847382d3ab38b862f868077c8938a1a7014f71_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-k8s-prometheus-adapter@sha256:95e7924437a3d110b334b1b03c01e2a65292f092110acde1a59db280ce8c7bda_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-keepalived-ipfailover@sha256:1c0b3bde2963560aa0c50bd8365abd39bc5cfae28409fbdc60abf786546eb2e8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-proxy@sha256:3afce3e28952226f1bb959b2859050e848ed5d4549ac5e2fc267f51b11fc6ec3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-rbac-proxy@sha256:dab4af2713fa59499ee8d2cb169d636ddb425590e6924bc2c03597c0b10bd246_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-state-metrics@sha256:4ff6cd48b319093041c2fa9c32ce16c6ea4dffb1c66ef4923f9cfc108cdfe6cc_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-libvirt-machine-controllers@sha256:2446ea720c26b213b9419bd2ad867c0ca1ec6df6d972cd5ffd6037b8fe0fbc88_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-curator5@sha256:91942a469532fda2a4609f2d7ddf693cca5b2ccd8c770d0e36823f0cc67d884c_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-elasticsearch5@sha256:c4693439c2f0f114238cc4034bfc6cd17f93bb9562ac2c0f9feb30f9c657fcd7_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-eventrouter@sha256:7668a706700163a35def516d1e1be336fef418ea477ef014ba90f5317569384b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-fluentd@sha256:3ef99bc79d891b111828c6c29faa8f3cd37d8ab8897186eff2bc85824939f632_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-machine-api-operator@sha256:6dfe7c13a6ae6c6e509f0d8cd0cb6e5284f9efd8cc2c949d87a471643e730957_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-machine-config-operator@sha256:ebffd73f3e4ff92792bad0cfa5bba5bec17e2124c7618ae7c4bd49ac777b7deb_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-admission-controller@sha256:101d1c2eeebf1c5e336238056ff9415de50855363eebce3b75cf6ac562adca05_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-cni@sha256:9be2123934d7f80af6439a84b5a9887459c1655549c7790fd080e965e89049b4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-must-gather@sha256:1acef66db6179f4289fc4abbb297df32c01d3b13fd85530ac6a0d925b517c3df_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-oauth-proxy@sha256:383360705efc0605760c3b2b1d0fa288094eb6dad8158c540d950f661b4ba880_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-openstack-machine-controllers@sha256:1779881159f1548a75e4dfd8a285e6ecab2ceede42acd9d07f036ec28bf1e6f9_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-lifecycle-manager@sha256:9254b8d3097a0d067f07bcf735b3530eccc888466f99a6282aebb7bbdd9cbcc8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-marketplace@sha256:3c5b9b86c9a9cd3c11290a44e29f016fe054b7068dd5b8469956909a63813db8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-registry@sha256:5eecc9d91c1ae4f0af586aa7d97fce8a32f23dfcdd64dcc61b9c536fbf4e8663_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-ovn-kubernetes@sha256:d4234553bb7e59323ee19b5d87d189f78fb4cd747551af6a6413b88001e27e13_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-pod@sha256:40b2f3ff0b5ff873669613882579b2a714aed77e1fea4e28a26ebf2726177707_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prom-label-proxy@sha256:c77261cc981cc8a5193ca1199c0a119db5757de135f4f7f5e558744371d2bd8a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-alertmanager@sha256:ef6c822baa9167856e613e7f1c14a1b44da42a394d91b9e0407d01d769a8fb40_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-config-reloader@sha256:6c0551dd87cc7eacc18ccbac093043b1178225f64843f13435f02ae7c2b4d91e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-node-exporter@sha256:56c31eb82f202b0ab38bc600ef01ef68302a0a57b7274c9537d3518855e2da1d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-operator@sha256:a5f9da1798e6b598157343e8751eda45ead551ddfb34ac5e742c6b1d8c8bf0d4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus@sha256:38e663d919d2c96af52656b42d18556cf457b84ef3160e27496f6db36ffa92a3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-service-ca-operator@sha256:ba2867ef0021af24b6667d114983400a0f7f5824842f1e11d1cda5aa91286737_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-cni@sha256:7a129a17d719761425ce26a47eaa115789be893f4a1054e37f3c76f891157886_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-dp-admission-controller@sha256:e98327978a09c28baa5f10365d2df1e2c33bb689644d581aa6f7ff095e0c1c5d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-network-device-plugin@sha256:4dc4017eee056448d0192834de329c6563c48f625f21ca9db59b22d54db70de8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-telemeter@sha256:5abb2f8cd1758441ba75e07e0a2f1180dbda0f13e6b51993d7c945b3d91b3bef_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-tests@sha256:28866a167dd7df474b053e92de3ba9bc0d95d918180b1e676637df30c2a27ef4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/postgres-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64", "7Server-RH7-RHOSE-4.1:openshift4/postgresql-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-10T15:58:57+00:00", "details": "For OpenShift Container Platform 4.1 see the following documentation, which\nwill be updated shortly for release 4.1.14, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.1/updating/updating-cluster-cli.html.", "product_ids": [ "7Server-RH7-RHOSE-4.1:openshift4/apb-base@sha256:183441575a8a0ba144fdd346e5ab560a067725a9b66d890493c326e14135512e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mariadb-apb@sha256:a446829513325ac146b2aa1b555347b57a2377712df6cd8a431c1dbec0614331_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mediawiki-apb@sha256:0a1ab047c6a93e3531f20673b275854361f36e2ebd4894b5ad1705c3dde42a76_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mediawiki@sha256:8014f0d73799f7f26b56a3d908b55de3103103f57a507d48fe9830c7d605f85d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mysql-apb@sha256:5772d2a584b96249c535df55b501ffe891162d7651b18244cdc16ab2f0d563dc_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-ansible-operator@sha256:9469e5ed49937aeb64f0a3dbb5332f087c8498494127a5c507c02c3d4286afb1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-aws-machine-controllers@sha256:e5f585aa452461ee95d55e84d81be54a82a458a54dbcad1f68a8f28edeb7638b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-azure-machine-controllers@sha256:9f3199e5226fdcd5abe34a6f2e3a6ad7e7ad3f59edbff2bfd9b4c84566897eae_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-baremetal-machine-controllers@sha256:d9ca5e81aa2fb401f9c5bfb63e85fc5d93ae1e657ab992e879a2b9d520f3fea3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cli-artifacts@sha256:bacaec21f6101ef686bb07b5d6e80b0b3ad06ab9a4d4f6e611ca3103c0030d7e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cli@sha256:bb846647aa233adddf5ed39056fdf98a7d9dc3abef4c985df3de698a44ecc7fd_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cloud-credential-operator@sha256:27c7bac07c2a2a38ddb65a9997b22946fbe37ddd06ecf52eccd0ef9235ae47ba_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-authentication-operator@sha256:67dc9d9d90e5b37c73eda524a13e0bd98834b225adbfccc9d6c09a35a130c8f4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-autoscaler-operator@sha256:989948cb9998b518f3c325a2af3b24cfb7033ad2ac8be96cb3fafce2b4077435_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-autoscaler@sha256:b995c30d43493a8d393282c760584605951048dbe395eeac6b6b1bec269ff3ad_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-bootstrap@sha256:9a676b7e363f022a511ab07ae81242b5c6d03523db11c37b0bf47e0f0324c9d8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-capacity@sha256:24db95a9d24960c14775136419eed7dfddb7b7d70577fab77a63b64fc66d53a7_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-config-operator@sha256:3b210b7313b4853f777d19248ba746b3d29251a3409124f984ae212809930427_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-dns-operator@sha256:5f70ba7ebcee1ecb9f65c8b43280935866607fc3dee6329ed473169f2acebe05_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-image-registry-operator@sha256:5c8fa5eb3828277f31ca0d4f7aedfee8e66dc0cfa3542772e6ac13c6b131644d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-ingress-operator@sha256:b33e32eaac7d15947e32cbeb9d45e9ae3e6fbe470611ab78f28cfc99d8759b68_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-apiserver-operator@sha256:af88e84a2957ba9eeb1e5e3cdf9cf559ccb0de08d7a16c58a19c8eb805ba5a39_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-controller-manager-operator@sha256:ca1e29c0c4eb029ed4d5544d5fde000000aa007f1d8e0fcf0fc0d317b5e06784_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-scheduler-operator@sha256:6f30eebebe4b774acd19eadeae80c4a7c8ccb503389c354bc76fc0f778cefe2b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-logging-operator@sha256:7926e2be0854ff3edac0ced6950a0be04ad26d46a5da638611457c3fe0f1a19a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-machine-approver@sha256:3535b9ccd701ac3fa6b6a8339f6c10d6e74dd4d8f5f810690fa7e272ee82f837_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-monitoring-operator@sha256:05d69056c09c34d095ccedc757ecf2692690c72d2bee4e6b6afc58b01ec55d9c_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-network-operator@sha256:2561079cceff11035c216fea71c0a10622696266aa5a9323ef13806c91537a68_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-node-tuning-operator@sha256:b6fa66947d674eb2fc12b38fb9355c43c57a484d85e56dd013960a760046b793_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-openshift-apiserver-operator@sha256:1291555580ce58d7855c7b93ace6826cd2b1a22499fc5df3aad7d36a30b880ee_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:3bdcfac3e9dcd30754f1e4158706bbcef77449fc3893521c86fd793cc1f7f32a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-samples-operator@sha256:79ba26ee177bc7cd2ab89ddaa6c66b5dcfc6970dc457cc737d64b18b5d378637_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-storage-operator@sha256:95ad59eb2e2cc58f7ae6b850f648259687f266f05ac91166a39da6bf441e3e86_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-update-keys@sha256:f919d82bd99ecd768271c8ef7ad6bf6d2b5cb902410b93bbafc829c58b59a48f_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-version-operator@sha256:2d99cc15d95e08541d60ebc1966b534fda48d00ee69c7c226996ac407a813d6b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-configmap-reloader@sha256:84bb7a8504eb34ff5e4e9ca92aab960c078ededed07ab0fe79620c0b9f32a51f_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-console-operator@sha256:665d6d89d83c51de08526c08365317b3dbb9f20e1528ffb35697f6c8bd409ca3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-console@sha256:68c4a7514623c31f7fdf7058a0dcd968dc4e4a63bcf0236ff21333bfb27cc4aa_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-coredns@sha256:9a330c9540816c13ddbbc93e99107f3d2a194c79eae20d81e8b8d252e9282c14_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-deployer@sha256:ab62d8277ea2e69cf6697343c4b6bfef67f04c5f31cdf47fc510cb76969ca2ca_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-descheduler-operator@sha256:71ba5a71c71074c282634a6261825c57977abd4999cc03957b8c407808a72902_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-descheduler@sha256:f7527c56780840d4062768e88f098229effd9796639ad67f6cdf841941a7e4a1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-docker-builder@sha256:25b131fc577def1179ce8a2022211d366fa461b6afef2f566b3f177930a3d0db_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-docker-registry@sha256:f7bd292dde7bd96195b313b4c459980fe8541bd89c442a4065a0114f42f3fe46_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-dns-proxy@sha256:2c00e51829c679d3573f813b0eced5c16382966ecf609915b47a8472872bbb64_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-http-proxy@sha256:77ffd3c6dbb51743a13ce6a9cbd385602c24165848c205aca864b88af5b3c503_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-router@sha256:c46ed6f837821decadaaf07266b9d67f89b98621618bc073abdc38db51bc692a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-elasticsearch-operator@sha256:6b153238aa96aa4128de68a8df8dde185ebb930d2cee6fe1c033ff7b713fb6f9_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-etcd@sha256:3df453713db7ea9a1bd8556a0a986fcd8d8c0a4649c262b9d8652ccfe648bb1e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-grafana@sha256:4304ba0edd79f4b2b7b6f4766dd696e8fb21423ff0dc50a18388e2163d9df3de_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-haproxy-router@sha256:e0c7adba792e43e96c8d6f4e0845e2d001d0f652ece6f567b09ac481b07eafdc_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-hyperkube@sha256:150fe3e51c75f09bd366d06a96749e17cd01aa845319032c327387950b52a34e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-hypershift@sha256:48392b80092bca63f2969b14412017601ebfda1b54141db53c2bc5b2317c389a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-installer-artifacts@sha256:7f3e05fa013dead5501513b86c19719973d0f9ee5dbdd4d3f5264fe601dbf809_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-installer@sha256:7f0fb099018d7fba695adfff2c6cec1af789e3c3ccab61bb084a30ae1bdff79f_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins-agent-base@sha256:c29122b0ed52c031f5f99ddb3338b6515bc05ac1e90864dda1131dcf9af87924_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins-agent-maven@sha256:ce5dd50d7005ed2d5ef36de673a2cf2cec07ad997ed93956605fe8fc8836d15c_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins@sha256:8da877d1df3fbb0fd4df607718847382d3ab38b862f868077c8938a1a7014f71_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-k8s-prometheus-adapter@sha256:95e7924437a3d110b334b1b03c01e2a65292f092110acde1a59db280ce8c7bda_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-keepalived-ipfailover@sha256:1c0b3bde2963560aa0c50bd8365abd39bc5cfae28409fbdc60abf786546eb2e8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-proxy@sha256:3afce3e28952226f1bb959b2859050e848ed5d4549ac5e2fc267f51b11fc6ec3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-rbac-proxy@sha256:dab4af2713fa59499ee8d2cb169d636ddb425590e6924bc2c03597c0b10bd246_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-state-metrics@sha256:4ff6cd48b319093041c2fa9c32ce16c6ea4dffb1c66ef4923f9cfc108cdfe6cc_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-libvirt-machine-controllers@sha256:2446ea720c26b213b9419bd2ad867c0ca1ec6df6d972cd5ffd6037b8fe0fbc88_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-curator5@sha256:91942a469532fda2a4609f2d7ddf693cca5b2ccd8c770d0e36823f0cc67d884c_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-elasticsearch5@sha256:c4693439c2f0f114238cc4034bfc6cd17f93bb9562ac2c0f9feb30f9c657fcd7_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-eventrouter@sha256:7668a706700163a35def516d1e1be336fef418ea477ef014ba90f5317569384b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-fluentd@sha256:3ef99bc79d891b111828c6c29faa8f3cd37d8ab8897186eff2bc85824939f632_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-machine-api-operator@sha256:6dfe7c13a6ae6c6e509f0d8cd0cb6e5284f9efd8cc2c949d87a471643e730957_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-machine-config-operator@sha256:ebffd73f3e4ff92792bad0cfa5bba5bec17e2124c7618ae7c4bd49ac777b7deb_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-admission-controller@sha256:101d1c2eeebf1c5e336238056ff9415de50855363eebce3b75cf6ac562adca05_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-cni@sha256:9be2123934d7f80af6439a84b5a9887459c1655549c7790fd080e965e89049b4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-must-gather@sha256:1acef66db6179f4289fc4abbb297df32c01d3b13fd85530ac6a0d925b517c3df_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-oauth-proxy@sha256:383360705efc0605760c3b2b1d0fa288094eb6dad8158c540d950f661b4ba880_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-openstack-machine-controllers@sha256:1779881159f1548a75e4dfd8a285e6ecab2ceede42acd9d07f036ec28bf1e6f9_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-lifecycle-manager@sha256:9254b8d3097a0d067f07bcf735b3530eccc888466f99a6282aebb7bbdd9cbcc8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-marketplace@sha256:3c5b9b86c9a9cd3c11290a44e29f016fe054b7068dd5b8469956909a63813db8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-registry@sha256:5eecc9d91c1ae4f0af586aa7d97fce8a32f23dfcdd64dcc61b9c536fbf4e8663_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-ovn-kubernetes@sha256:d4234553bb7e59323ee19b5d87d189f78fb4cd747551af6a6413b88001e27e13_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-pod@sha256:40b2f3ff0b5ff873669613882579b2a714aed77e1fea4e28a26ebf2726177707_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prom-label-proxy@sha256:c77261cc981cc8a5193ca1199c0a119db5757de135f4f7f5e558744371d2bd8a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-alertmanager@sha256:ef6c822baa9167856e613e7f1c14a1b44da42a394d91b9e0407d01d769a8fb40_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-config-reloader@sha256:6c0551dd87cc7eacc18ccbac093043b1178225f64843f13435f02ae7c2b4d91e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-node-exporter@sha256:56c31eb82f202b0ab38bc600ef01ef68302a0a57b7274c9537d3518855e2da1d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-operator@sha256:a5f9da1798e6b598157343e8751eda45ead551ddfb34ac5e742c6b1d8c8bf0d4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus@sha256:38e663d919d2c96af52656b42d18556cf457b84ef3160e27496f6db36ffa92a3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-service-ca-operator@sha256:ba2867ef0021af24b6667d114983400a0f7f5824842f1e11d1cda5aa91286737_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-cni@sha256:7a129a17d719761425ce26a47eaa115789be893f4a1054e37f3c76f891157886_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-dp-admission-controller@sha256:e98327978a09c28baa5f10365d2df1e2c33bb689644d581aa6f7ff095e0c1c5d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-network-device-plugin@sha256:4dc4017eee056448d0192834de329c6563c48f625f21ca9db59b22d54db70de8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-telemeter@sha256:5abb2f8cd1758441ba75e07e0a2f1180dbda0f13e6b51993d7c945b3d91b3bef_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-tests@sha256:28866a167dd7df474b053e92de3ba9bc0d95d918180b1e676637df30c2a27ef4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/postgres-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64", "7Server-RH7-RHOSE-4.1:openshift4/postgresql-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2594" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-4.1:openshift4/apb-base@sha256:183441575a8a0ba144fdd346e5ab560a067725a9b66d890493c326e14135512e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mariadb-apb@sha256:a446829513325ac146b2aa1b555347b57a2377712df6cd8a431c1dbec0614331_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mediawiki-apb@sha256:0a1ab047c6a93e3531f20673b275854361f36e2ebd4894b5ad1705c3dde42a76_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mediawiki@sha256:8014f0d73799f7f26b56a3d908b55de3103103f57a507d48fe9830c7d605f85d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mysql-apb@sha256:5772d2a584b96249c535df55b501ffe891162d7651b18244cdc16ab2f0d563dc_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-ansible-operator@sha256:9469e5ed49937aeb64f0a3dbb5332f087c8498494127a5c507c02c3d4286afb1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-aws-machine-controllers@sha256:e5f585aa452461ee95d55e84d81be54a82a458a54dbcad1f68a8f28edeb7638b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-azure-machine-controllers@sha256:9f3199e5226fdcd5abe34a6f2e3a6ad7e7ad3f59edbff2bfd9b4c84566897eae_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-baremetal-machine-controllers@sha256:d9ca5e81aa2fb401f9c5bfb63e85fc5d93ae1e657ab992e879a2b9d520f3fea3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cli-artifacts@sha256:bacaec21f6101ef686bb07b5d6e80b0b3ad06ab9a4d4f6e611ca3103c0030d7e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cli@sha256:bb846647aa233adddf5ed39056fdf98a7d9dc3abef4c985df3de698a44ecc7fd_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cloud-credential-operator@sha256:27c7bac07c2a2a38ddb65a9997b22946fbe37ddd06ecf52eccd0ef9235ae47ba_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-authentication-operator@sha256:67dc9d9d90e5b37c73eda524a13e0bd98834b225adbfccc9d6c09a35a130c8f4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-autoscaler-operator@sha256:989948cb9998b518f3c325a2af3b24cfb7033ad2ac8be96cb3fafce2b4077435_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-autoscaler@sha256:b995c30d43493a8d393282c760584605951048dbe395eeac6b6b1bec269ff3ad_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-bootstrap@sha256:9a676b7e363f022a511ab07ae81242b5c6d03523db11c37b0bf47e0f0324c9d8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-capacity@sha256:24db95a9d24960c14775136419eed7dfddb7b7d70577fab77a63b64fc66d53a7_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-config-operator@sha256:3b210b7313b4853f777d19248ba746b3d29251a3409124f984ae212809930427_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-dns-operator@sha256:5f70ba7ebcee1ecb9f65c8b43280935866607fc3dee6329ed473169f2acebe05_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-image-registry-operator@sha256:5c8fa5eb3828277f31ca0d4f7aedfee8e66dc0cfa3542772e6ac13c6b131644d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-ingress-operator@sha256:b33e32eaac7d15947e32cbeb9d45e9ae3e6fbe470611ab78f28cfc99d8759b68_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-apiserver-operator@sha256:af88e84a2957ba9eeb1e5e3cdf9cf559ccb0de08d7a16c58a19c8eb805ba5a39_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-controller-manager-operator@sha256:ca1e29c0c4eb029ed4d5544d5fde000000aa007f1d8e0fcf0fc0d317b5e06784_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-scheduler-operator@sha256:6f30eebebe4b774acd19eadeae80c4a7c8ccb503389c354bc76fc0f778cefe2b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-logging-operator@sha256:7926e2be0854ff3edac0ced6950a0be04ad26d46a5da638611457c3fe0f1a19a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-machine-approver@sha256:3535b9ccd701ac3fa6b6a8339f6c10d6e74dd4d8f5f810690fa7e272ee82f837_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-monitoring-operator@sha256:05d69056c09c34d095ccedc757ecf2692690c72d2bee4e6b6afc58b01ec55d9c_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-network-operator@sha256:2561079cceff11035c216fea71c0a10622696266aa5a9323ef13806c91537a68_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-node-tuning-operator@sha256:b6fa66947d674eb2fc12b38fb9355c43c57a484d85e56dd013960a760046b793_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-openshift-apiserver-operator@sha256:1291555580ce58d7855c7b93ace6826cd2b1a22499fc5df3aad7d36a30b880ee_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:3bdcfac3e9dcd30754f1e4158706bbcef77449fc3893521c86fd793cc1f7f32a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-samples-operator@sha256:79ba26ee177bc7cd2ab89ddaa6c66b5dcfc6970dc457cc737d64b18b5d378637_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-storage-operator@sha256:95ad59eb2e2cc58f7ae6b850f648259687f266f05ac91166a39da6bf441e3e86_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-update-keys@sha256:f919d82bd99ecd768271c8ef7ad6bf6d2b5cb902410b93bbafc829c58b59a48f_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-version-operator@sha256:2d99cc15d95e08541d60ebc1966b534fda48d00ee69c7c226996ac407a813d6b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-configmap-reloader@sha256:84bb7a8504eb34ff5e4e9ca92aab960c078ededed07ab0fe79620c0b9f32a51f_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-console-operator@sha256:665d6d89d83c51de08526c08365317b3dbb9f20e1528ffb35697f6c8bd409ca3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-console@sha256:68c4a7514623c31f7fdf7058a0dcd968dc4e4a63bcf0236ff21333bfb27cc4aa_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-coredns@sha256:9a330c9540816c13ddbbc93e99107f3d2a194c79eae20d81e8b8d252e9282c14_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-deployer@sha256:ab62d8277ea2e69cf6697343c4b6bfef67f04c5f31cdf47fc510cb76969ca2ca_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-descheduler-operator@sha256:71ba5a71c71074c282634a6261825c57977abd4999cc03957b8c407808a72902_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-descheduler@sha256:f7527c56780840d4062768e88f098229effd9796639ad67f6cdf841941a7e4a1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-docker-builder@sha256:25b131fc577def1179ce8a2022211d366fa461b6afef2f566b3f177930a3d0db_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-docker-registry@sha256:f7bd292dde7bd96195b313b4c459980fe8541bd89c442a4065a0114f42f3fe46_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-dns-proxy@sha256:2c00e51829c679d3573f813b0eced5c16382966ecf609915b47a8472872bbb64_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-http-proxy@sha256:77ffd3c6dbb51743a13ce6a9cbd385602c24165848c205aca864b88af5b3c503_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-router@sha256:c46ed6f837821decadaaf07266b9d67f89b98621618bc073abdc38db51bc692a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-elasticsearch-operator@sha256:6b153238aa96aa4128de68a8df8dde185ebb930d2cee6fe1c033ff7b713fb6f9_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-etcd@sha256:3df453713db7ea9a1bd8556a0a986fcd8d8c0a4649c262b9d8652ccfe648bb1e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-grafana@sha256:4304ba0edd79f4b2b7b6f4766dd696e8fb21423ff0dc50a18388e2163d9df3de_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-haproxy-router@sha256:e0c7adba792e43e96c8d6f4e0845e2d001d0f652ece6f567b09ac481b07eafdc_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-hyperkube@sha256:150fe3e51c75f09bd366d06a96749e17cd01aa845319032c327387950b52a34e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-hypershift@sha256:48392b80092bca63f2969b14412017601ebfda1b54141db53c2bc5b2317c389a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-installer-artifacts@sha256:7f3e05fa013dead5501513b86c19719973d0f9ee5dbdd4d3f5264fe601dbf809_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-installer@sha256:7f0fb099018d7fba695adfff2c6cec1af789e3c3ccab61bb084a30ae1bdff79f_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins-agent-base@sha256:c29122b0ed52c031f5f99ddb3338b6515bc05ac1e90864dda1131dcf9af87924_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins-agent-maven@sha256:ce5dd50d7005ed2d5ef36de673a2cf2cec07ad997ed93956605fe8fc8836d15c_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins@sha256:8da877d1df3fbb0fd4df607718847382d3ab38b862f868077c8938a1a7014f71_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-k8s-prometheus-adapter@sha256:95e7924437a3d110b334b1b03c01e2a65292f092110acde1a59db280ce8c7bda_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-keepalived-ipfailover@sha256:1c0b3bde2963560aa0c50bd8365abd39bc5cfae28409fbdc60abf786546eb2e8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-proxy@sha256:3afce3e28952226f1bb959b2859050e848ed5d4549ac5e2fc267f51b11fc6ec3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-rbac-proxy@sha256:dab4af2713fa59499ee8d2cb169d636ddb425590e6924bc2c03597c0b10bd246_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-state-metrics@sha256:4ff6cd48b319093041c2fa9c32ce16c6ea4dffb1c66ef4923f9cfc108cdfe6cc_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-libvirt-machine-controllers@sha256:2446ea720c26b213b9419bd2ad867c0ca1ec6df6d972cd5ffd6037b8fe0fbc88_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-curator5@sha256:91942a469532fda2a4609f2d7ddf693cca5b2ccd8c770d0e36823f0cc67d884c_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-elasticsearch5@sha256:c4693439c2f0f114238cc4034bfc6cd17f93bb9562ac2c0f9feb30f9c657fcd7_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-eventrouter@sha256:7668a706700163a35def516d1e1be336fef418ea477ef014ba90f5317569384b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-fluentd@sha256:3ef99bc79d891b111828c6c29faa8f3cd37d8ab8897186eff2bc85824939f632_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-machine-api-operator@sha256:6dfe7c13a6ae6c6e509f0d8cd0cb6e5284f9efd8cc2c949d87a471643e730957_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-machine-config-operator@sha256:ebffd73f3e4ff92792bad0cfa5bba5bec17e2124c7618ae7c4bd49ac777b7deb_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-admission-controller@sha256:101d1c2eeebf1c5e336238056ff9415de50855363eebce3b75cf6ac562adca05_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-cni@sha256:9be2123934d7f80af6439a84b5a9887459c1655549c7790fd080e965e89049b4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-must-gather@sha256:1acef66db6179f4289fc4abbb297df32c01d3b13fd85530ac6a0d925b517c3df_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-oauth-proxy@sha256:383360705efc0605760c3b2b1d0fa288094eb6dad8158c540d950f661b4ba880_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-openstack-machine-controllers@sha256:1779881159f1548a75e4dfd8a285e6ecab2ceede42acd9d07f036ec28bf1e6f9_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-lifecycle-manager@sha256:9254b8d3097a0d067f07bcf735b3530eccc888466f99a6282aebb7bbdd9cbcc8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-marketplace@sha256:3c5b9b86c9a9cd3c11290a44e29f016fe054b7068dd5b8469956909a63813db8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-registry@sha256:5eecc9d91c1ae4f0af586aa7d97fce8a32f23dfcdd64dcc61b9c536fbf4e8663_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-ovn-kubernetes@sha256:d4234553bb7e59323ee19b5d87d189f78fb4cd747551af6a6413b88001e27e13_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-pod@sha256:40b2f3ff0b5ff873669613882579b2a714aed77e1fea4e28a26ebf2726177707_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prom-label-proxy@sha256:c77261cc981cc8a5193ca1199c0a119db5757de135f4f7f5e558744371d2bd8a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-alertmanager@sha256:ef6c822baa9167856e613e7f1c14a1b44da42a394d91b9e0407d01d769a8fb40_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-config-reloader@sha256:6c0551dd87cc7eacc18ccbac093043b1178225f64843f13435f02ae7c2b4d91e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-node-exporter@sha256:56c31eb82f202b0ab38bc600ef01ef68302a0a57b7274c9537d3518855e2da1d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-operator@sha256:a5f9da1798e6b598157343e8751eda45ead551ddfb34ac5e742c6b1d8c8bf0d4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus@sha256:38e663d919d2c96af52656b42d18556cf457b84ef3160e27496f6db36ffa92a3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-service-ca-operator@sha256:ba2867ef0021af24b6667d114983400a0f7f5824842f1e11d1cda5aa91286737_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-cni@sha256:7a129a17d719761425ce26a47eaa115789be893f4a1054e37f3c76f891157886_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-dp-admission-controller@sha256:e98327978a09c28baa5f10365d2df1e2c33bb689644d581aa6f7ff095e0c1c5d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-network-device-plugin@sha256:4dc4017eee056448d0192834de329c6563c48f625f21ca9db59b22d54db70de8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-telemeter@sha256:5abb2f8cd1758441ba75e07e0a2f1180dbda0f13e6b51993d7c945b3d91b3bef_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-tests@sha256:28866a167dd7df474b053e92de3ba9bc0d95d918180b1e676637df30c2a27ef4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/postgres-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64", "7Server-RH7-RHOSE-4.1:openshift4/postgresql-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.1:openshift4/apb-base@sha256:183441575a8a0ba144fdd346e5ab560a067725a9b66d890493c326e14135512e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mariadb-apb@sha256:a446829513325ac146b2aa1b555347b57a2377712df6cd8a431c1dbec0614331_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mediawiki-apb@sha256:0a1ab047c6a93e3531f20673b275854361f36e2ebd4894b5ad1705c3dde42a76_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mediawiki@sha256:8014f0d73799f7f26b56a3d908b55de3103103f57a507d48fe9830c7d605f85d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mysql-apb@sha256:5772d2a584b96249c535df55b501ffe891162d7651b18244cdc16ab2f0d563dc_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-ansible-operator@sha256:9469e5ed49937aeb64f0a3dbb5332f087c8498494127a5c507c02c3d4286afb1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-aws-machine-controllers@sha256:e5f585aa452461ee95d55e84d81be54a82a458a54dbcad1f68a8f28edeb7638b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-azure-machine-controllers@sha256:9f3199e5226fdcd5abe34a6f2e3a6ad7e7ad3f59edbff2bfd9b4c84566897eae_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-baremetal-machine-controllers@sha256:d9ca5e81aa2fb401f9c5bfb63e85fc5d93ae1e657ab992e879a2b9d520f3fea3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cli-artifacts@sha256:bacaec21f6101ef686bb07b5d6e80b0b3ad06ab9a4d4f6e611ca3103c0030d7e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cli@sha256:bb846647aa233adddf5ed39056fdf98a7d9dc3abef4c985df3de698a44ecc7fd_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cloud-credential-operator@sha256:27c7bac07c2a2a38ddb65a9997b22946fbe37ddd06ecf52eccd0ef9235ae47ba_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-authentication-operator@sha256:67dc9d9d90e5b37c73eda524a13e0bd98834b225adbfccc9d6c09a35a130c8f4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-autoscaler-operator@sha256:989948cb9998b518f3c325a2af3b24cfb7033ad2ac8be96cb3fafce2b4077435_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-autoscaler@sha256:b995c30d43493a8d393282c760584605951048dbe395eeac6b6b1bec269ff3ad_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-bootstrap@sha256:9a676b7e363f022a511ab07ae81242b5c6d03523db11c37b0bf47e0f0324c9d8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-capacity@sha256:24db95a9d24960c14775136419eed7dfddb7b7d70577fab77a63b64fc66d53a7_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-config-operator@sha256:3b210b7313b4853f777d19248ba746b3d29251a3409124f984ae212809930427_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-dns-operator@sha256:5f70ba7ebcee1ecb9f65c8b43280935866607fc3dee6329ed473169f2acebe05_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-image-registry-operator@sha256:5c8fa5eb3828277f31ca0d4f7aedfee8e66dc0cfa3542772e6ac13c6b131644d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-ingress-operator@sha256:b33e32eaac7d15947e32cbeb9d45e9ae3e6fbe470611ab78f28cfc99d8759b68_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-apiserver-operator@sha256:af88e84a2957ba9eeb1e5e3cdf9cf559ccb0de08d7a16c58a19c8eb805ba5a39_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-controller-manager-operator@sha256:ca1e29c0c4eb029ed4d5544d5fde000000aa007f1d8e0fcf0fc0d317b5e06784_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-scheduler-operator@sha256:6f30eebebe4b774acd19eadeae80c4a7c8ccb503389c354bc76fc0f778cefe2b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-logging-operator@sha256:7926e2be0854ff3edac0ced6950a0be04ad26d46a5da638611457c3fe0f1a19a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-machine-approver@sha256:3535b9ccd701ac3fa6b6a8339f6c10d6e74dd4d8f5f810690fa7e272ee82f837_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-monitoring-operator@sha256:05d69056c09c34d095ccedc757ecf2692690c72d2bee4e6b6afc58b01ec55d9c_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-network-operator@sha256:2561079cceff11035c216fea71c0a10622696266aa5a9323ef13806c91537a68_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-node-tuning-operator@sha256:b6fa66947d674eb2fc12b38fb9355c43c57a484d85e56dd013960a760046b793_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-openshift-apiserver-operator@sha256:1291555580ce58d7855c7b93ace6826cd2b1a22499fc5df3aad7d36a30b880ee_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:3bdcfac3e9dcd30754f1e4158706bbcef77449fc3893521c86fd793cc1f7f32a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-samples-operator@sha256:79ba26ee177bc7cd2ab89ddaa6c66b5dcfc6970dc457cc737d64b18b5d378637_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-storage-operator@sha256:95ad59eb2e2cc58f7ae6b850f648259687f266f05ac91166a39da6bf441e3e86_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-update-keys@sha256:f919d82bd99ecd768271c8ef7ad6bf6d2b5cb902410b93bbafc829c58b59a48f_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-version-operator@sha256:2d99cc15d95e08541d60ebc1966b534fda48d00ee69c7c226996ac407a813d6b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-configmap-reloader@sha256:84bb7a8504eb34ff5e4e9ca92aab960c078ededed07ab0fe79620c0b9f32a51f_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-console-operator@sha256:665d6d89d83c51de08526c08365317b3dbb9f20e1528ffb35697f6c8bd409ca3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-console@sha256:68c4a7514623c31f7fdf7058a0dcd968dc4e4a63bcf0236ff21333bfb27cc4aa_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-coredns@sha256:9a330c9540816c13ddbbc93e99107f3d2a194c79eae20d81e8b8d252e9282c14_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-deployer@sha256:ab62d8277ea2e69cf6697343c4b6bfef67f04c5f31cdf47fc510cb76969ca2ca_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-descheduler-operator@sha256:71ba5a71c71074c282634a6261825c57977abd4999cc03957b8c407808a72902_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-descheduler@sha256:f7527c56780840d4062768e88f098229effd9796639ad67f6cdf841941a7e4a1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-docker-builder@sha256:25b131fc577def1179ce8a2022211d366fa461b6afef2f566b3f177930a3d0db_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-docker-registry@sha256:f7bd292dde7bd96195b313b4c459980fe8541bd89c442a4065a0114f42f3fe46_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-dns-proxy@sha256:2c00e51829c679d3573f813b0eced5c16382966ecf609915b47a8472872bbb64_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-http-proxy@sha256:77ffd3c6dbb51743a13ce6a9cbd385602c24165848c205aca864b88af5b3c503_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-router@sha256:c46ed6f837821decadaaf07266b9d67f89b98621618bc073abdc38db51bc692a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-elasticsearch-operator@sha256:6b153238aa96aa4128de68a8df8dde185ebb930d2cee6fe1c033ff7b713fb6f9_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-etcd@sha256:3df453713db7ea9a1bd8556a0a986fcd8d8c0a4649c262b9d8652ccfe648bb1e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-grafana@sha256:4304ba0edd79f4b2b7b6f4766dd696e8fb21423ff0dc50a18388e2163d9df3de_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-haproxy-router@sha256:e0c7adba792e43e96c8d6f4e0845e2d001d0f652ece6f567b09ac481b07eafdc_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-hyperkube@sha256:150fe3e51c75f09bd366d06a96749e17cd01aa845319032c327387950b52a34e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-hypershift@sha256:48392b80092bca63f2969b14412017601ebfda1b54141db53c2bc5b2317c389a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-installer-artifacts@sha256:7f3e05fa013dead5501513b86c19719973d0f9ee5dbdd4d3f5264fe601dbf809_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-installer@sha256:7f0fb099018d7fba695adfff2c6cec1af789e3c3ccab61bb084a30ae1bdff79f_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins-agent-base@sha256:c29122b0ed52c031f5f99ddb3338b6515bc05ac1e90864dda1131dcf9af87924_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins-agent-maven@sha256:ce5dd50d7005ed2d5ef36de673a2cf2cec07ad997ed93956605fe8fc8836d15c_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins@sha256:8da877d1df3fbb0fd4df607718847382d3ab38b862f868077c8938a1a7014f71_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-k8s-prometheus-adapter@sha256:95e7924437a3d110b334b1b03c01e2a65292f092110acde1a59db280ce8c7bda_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-keepalived-ipfailover@sha256:1c0b3bde2963560aa0c50bd8365abd39bc5cfae28409fbdc60abf786546eb2e8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-proxy@sha256:3afce3e28952226f1bb959b2859050e848ed5d4549ac5e2fc267f51b11fc6ec3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-rbac-proxy@sha256:dab4af2713fa59499ee8d2cb169d636ddb425590e6924bc2c03597c0b10bd246_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-state-metrics@sha256:4ff6cd48b319093041c2fa9c32ce16c6ea4dffb1c66ef4923f9cfc108cdfe6cc_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-libvirt-machine-controllers@sha256:2446ea720c26b213b9419bd2ad867c0ca1ec6df6d972cd5ffd6037b8fe0fbc88_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-curator5@sha256:91942a469532fda2a4609f2d7ddf693cca5b2ccd8c770d0e36823f0cc67d884c_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-elasticsearch5@sha256:c4693439c2f0f114238cc4034bfc6cd17f93bb9562ac2c0f9feb30f9c657fcd7_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-eventrouter@sha256:7668a706700163a35def516d1e1be336fef418ea477ef014ba90f5317569384b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-fluentd@sha256:3ef99bc79d891b111828c6c29faa8f3cd37d8ab8897186eff2bc85824939f632_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-machine-api-operator@sha256:6dfe7c13a6ae6c6e509f0d8cd0cb6e5284f9efd8cc2c949d87a471643e730957_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-machine-config-operator@sha256:ebffd73f3e4ff92792bad0cfa5bba5bec17e2124c7618ae7c4bd49ac777b7deb_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-admission-controller@sha256:101d1c2eeebf1c5e336238056ff9415de50855363eebce3b75cf6ac562adca05_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-cni@sha256:9be2123934d7f80af6439a84b5a9887459c1655549c7790fd080e965e89049b4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-must-gather@sha256:1acef66db6179f4289fc4abbb297df32c01d3b13fd85530ac6a0d925b517c3df_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-oauth-proxy@sha256:383360705efc0605760c3b2b1d0fa288094eb6dad8158c540d950f661b4ba880_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-openstack-machine-controllers@sha256:1779881159f1548a75e4dfd8a285e6ecab2ceede42acd9d07f036ec28bf1e6f9_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-lifecycle-manager@sha256:9254b8d3097a0d067f07bcf735b3530eccc888466f99a6282aebb7bbdd9cbcc8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-marketplace@sha256:3c5b9b86c9a9cd3c11290a44e29f016fe054b7068dd5b8469956909a63813db8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-registry@sha256:5eecc9d91c1ae4f0af586aa7d97fce8a32f23dfcdd64dcc61b9c536fbf4e8663_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-ovn-kubernetes@sha256:d4234553bb7e59323ee19b5d87d189f78fb4cd747551af6a6413b88001e27e13_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-pod@sha256:40b2f3ff0b5ff873669613882579b2a714aed77e1fea4e28a26ebf2726177707_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prom-label-proxy@sha256:c77261cc981cc8a5193ca1199c0a119db5757de135f4f7f5e558744371d2bd8a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-alertmanager@sha256:ef6c822baa9167856e613e7f1c14a1b44da42a394d91b9e0407d01d769a8fb40_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-config-reloader@sha256:6c0551dd87cc7eacc18ccbac093043b1178225f64843f13435f02ae7c2b4d91e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-node-exporter@sha256:56c31eb82f202b0ab38bc600ef01ef68302a0a57b7274c9537d3518855e2da1d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-operator@sha256:a5f9da1798e6b598157343e8751eda45ead551ddfb34ac5e742c6b1d8c8bf0d4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus@sha256:38e663d919d2c96af52656b42d18556cf457b84ef3160e27496f6db36ffa92a3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-service-ca-operator@sha256:ba2867ef0021af24b6667d114983400a0f7f5824842f1e11d1cda5aa91286737_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-cni@sha256:7a129a17d719761425ce26a47eaa115789be893f4a1054e37f3c76f891157886_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-dp-admission-controller@sha256:e98327978a09c28baa5f10365d2df1e2c33bb689644d581aa6f7ff095e0c1c5d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-network-device-plugin@sha256:4dc4017eee056448d0192834de329c6563c48f625f21ca9db59b22d54db70de8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-telemeter@sha256:5abb2f8cd1758441ba75e07e0a2f1180dbda0f13e6b51993d7c945b3d91b3bef_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-tests@sha256:28866a167dd7df474b053e92de3ba9bc0d95d918180b1e676637df30c2a27ef4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/postgres-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64", "7Server-RH7-RHOSE-4.1:openshift4/postgresql-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-10T15:58:57+00:00", "details": "For OpenShift Container Platform 4.1 see the following documentation, which\nwill be updated shortly for release 4.1.14, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.1/updating/updating-cluster-cli.html.", "product_ids": [ "7Server-RH7-RHOSE-4.1:openshift4/apb-base@sha256:183441575a8a0ba144fdd346e5ab560a067725a9b66d890493c326e14135512e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mariadb-apb@sha256:a446829513325ac146b2aa1b555347b57a2377712df6cd8a431c1dbec0614331_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mediawiki-apb@sha256:0a1ab047c6a93e3531f20673b275854361f36e2ebd4894b5ad1705c3dde42a76_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mediawiki@sha256:8014f0d73799f7f26b56a3d908b55de3103103f57a507d48fe9830c7d605f85d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mysql-apb@sha256:5772d2a584b96249c535df55b501ffe891162d7651b18244cdc16ab2f0d563dc_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-ansible-operator@sha256:9469e5ed49937aeb64f0a3dbb5332f087c8498494127a5c507c02c3d4286afb1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-aws-machine-controllers@sha256:e5f585aa452461ee95d55e84d81be54a82a458a54dbcad1f68a8f28edeb7638b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-azure-machine-controllers@sha256:9f3199e5226fdcd5abe34a6f2e3a6ad7e7ad3f59edbff2bfd9b4c84566897eae_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-baremetal-machine-controllers@sha256:d9ca5e81aa2fb401f9c5bfb63e85fc5d93ae1e657ab992e879a2b9d520f3fea3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cli-artifacts@sha256:bacaec21f6101ef686bb07b5d6e80b0b3ad06ab9a4d4f6e611ca3103c0030d7e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cli@sha256:bb846647aa233adddf5ed39056fdf98a7d9dc3abef4c985df3de698a44ecc7fd_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cloud-credential-operator@sha256:27c7bac07c2a2a38ddb65a9997b22946fbe37ddd06ecf52eccd0ef9235ae47ba_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-authentication-operator@sha256:67dc9d9d90e5b37c73eda524a13e0bd98834b225adbfccc9d6c09a35a130c8f4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-autoscaler-operator@sha256:989948cb9998b518f3c325a2af3b24cfb7033ad2ac8be96cb3fafce2b4077435_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-autoscaler@sha256:b995c30d43493a8d393282c760584605951048dbe395eeac6b6b1bec269ff3ad_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-bootstrap@sha256:9a676b7e363f022a511ab07ae81242b5c6d03523db11c37b0bf47e0f0324c9d8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-capacity@sha256:24db95a9d24960c14775136419eed7dfddb7b7d70577fab77a63b64fc66d53a7_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-config-operator@sha256:3b210b7313b4853f777d19248ba746b3d29251a3409124f984ae212809930427_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-dns-operator@sha256:5f70ba7ebcee1ecb9f65c8b43280935866607fc3dee6329ed473169f2acebe05_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-image-registry-operator@sha256:5c8fa5eb3828277f31ca0d4f7aedfee8e66dc0cfa3542772e6ac13c6b131644d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-ingress-operator@sha256:b33e32eaac7d15947e32cbeb9d45e9ae3e6fbe470611ab78f28cfc99d8759b68_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-apiserver-operator@sha256:af88e84a2957ba9eeb1e5e3cdf9cf559ccb0de08d7a16c58a19c8eb805ba5a39_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-controller-manager-operator@sha256:ca1e29c0c4eb029ed4d5544d5fde000000aa007f1d8e0fcf0fc0d317b5e06784_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-scheduler-operator@sha256:6f30eebebe4b774acd19eadeae80c4a7c8ccb503389c354bc76fc0f778cefe2b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-logging-operator@sha256:7926e2be0854ff3edac0ced6950a0be04ad26d46a5da638611457c3fe0f1a19a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-machine-approver@sha256:3535b9ccd701ac3fa6b6a8339f6c10d6e74dd4d8f5f810690fa7e272ee82f837_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-monitoring-operator@sha256:05d69056c09c34d095ccedc757ecf2692690c72d2bee4e6b6afc58b01ec55d9c_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-network-operator@sha256:2561079cceff11035c216fea71c0a10622696266aa5a9323ef13806c91537a68_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-node-tuning-operator@sha256:b6fa66947d674eb2fc12b38fb9355c43c57a484d85e56dd013960a760046b793_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-openshift-apiserver-operator@sha256:1291555580ce58d7855c7b93ace6826cd2b1a22499fc5df3aad7d36a30b880ee_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:3bdcfac3e9dcd30754f1e4158706bbcef77449fc3893521c86fd793cc1f7f32a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-samples-operator@sha256:79ba26ee177bc7cd2ab89ddaa6c66b5dcfc6970dc457cc737d64b18b5d378637_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-storage-operator@sha256:95ad59eb2e2cc58f7ae6b850f648259687f266f05ac91166a39da6bf441e3e86_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-update-keys@sha256:f919d82bd99ecd768271c8ef7ad6bf6d2b5cb902410b93bbafc829c58b59a48f_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-version-operator@sha256:2d99cc15d95e08541d60ebc1966b534fda48d00ee69c7c226996ac407a813d6b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-configmap-reloader@sha256:84bb7a8504eb34ff5e4e9ca92aab960c078ededed07ab0fe79620c0b9f32a51f_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-console-operator@sha256:665d6d89d83c51de08526c08365317b3dbb9f20e1528ffb35697f6c8bd409ca3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-console@sha256:68c4a7514623c31f7fdf7058a0dcd968dc4e4a63bcf0236ff21333bfb27cc4aa_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-coredns@sha256:9a330c9540816c13ddbbc93e99107f3d2a194c79eae20d81e8b8d252e9282c14_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-deployer@sha256:ab62d8277ea2e69cf6697343c4b6bfef67f04c5f31cdf47fc510cb76969ca2ca_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-descheduler-operator@sha256:71ba5a71c71074c282634a6261825c57977abd4999cc03957b8c407808a72902_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-descheduler@sha256:f7527c56780840d4062768e88f098229effd9796639ad67f6cdf841941a7e4a1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-docker-builder@sha256:25b131fc577def1179ce8a2022211d366fa461b6afef2f566b3f177930a3d0db_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-docker-registry@sha256:f7bd292dde7bd96195b313b4c459980fe8541bd89c442a4065a0114f42f3fe46_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-dns-proxy@sha256:2c00e51829c679d3573f813b0eced5c16382966ecf609915b47a8472872bbb64_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-http-proxy@sha256:77ffd3c6dbb51743a13ce6a9cbd385602c24165848c205aca864b88af5b3c503_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-router@sha256:c46ed6f837821decadaaf07266b9d67f89b98621618bc073abdc38db51bc692a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-elasticsearch-operator@sha256:6b153238aa96aa4128de68a8df8dde185ebb930d2cee6fe1c033ff7b713fb6f9_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-etcd@sha256:3df453713db7ea9a1bd8556a0a986fcd8d8c0a4649c262b9d8652ccfe648bb1e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-grafana@sha256:4304ba0edd79f4b2b7b6f4766dd696e8fb21423ff0dc50a18388e2163d9df3de_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-haproxy-router@sha256:e0c7adba792e43e96c8d6f4e0845e2d001d0f652ece6f567b09ac481b07eafdc_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-hyperkube@sha256:150fe3e51c75f09bd366d06a96749e17cd01aa845319032c327387950b52a34e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-hypershift@sha256:48392b80092bca63f2969b14412017601ebfda1b54141db53c2bc5b2317c389a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-installer-artifacts@sha256:7f3e05fa013dead5501513b86c19719973d0f9ee5dbdd4d3f5264fe601dbf809_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-installer@sha256:7f0fb099018d7fba695adfff2c6cec1af789e3c3ccab61bb084a30ae1bdff79f_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins-agent-base@sha256:c29122b0ed52c031f5f99ddb3338b6515bc05ac1e90864dda1131dcf9af87924_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins-agent-maven@sha256:ce5dd50d7005ed2d5ef36de673a2cf2cec07ad997ed93956605fe8fc8836d15c_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins@sha256:8da877d1df3fbb0fd4df607718847382d3ab38b862f868077c8938a1a7014f71_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-k8s-prometheus-adapter@sha256:95e7924437a3d110b334b1b03c01e2a65292f092110acde1a59db280ce8c7bda_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-keepalived-ipfailover@sha256:1c0b3bde2963560aa0c50bd8365abd39bc5cfae28409fbdc60abf786546eb2e8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-proxy@sha256:3afce3e28952226f1bb959b2859050e848ed5d4549ac5e2fc267f51b11fc6ec3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-rbac-proxy@sha256:dab4af2713fa59499ee8d2cb169d636ddb425590e6924bc2c03597c0b10bd246_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-state-metrics@sha256:4ff6cd48b319093041c2fa9c32ce16c6ea4dffb1c66ef4923f9cfc108cdfe6cc_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-libvirt-machine-controllers@sha256:2446ea720c26b213b9419bd2ad867c0ca1ec6df6d972cd5ffd6037b8fe0fbc88_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-curator5@sha256:91942a469532fda2a4609f2d7ddf693cca5b2ccd8c770d0e36823f0cc67d884c_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-elasticsearch5@sha256:c4693439c2f0f114238cc4034bfc6cd17f93bb9562ac2c0f9feb30f9c657fcd7_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-eventrouter@sha256:7668a706700163a35def516d1e1be336fef418ea477ef014ba90f5317569384b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-fluentd@sha256:3ef99bc79d891b111828c6c29faa8f3cd37d8ab8897186eff2bc85824939f632_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-machine-api-operator@sha256:6dfe7c13a6ae6c6e509f0d8cd0cb6e5284f9efd8cc2c949d87a471643e730957_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-machine-config-operator@sha256:ebffd73f3e4ff92792bad0cfa5bba5bec17e2124c7618ae7c4bd49ac777b7deb_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-admission-controller@sha256:101d1c2eeebf1c5e336238056ff9415de50855363eebce3b75cf6ac562adca05_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-cni@sha256:9be2123934d7f80af6439a84b5a9887459c1655549c7790fd080e965e89049b4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-must-gather@sha256:1acef66db6179f4289fc4abbb297df32c01d3b13fd85530ac6a0d925b517c3df_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-oauth-proxy@sha256:383360705efc0605760c3b2b1d0fa288094eb6dad8158c540d950f661b4ba880_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-openstack-machine-controllers@sha256:1779881159f1548a75e4dfd8a285e6ecab2ceede42acd9d07f036ec28bf1e6f9_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-lifecycle-manager@sha256:9254b8d3097a0d067f07bcf735b3530eccc888466f99a6282aebb7bbdd9cbcc8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-marketplace@sha256:3c5b9b86c9a9cd3c11290a44e29f016fe054b7068dd5b8469956909a63813db8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-registry@sha256:5eecc9d91c1ae4f0af586aa7d97fce8a32f23dfcdd64dcc61b9c536fbf4e8663_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-ovn-kubernetes@sha256:d4234553bb7e59323ee19b5d87d189f78fb4cd747551af6a6413b88001e27e13_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-pod@sha256:40b2f3ff0b5ff873669613882579b2a714aed77e1fea4e28a26ebf2726177707_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prom-label-proxy@sha256:c77261cc981cc8a5193ca1199c0a119db5757de135f4f7f5e558744371d2bd8a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-alertmanager@sha256:ef6c822baa9167856e613e7f1c14a1b44da42a394d91b9e0407d01d769a8fb40_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-config-reloader@sha256:6c0551dd87cc7eacc18ccbac093043b1178225f64843f13435f02ae7c2b4d91e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-node-exporter@sha256:56c31eb82f202b0ab38bc600ef01ef68302a0a57b7274c9537d3518855e2da1d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-operator@sha256:a5f9da1798e6b598157343e8751eda45ead551ddfb34ac5e742c6b1d8c8bf0d4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus@sha256:38e663d919d2c96af52656b42d18556cf457b84ef3160e27496f6db36ffa92a3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-service-ca-operator@sha256:ba2867ef0021af24b6667d114983400a0f7f5824842f1e11d1cda5aa91286737_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-cni@sha256:7a129a17d719761425ce26a47eaa115789be893f4a1054e37f3c76f891157886_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-dp-admission-controller@sha256:e98327978a09c28baa5f10365d2df1e2c33bb689644d581aa6f7ff095e0c1c5d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-network-device-plugin@sha256:4dc4017eee056448d0192834de329c6563c48f625f21ca9db59b22d54db70de8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-telemeter@sha256:5abb2f8cd1758441ba75e07e0a2f1180dbda0f13e6b51993d7c945b3d91b3bef_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-tests@sha256:28866a167dd7df474b053e92de3ba9bc0d95d918180b1e676637df30c2a27ef4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/postgres-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64", "7Server-RH7-RHOSE-4.1:openshift4/postgresql-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2594" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-4.1:openshift4/apb-base@sha256:183441575a8a0ba144fdd346e5ab560a067725a9b66d890493c326e14135512e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mariadb-apb@sha256:a446829513325ac146b2aa1b555347b57a2377712df6cd8a431c1dbec0614331_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mediawiki-apb@sha256:0a1ab047c6a93e3531f20673b275854361f36e2ebd4894b5ad1705c3dde42a76_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mediawiki@sha256:8014f0d73799f7f26b56a3d908b55de3103103f57a507d48fe9830c7d605f85d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mysql-apb@sha256:5772d2a584b96249c535df55b501ffe891162d7651b18244cdc16ab2f0d563dc_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-ansible-operator@sha256:9469e5ed49937aeb64f0a3dbb5332f087c8498494127a5c507c02c3d4286afb1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-aws-machine-controllers@sha256:e5f585aa452461ee95d55e84d81be54a82a458a54dbcad1f68a8f28edeb7638b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-azure-machine-controllers@sha256:9f3199e5226fdcd5abe34a6f2e3a6ad7e7ad3f59edbff2bfd9b4c84566897eae_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-baremetal-machine-controllers@sha256:d9ca5e81aa2fb401f9c5bfb63e85fc5d93ae1e657ab992e879a2b9d520f3fea3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cli-artifacts@sha256:bacaec21f6101ef686bb07b5d6e80b0b3ad06ab9a4d4f6e611ca3103c0030d7e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cli@sha256:bb846647aa233adddf5ed39056fdf98a7d9dc3abef4c985df3de698a44ecc7fd_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cloud-credential-operator@sha256:27c7bac07c2a2a38ddb65a9997b22946fbe37ddd06ecf52eccd0ef9235ae47ba_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-authentication-operator@sha256:67dc9d9d90e5b37c73eda524a13e0bd98834b225adbfccc9d6c09a35a130c8f4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-autoscaler-operator@sha256:989948cb9998b518f3c325a2af3b24cfb7033ad2ac8be96cb3fafce2b4077435_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-autoscaler@sha256:b995c30d43493a8d393282c760584605951048dbe395eeac6b6b1bec269ff3ad_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-bootstrap@sha256:9a676b7e363f022a511ab07ae81242b5c6d03523db11c37b0bf47e0f0324c9d8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-capacity@sha256:24db95a9d24960c14775136419eed7dfddb7b7d70577fab77a63b64fc66d53a7_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-config-operator@sha256:3b210b7313b4853f777d19248ba746b3d29251a3409124f984ae212809930427_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-dns-operator@sha256:5f70ba7ebcee1ecb9f65c8b43280935866607fc3dee6329ed473169f2acebe05_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-image-registry-operator@sha256:5c8fa5eb3828277f31ca0d4f7aedfee8e66dc0cfa3542772e6ac13c6b131644d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-ingress-operator@sha256:b33e32eaac7d15947e32cbeb9d45e9ae3e6fbe470611ab78f28cfc99d8759b68_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-apiserver-operator@sha256:af88e84a2957ba9eeb1e5e3cdf9cf559ccb0de08d7a16c58a19c8eb805ba5a39_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-controller-manager-operator@sha256:ca1e29c0c4eb029ed4d5544d5fde000000aa007f1d8e0fcf0fc0d317b5e06784_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-scheduler-operator@sha256:6f30eebebe4b774acd19eadeae80c4a7c8ccb503389c354bc76fc0f778cefe2b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-logging-operator@sha256:7926e2be0854ff3edac0ced6950a0be04ad26d46a5da638611457c3fe0f1a19a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-machine-approver@sha256:3535b9ccd701ac3fa6b6a8339f6c10d6e74dd4d8f5f810690fa7e272ee82f837_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-monitoring-operator@sha256:05d69056c09c34d095ccedc757ecf2692690c72d2bee4e6b6afc58b01ec55d9c_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-network-operator@sha256:2561079cceff11035c216fea71c0a10622696266aa5a9323ef13806c91537a68_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-node-tuning-operator@sha256:b6fa66947d674eb2fc12b38fb9355c43c57a484d85e56dd013960a760046b793_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-openshift-apiserver-operator@sha256:1291555580ce58d7855c7b93ace6826cd2b1a22499fc5df3aad7d36a30b880ee_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:3bdcfac3e9dcd30754f1e4158706bbcef77449fc3893521c86fd793cc1f7f32a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-samples-operator@sha256:79ba26ee177bc7cd2ab89ddaa6c66b5dcfc6970dc457cc737d64b18b5d378637_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-storage-operator@sha256:95ad59eb2e2cc58f7ae6b850f648259687f266f05ac91166a39da6bf441e3e86_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-update-keys@sha256:f919d82bd99ecd768271c8ef7ad6bf6d2b5cb902410b93bbafc829c58b59a48f_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-version-operator@sha256:2d99cc15d95e08541d60ebc1966b534fda48d00ee69c7c226996ac407a813d6b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-configmap-reloader@sha256:84bb7a8504eb34ff5e4e9ca92aab960c078ededed07ab0fe79620c0b9f32a51f_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-console-operator@sha256:665d6d89d83c51de08526c08365317b3dbb9f20e1528ffb35697f6c8bd409ca3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-console@sha256:68c4a7514623c31f7fdf7058a0dcd968dc4e4a63bcf0236ff21333bfb27cc4aa_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-coredns@sha256:9a330c9540816c13ddbbc93e99107f3d2a194c79eae20d81e8b8d252e9282c14_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-deployer@sha256:ab62d8277ea2e69cf6697343c4b6bfef67f04c5f31cdf47fc510cb76969ca2ca_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-descheduler-operator@sha256:71ba5a71c71074c282634a6261825c57977abd4999cc03957b8c407808a72902_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-descheduler@sha256:f7527c56780840d4062768e88f098229effd9796639ad67f6cdf841941a7e4a1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-docker-builder@sha256:25b131fc577def1179ce8a2022211d366fa461b6afef2f566b3f177930a3d0db_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-docker-registry@sha256:f7bd292dde7bd96195b313b4c459980fe8541bd89c442a4065a0114f42f3fe46_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-dns-proxy@sha256:2c00e51829c679d3573f813b0eced5c16382966ecf609915b47a8472872bbb64_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-http-proxy@sha256:77ffd3c6dbb51743a13ce6a9cbd385602c24165848c205aca864b88af5b3c503_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-router@sha256:c46ed6f837821decadaaf07266b9d67f89b98621618bc073abdc38db51bc692a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-elasticsearch-operator@sha256:6b153238aa96aa4128de68a8df8dde185ebb930d2cee6fe1c033ff7b713fb6f9_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-etcd@sha256:3df453713db7ea9a1bd8556a0a986fcd8d8c0a4649c262b9d8652ccfe648bb1e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-grafana@sha256:4304ba0edd79f4b2b7b6f4766dd696e8fb21423ff0dc50a18388e2163d9df3de_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-haproxy-router@sha256:e0c7adba792e43e96c8d6f4e0845e2d001d0f652ece6f567b09ac481b07eafdc_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-hyperkube@sha256:150fe3e51c75f09bd366d06a96749e17cd01aa845319032c327387950b52a34e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-hypershift@sha256:48392b80092bca63f2969b14412017601ebfda1b54141db53c2bc5b2317c389a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-installer-artifacts@sha256:7f3e05fa013dead5501513b86c19719973d0f9ee5dbdd4d3f5264fe601dbf809_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-installer@sha256:7f0fb099018d7fba695adfff2c6cec1af789e3c3ccab61bb084a30ae1bdff79f_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins-agent-base@sha256:c29122b0ed52c031f5f99ddb3338b6515bc05ac1e90864dda1131dcf9af87924_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins-agent-maven@sha256:ce5dd50d7005ed2d5ef36de673a2cf2cec07ad997ed93956605fe8fc8836d15c_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins@sha256:8da877d1df3fbb0fd4df607718847382d3ab38b862f868077c8938a1a7014f71_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-k8s-prometheus-adapter@sha256:95e7924437a3d110b334b1b03c01e2a65292f092110acde1a59db280ce8c7bda_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-keepalived-ipfailover@sha256:1c0b3bde2963560aa0c50bd8365abd39bc5cfae28409fbdc60abf786546eb2e8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-proxy@sha256:3afce3e28952226f1bb959b2859050e848ed5d4549ac5e2fc267f51b11fc6ec3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-rbac-proxy@sha256:dab4af2713fa59499ee8d2cb169d636ddb425590e6924bc2c03597c0b10bd246_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-state-metrics@sha256:4ff6cd48b319093041c2fa9c32ce16c6ea4dffb1c66ef4923f9cfc108cdfe6cc_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-libvirt-machine-controllers@sha256:2446ea720c26b213b9419bd2ad867c0ca1ec6df6d972cd5ffd6037b8fe0fbc88_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-curator5@sha256:91942a469532fda2a4609f2d7ddf693cca5b2ccd8c770d0e36823f0cc67d884c_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-elasticsearch5@sha256:c4693439c2f0f114238cc4034bfc6cd17f93bb9562ac2c0f9feb30f9c657fcd7_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-eventrouter@sha256:7668a706700163a35def516d1e1be336fef418ea477ef014ba90f5317569384b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-fluentd@sha256:3ef99bc79d891b111828c6c29faa8f3cd37d8ab8897186eff2bc85824939f632_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-machine-api-operator@sha256:6dfe7c13a6ae6c6e509f0d8cd0cb6e5284f9efd8cc2c949d87a471643e730957_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-machine-config-operator@sha256:ebffd73f3e4ff92792bad0cfa5bba5bec17e2124c7618ae7c4bd49ac777b7deb_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-admission-controller@sha256:101d1c2eeebf1c5e336238056ff9415de50855363eebce3b75cf6ac562adca05_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-cni@sha256:9be2123934d7f80af6439a84b5a9887459c1655549c7790fd080e965e89049b4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-must-gather@sha256:1acef66db6179f4289fc4abbb297df32c01d3b13fd85530ac6a0d925b517c3df_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-oauth-proxy@sha256:383360705efc0605760c3b2b1d0fa288094eb6dad8158c540d950f661b4ba880_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-openstack-machine-controllers@sha256:1779881159f1548a75e4dfd8a285e6ecab2ceede42acd9d07f036ec28bf1e6f9_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-lifecycle-manager@sha256:9254b8d3097a0d067f07bcf735b3530eccc888466f99a6282aebb7bbdd9cbcc8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-marketplace@sha256:3c5b9b86c9a9cd3c11290a44e29f016fe054b7068dd5b8469956909a63813db8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-registry@sha256:5eecc9d91c1ae4f0af586aa7d97fce8a32f23dfcdd64dcc61b9c536fbf4e8663_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-ovn-kubernetes@sha256:d4234553bb7e59323ee19b5d87d189f78fb4cd747551af6a6413b88001e27e13_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-pod@sha256:40b2f3ff0b5ff873669613882579b2a714aed77e1fea4e28a26ebf2726177707_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prom-label-proxy@sha256:c77261cc981cc8a5193ca1199c0a119db5757de135f4f7f5e558744371d2bd8a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-alertmanager@sha256:ef6c822baa9167856e613e7f1c14a1b44da42a394d91b9e0407d01d769a8fb40_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-config-reloader@sha256:6c0551dd87cc7eacc18ccbac093043b1178225f64843f13435f02ae7c2b4d91e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-node-exporter@sha256:56c31eb82f202b0ab38bc600ef01ef68302a0a57b7274c9537d3518855e2da1d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-operator@sha256:a5f9da1798e6b598157343e8751eda45ead551ddfb34ac5e742c6b1d8c8bf0d4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus@sha256:38e663d919d2c96af52656b42d18556cf457b84ef3160e27496f6db36ffa92a3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-service-ca-operator@sha256:ba2867ef0021af24b6667d114983400a0f7f5824842f1e11d1cda5aa91286737_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-cni@sha256:7a129a17d719761425ce26a47eaa115789be893f4a1054e37f3c76f891157886_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-dp-admission-controller@sha256:e98327978a09c28baa5f10365d2df1e2c33bb689644d581aa6f7ff095e0c1c5d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-network-device-plugin@sha256:4dc4017eee056448d0192834de329c6563c48f625f21ca9db59b22d54db70de8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-telemeter@sha256:5abb2f8cd1758441ba75e07e0a2f1180dbda0f13e6b51993d7c945b3d91b3bef_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-tests@sha256:28866a167dd7df474b053e92de3ba9bc0d95d918180b1e676637df30c2a27ef4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/postgres-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64", "7Server-RH7-RHOSE-4.1:openshift4/postgresql-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" } ] }
rhsa-2019:3906
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat OpenShift Container Platform 3.11.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThe following RPM packages have been rebuilt with updated version of Go, which includes the security fixes listed further below:\n\natomic-enterprise-service-catalog\natomic-openshift-cluster-autoscaler\natomic-openshift-descheduler\natomic-openshift-metrics-server\natomic-openshift-node-problem-detector\natomic-openshift-service-idler\natomic-openshift-web-console\ncockpit\ncsi-attacher\ncsi-driver-registrar\ncsi-livenessprobe\ncsi-provisioner\ngolang-github-openshift-oauth-proxy\ngolang-github-openshift-prometheus-alert-buffer\ngolang-github-prometheus-alertmanager\ngolang-github-prometheus-node_exporter\ngolang-github-prometheus-prometheus\nhawkular-openshift-agent\nheapster\nimage-inspector\nopenshift-enterprise-autoheal\nopenshift-enterprise-cluster-capacity\nopenshift-eventrouter\nopenshift-external-storage\n\nSecurity Fix(es):\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:3906", "url": "https://access.redhat.com/errata/RHSA-2019:3906" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3906.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 3.11 HTTP/2 security update", "tracking": { "current_release_date": "2025-03-19T15:02:55+00:00", "generator": { "date": "2025-03-19T15:02:55+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.1" } }, "id": "RHSA-2019:3906", "initial_release_date": "2019-11-18T16:26:09+00:00", "revision_history": [ { "date": "2019-11-18T16:26:09+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-11-18T16:26:09+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-03-19T15:02:55+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 3.11", "product": { "name": "Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:3.11::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.ppc64le", "product": { "name": "atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.ppc64le", "product_id": "atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.ppc64le", "product": { "name": "atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.ppc64le", "product_id": "atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog-svcat@3.11.154-1.git.1.fa68ced.el7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.ppc64le", "product": { "name": "atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.ppc64le", "product_id": "atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.ppc64le", "product": { "name": "atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.ppc64le", "product_id": "atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.ppc64le", "product": { "name": "atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.ppc64le", "product_id": "atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.ppc64le", "product": { "name": "atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.ppc64le", "product_id": "atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-node-problem-detector@3.11.154-1.git.1.5e8e065.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.ppc64le", "product": { "name": "atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.ppc64le", "product_id": "atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.ppc64le", "product": { "name": "atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.ppc64le", "product_id": "atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "cockpit-kubernetes-0:195-2.rhaos.el7.ppc64le", "product": { "name": "cockpit-kubernetes-0:195-2.rhaos.el7.ppc64le", "product_id": "cockpit-kubernetes-0:195-2.rhaos.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "cockpit-debuginfo-0:195-2.rhaos.el7.ppc64le", "product": { "name": "cockpit-debuginfo-0:195-2.rhaos.el7.ppc64le", "product_id": "cockpit-debuginfo-0:195-2.rhaos.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "csi-attacher-0:0.2.0-4.git27299be.el7.ppc64le", "product": { "name": "csi-attacher-0:0.2.0-4.git27299be.el7.ppc64le", "product_id": "csi-attacher-0:0.2.0-4.git27299be.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.ppc64le", "product": { "name": "csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.ppc64le", "product_id": "csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "csi-driver-registrar-0:0.2.0-2.el7.ppc64le", "product": { "name": "csi-driver-registrar-0:0.2.0-2.el7.ppc64le", "product_id": "csi-driver-registrar-0:0.2.0-2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "csi-driver-registrar-debuginfo-0:0.2.0-2.el7.ppc64le", "product": { "name": "csi-driver-registrar-debuginfo-0:0.2.0-2.el7.ppc64le", "product_id": "csi-driver-registrar-debuginfo-0:0.2.0-2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.ppc64le", "product": { "name": "csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.ppc64le", "product_id": "csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.ppc64le", "product": { "name": "csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.ppc64le", "product_id": "csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "csi-provisioner-0:0.2.0-3.el7.ppc64le", "product": { "name": "csi-provisioner-0:0.2.0-3.el7.ppc64le", "product_id": "csi-provisioner-0:0.2.0-3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "csi-provisioner-debuginfo-0:0.2.0-3.el7.ppc64le", "product": { "name": "csi-provisioner-debuginfo-0:0.2.0-3.el7.ppc64le", "product_id": "csi-provisioner-debuginfo-0:0.2.0-3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.ppc64le", "product": { "name": "golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.ppc64le", "product_id": "golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.ppc64le", "product": { "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.ppc64le", "product_id": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-openshift-prometheus-alert-buffer@0-3.gitceca8c1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.ppc64le", "product": { "name": "prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.ppc64le", "product_id": "prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.ppc64le", "product": { "name": "prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.ppc64le", "product_id": "prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "prometheus-0:3.11.154-1.git.1.148db48.el7.ppc64le", "product": { "name": "prometheus-0:3.11.154-1.git.1.148db48.el7.ppc64le", "product_id": "prometheus-0:3.11.154-1.git.1.148db48.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "hawkular-openshift-agent-0:1.2.2-3.el7.ppc64le", "product": { "name": "hawkular-openshift-agent-0:1.2.2-3.el7.ppc64le", "product_id": "hawkular-openshift-agent-0:1.2.2-3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "heapster-0:1.3.0-4.el7.ppc64le", "product": { "name": "heapster-0:1.3.0-4.el7.ppc64le", "product_id": "heapster-0:1.3.0-4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "image-inspector-0:2.4.0-4.el7.ppc64le", "product": { "name": "image-inspector-0:2.4.0-4.el7.ppc64le", "product_id": "image-inspector-0:2.4.0-4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.ppc64le", "product": { "name": "openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.ppc64le", "product_id": "openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.ppc64le", "product": { "name": "openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.ppc64le", "product_id": "openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-enterprise-cluster-capacity@3.11.154-1.git.1.5798c2c.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-eventrouter-0:0.2-4.git7c289cc.el7.ppc64le", "product": { "name": "openshift-eventrouter-0:0.2-4.git7c289cc.el7.ppc64le", "product_id": "openshift-eventrouter-0:0.2-4.git7c289cc.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.ppc64le", "product": { "name": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.ppc64le", "product_id": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product": { "name": "openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product_id": "openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-cephfs-provisioner@0.0.2-9.gitd3c94f0.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product": { "name": "openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product_id": "openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-efs-provisioner@0.0.2-9.gitd3c94f0.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product": { "name": "openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product_id": "openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-local-provisioner@0.0.2-9.gitd3c94f0.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product": { "name": "openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product_id": "openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-manila-provisioner@0.0.2-9.gitd3c94f0.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product": { "name": "openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product_id": "openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-snapshot-controller@0.0.2-9.gitd3c94f0.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product": { "name": "openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product_id": "openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-snapshot-provisioner@0.0.2-9.gitd3c94f0.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product": { "name": "openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product_id": "openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.x86_64", "product": { "name": "atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.x86_64", "product_id": "atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.x86_64", "product": { "name": "atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.x86_64", "product_id": "atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog-svcat@3.11.154-1.git.1.fa68ced.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.x86_64", "product": { "name": "atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.x86_64", "product_id": "atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.x86_64", "product": { "name": "atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.x86_64", "product_id": "atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.x86_64", "product": { "name": "atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.x86_64", "product_id": "atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.x86_64", "product": { "name": "atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.x86_64", "product_id": "atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-node-problem-detector@3.11.154-1.git.1.5e8e065.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.x86_64", "product": { "name": "atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.x86_64", "product_id": "atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.x86_64", "product": { "name": "atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.x86_64", "product_id": "atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "product": { "name": "cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "product_id": "cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "product": { "name": "cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "product_id": "cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "csi-attacher-0:0.2.0-4.git27299be.el7.x86_64", "product": { "name": "csi-attacher-0:0.2.0-4.git27299be.el7.x86_64", "product_id": "csi-attacher-0:0.2.0-4.git27299be.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.x86_64", "product": { "name": "csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.x86_64", "product_id": "csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "csi-driver-registrar-0:0.2.0-2.el7.x86_64", "product": { "name": "csi-driver-registrar-0:0.2.0-2.el7.x86_64", "product_id": "csi-driver-registrar-0:0.2.0-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "csi-driver-registrar-debuginfo-0:0.2.0-2.el7.x86_64", "product": { "name": "csi-driver-registrar-debuginfo-0:0.2.0-2.el7.x86_64", "product_id": "csi-driver-registrar-debuginfo-0:0.2.0-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.x86_64", "product": { "name": "csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.x86_64", "product_id": "csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.x86_64", "product": { "name": "csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.x86_64", "product_id": "csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "csi-provisioner-0:0.2.0-3.el7.x86_64", "product": { "name": "csi-provisioner-0:0.2.0-3.el7.x86_64", "product_id": "csi-provisioner-0:0.2.0-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "csi-provisioner-debuginfo-0:0.2.0-3.el7.x86_64", "product": { "name": "csi-provisioner-debuginfo-0:0.2.0-3.el7.x86_64", "product_id": "csi-provisioner-debuginfo-0:0.2.0-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.x86_64", "product": { "name": "golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.x86_64", "product_id": "golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "product": { "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "product_id": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-openshift-prometheus-alert-buffer@0-3.gitceca8c1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.x86_64", "product": { "name": "prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.x86_64", "product_id": "prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.x86_64", "product": { "name": "prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.x86_64", "product_id": "prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "prometheus-0:3.11.154-1.git.1.148db48.el7.x86_64", "product": { "name": "prometheus-0:3.11.154-1.git.1.148db48.el7.x86_64", "product_id": "prometheus-0:3.11.154-1.git.1.148db48.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "product": { "name": "hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "product_id": "hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "heapster-0:1.3.0-4.el7.x86_64", "product": { "name": "heapster-0:1.3.0-4.el7.x86_64", "product_id": "heapster-0:1.3.0-4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "image-inspector-0:2.4.0-4.el7.x86_64", "product": { "name": "image-inspector-0:2.4.0-4.el7.x86_64", "product_id": "image-inspector-0:2.4.0-4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.x86_64", "product": { "name": "openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.x86_64", "product_id": "openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.x86_64", "product": { "name": "openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.x86_64", "product_id": "openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-enterprise-cluster-capacity@3.11.154-1.git.1.5798c2c.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-eventrouter-0:0.2-4.git7c289cc.el7.x86_64", "product": { "name": "openshift-eventrouter-0:0.2-4.git7c289cc.el7.x86_64", "product_id": "openshift-eventrouter-0:0.2-4.git7c289cc.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.x86_64", "product": { "name": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.x86_64", "product_id": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product": { "name": "openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product_id": "openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-cephfs-provisioner@0.0.2-9.gitd3c94f0.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product": { "name": "openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product_id": "openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-efs-provisioner@0.0.2-9.gitd3c94f0.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product": { "name": "openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product_id": "openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-local-provisioner@0.0.2-9.gitd3c94f0.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product": { "name": "openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product_id": "openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-manila-provisioner@0.0.2-9.gitd3c94f0.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product": { "name": "openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product_id": "openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-snapshot-controller@0.0.2-9.gitd3c94f0.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product": { "name": "openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product_id": "openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-snapshot-provisioner@0.0.2-9.gitd3c94f0.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product": { "name": "openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product_id": "openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.src", "product": { "name": "atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.src", "product_id": "atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.src", "product": { "name": "atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.src", "product_id": "atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.src", "product": { "name": "atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.src", "product_id": "atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.src", "product": { "name": "atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.src", "product_id": "atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.src", "product": { "name": "atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.src", "product_id": "atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-node-problem-detector@3.11.154-1.git.1.5e8e065.el7?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.src", "product": { "name": "atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.src", "product_id": "atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.src", "product": { "name": "atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.src", "product_id": "atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "cockpit-0:195-2.rhaos.el7.src", "product": { "name": "cockpit-0:195-2.rhaos.el7.src", "product_id": "cockpit-0:195-2.rhaos.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "csi-attacher-0:0.2.0-4.git27299be.el7.src", "product": { "name": "csi-attacher-0:0.2.0-4.git27299be.el7.src", "product_id": "csi-attacher-0:0.2.0-4.git27299be.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "csi-driver-registrar-0:0.2.0-2.el7.src", "product": { "name": "csi-driver-registrar-0:0.2.0-2.el7.src", "product_id": "csi-driver-registrar-0:0.2.0-2.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.src", "product": { "name": "csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.src", "product_id": "csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "csi-provisioner-0:0.2.0-3.el7.src", "product": { "name": "csi-provisioner-0:0.2.0-3.el7.src", "product_id": "csi-provisioner-0:0.2.0-3.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.src", "product": { "name": "golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.src", "product_id": "golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "product": { "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "product_id": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-openshift-prometheus-alert-buffer@0-3.gitceca8c1.el7?arch=src" } } }, { "category": "product_version", "name": "golang-github-prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.src", "product": { "name": "golang-github-prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.src", "product_id": "golang-github-prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-prometheus-alertmanager@3.11.154-1.git.1.4acd2e6.el7?arch=src" } } }, { "category": "product_version", "name": "golang-github-prometheus-node_exporter-0:3.11.154-1.git.1.bc9f224.el7.src", "product": { "name": "golang-github-prometheus-node_exporter-0:3.11.154-1.git.1.bc9f224.el7.src", "product_id": "golang-github-prometheus-node_exporter-0:3.11.154-1.git.1.bc9f224.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-prometheus-node_exporter@3.11.154-1.git.1.bc9f224.el7?arch=src" } } }, { "category": "product_version", "name": "golang-github-prometheus-prometheus-0:3.11.154-1.git.1.148db48.el7.src", "product": { "name": "golang-github-prometheus-prometheus-0:3.11.154-1.git.1.148db48.el7.src", "product_id": "golang-github-prometheus-prometheus-0:3.11.154-1.git.1.148db48.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "hawkular-openshift-agent-0:1.2.2-3.el7.src", "product": { "name": "hawkular-openshift-agent-0:1.2.2-3.el7.src", "product_id": "hawkular-openshift-agent-0:1.2.2-3.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "heapster-0:1.3.0-4.el7.src", "product": { "name": "heapster-0:1.3.0-4.el7.src", "product_id": "heapster-0:1.3.0-4.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "image-inspector-0:2.4.0-4.el7.src", "product": { "name": "image-inspector-0:2.4.0-4.el7.src", "product_id": "image-inspector-0:2.4.0-4.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.src", "product": { "name": "openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.src", "product_id": "openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.src", "product": { "name": "openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.src", "product_id": "openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-enterprise-cluster-capacity@3.11.154-1.git.1.5798c2c.el7?arch=src" } } }, { "category": "product_version", "name": "openshift-eventrouter-0:0.2-4.git7c289cc.el7.src", "product": { "name": "openshift-eventrouter-0:0.2-4.git7c289cc.el7.src", "product_id": "openshift-eventrouter-0:0.2-4.git7c289cc.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "openshift-external-storage-0:0.0.2-9.gitd3c94f0.el7.src", "product": { "name": "openshift-external-storage-0:0.0.2-9.gitd3c94f0.el7.src", "product_id": "openshift-external-storage-0:0.0.2-9.gitd3c94f0.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.ppc64le" }, "product_reference": "atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.src" }, "product_reference": "atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.x86_64" }, "product_reference": "atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.ppc64le" }, "product_reference": "atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.x86_64" }, "product_reference": "atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.ppc64le" }, "product_reference": "atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.src" }, "product_reference": "atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.x86_64" }, "product_reference": "atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.ppc64le" }, "product_reference": "atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.src" }, "product_reference": "atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.x86_64" }, "product_reference": "atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.ppc64le" }, "product_reference": "atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.src" }, "product_reference": "atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.x86_64" }, "product_reference": "atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.ppc64le" }, "product_reference": "atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.src" }, "product_reference": "atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.x86_64" }, "product_reference": "atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.ppc64le" }, "product_reference": "atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.src" }, "product_reference": "atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.x86_64" }, "product_reference": "atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.ppc64le" }, "product_reference": "atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.src" }, "product_reference": "atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.x86_64" }, "product_reference": "atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "cockpit-0:195-2.rhaos.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:cockpit-0:195-2.rhaos.el7.src" }, "product_reference": "cockpit-0:195-2.rhaos.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "cockpit-debuginfo-0:195-2.rhaos.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:cockpit-debuginfo-0:195-2.rhaos.el7.ppc64le" }, "product_reference": "cockpit-debuginfo-0:195-2.rhaos.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "cockpit-debuginfo-0:195-2.rhaos.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:cockpit-debuginfo-0:195-2.rhaos.el7.x86_64" }, "product_reference": "cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "cockpit-kubernetes-0:195-2.rhaos.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:cockpit-kubernetes-0:195-2.rhaos.el7.ppc64le" }, "product_reference": "cockpit-kubernetes-0:195-2.rhaos.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "cockpit-kubernetes-0:195-2.rhaos.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:cockpit-kubernetes-0:195-2.rhaos.el7.x86_64" }, "product_reference": "cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "csi-attacher-0:0.2.0-4.git27299be.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.ppc64le" }, "product_reference": "csi-attacher-0:0.2.0-4.git27299be.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "csi-attacher-0:0.2.0-4.git27299be.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.src" }, "product_reference": "csi-attacher-0:0.2.0-4.git27299be.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "csi-attacher-0:0.2.0-4.git27299be.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.x86_64" }, "product_reference": "csi-attacher-0:0.2.0-4.git27299be.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.ppc64le" }, "product_reference": "csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.x86_64" }, "product_reference": "csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "csi-driver-registrar-0:0.2.0-2.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.ppc64le" }, "product_reference": "csi-driver-registrar-0:0.2.0-2.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "csi-driver-registrar-0:0.2.0-2.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.src" }, "product_reference": "csi-driver-registrar-0:0.2.0-2.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "csi-driver-registrar-0:0.2.0-2.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.x86_64" }, "product_reference": "csi-driver-registrar-0:0.2.0-2.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "csi-driver-registrar-debuginfo-0:0.2.0-2.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:csi-driver-registrar-debuginfo-0:0.2.0-2.el7.ppc64le" }, "product_reference": "csi-driver-registrar-debuginfo-0:0.2.0-2.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "csi-driver-registrar-debuginfo-0:0.2.0-2.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:csi-driver-registrar-debuginfo-0:0.2.0-2.el7.x86_64" }, "product_reference": "csi-driver-registrar-debuginfo-0:0.2.0-2.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.ppc64le" }, "product_reference": "csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.src" }, "product_reference": "csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.x86_64" }, "product_reference": "csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.ppc64le" }, "product_reference": "csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.x86_64" }, "product_reference": "csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "csi-provisioner-0:0.2.0-3.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.ppc64le" }, "product_reference": "csi-provisioner-0:0.2.0-3.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "csi-provisioner-0:0.2.0-3.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.src" }, "product_reference": "csi-provisioner-0:0.2.0-3.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "csi-provisioner-0:0.2.0-3.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.x86_64" }, "product_reference": "csi-provisioner-0:0.2.0-3.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "csi-provisioner-debuginfo-0:0.2.0-3.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:csi-provisioner-debuginfo-0:0.2.0-3.el7.ppc64le" }, "product_reference": "csi-provisioner-debuginfo-0:0.2.0-3.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "csi-provisioner-debuginfo-0:0.2.0-3.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:csi-provisioner-debuginfo-0:0.2.0-3.el7.x86_64" }, "product_reference": "csi-provisioner-debuginfo-0:0.2.0-3.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.ppc64le" }, "product_reference": "golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.src" }, "product_reference": "golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.x86_64" }, "product_reference": "golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.ppc64le" }, "product_reference": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src" }, "product_reference": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64" }, "product_reference": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.src" }, "product_reference": "golang-github-prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-node_exporter-0:3.11.154-1.git.1.bc9f224.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.154-1.git.1.bc9f224.el7.src" }, "product_reference": "golang-github-prometheus-node_exporter-0:3.11.154-1.git.1.bc9f224.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-prometheus-0:3.11.154-1.git.1.148db48.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.154-1.git.1.148db48.el7.src" }, "product_reference": "golang-github-prometheus-prometheus-0:3.11.154-1.git.1.148db48.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "hawkular-openshift-agent-0:1.2.2-3.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.ppc64le" }, "product_reference": "hawkular-openshift-agent-0:1.2.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "hawkular-openshift-agent-0:1.2.2-3.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.src" }, "product_reference": "hawkular-openshift-agent-0:1.2.2-3.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "hawkular-openshift-agent-0:1.2.2-3.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.x86_64" }, "product_reference": "hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "heapster-0:1.3.0-4.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.ppc64le" }, "product_reference": "heapster-0:1.3.0-4.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "heapster-0:1.3.0-4.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.src" }, "product_reference": "heapster-0:1.3.0-4.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "heapster-0:1.3.0-4.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.x86_64" }, "product_reference": "heapster-0:1.3.0-4.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "image-inspector-0:2.4.0-4.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.ppc64le" }, "product_reference": "image-inspector-0:2.4.0-4.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "image-inspector-0:2.4.0-4.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.src" }, "product_reference": "image-inspector-0:2.4.0-4.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "image-inspector-0:2.4.0-4.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.x86_64" }, "product_reference": "image-inspector-0:2.4.0-4.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.ppc64le" }, "product_reference": "openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.src" }, "product_reference": "openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.x86_64" }, "product_reference": "openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.ppc64le" }, "product_reference": "openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.src" }, "product_reference": "openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.x86_64" }, "product_reference": "openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-eventrouter-0:0.2-4.git7c289cc.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.ppc64le" }, "product_reference": "openshift-eventrouter-0:0.2-4.git7c289cc.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-eventrouter-0:0.2-4.git7c289cc.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.src" }, "product_reference": "openshift-eventrouter-0:0.2-4.git7c289cc.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-eventrouter-0:0.2-4.git7c289cc.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.x86_64" }, "product_reference": "openshift-eventrouter-0:0.2-4.git7c289cc.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.ppc64le" }, "product_reference": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.x86_64" }, "product_reference": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-0:0.0.2-9.gitd3c94f0.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-external-storage-0:0.0.2-9.gitd3c94f0.el7.src" }, "product_reference": "openshift-external-storage-0:0.0.2-9.gitd3c94f0.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le" }, "product_reference": "openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64" }, "product_reference": "openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.ppc64le" }, "product_reference": "openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.x86_64" }, "product_reference": "openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le" }, "product_reference": "openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64" }, "product_reference": "openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le" }, "product_reference": "openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64" }, "product_reference": "openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le" }, "product_reference": "openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64" }, "product_reference": "openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.ppc64le" }, "product_reference": "openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.x86_64" }, "product_reference": "openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le" }, "product_reference": "openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64" }, "product_reference": "openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-0:3.11.154-1.git.1.148db48.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.154-1.git.1.148db48.el7.ppc64le" }, "product_reference": "prometheus-0:3.11.154-1.git.1.148db48.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-0:3.11.154-1.git.1.148db48.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.154-1.git.1.148db48.el7.x86_64" }, "product_reference": "prometheus-0:3.11.154-1.git.1.148db48.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.ppc64le" }, "product_reference": "prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.x86_64" }, "product_reference": "prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.ppc64le" }, "product_reference": "prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.x86_64" }, "product_reference": "prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.x86_64", "7Server-RH7-RHOSE-3.11:cockpit-0:195-2.rhaos.el7.src", "7Server-RH7-RHOSE-3.11:cockpit-debuginfo-0:195-2.rhaos.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.11:cockpit-kubernetes-0:195-2.rhaos.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.src", "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.src", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-debuginfo-0:0.2.0-2.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-debuginfo-0:0.2.0-2.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.src", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.src", "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-provisioner-debuginfo-0:0.2.0-3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-provisioner-debuginfo-0:0.2.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.154-1.git.1.bc9f224.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.154-1.git.1.148db48.el7.src", "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.src", "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.ppc64le", "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.src", "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.ppc64le", "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.src", "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.src", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-0:0.0.2-9.gitd3c94f0.el7.src", "7Server-RH7-RHOSE-3.11:openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.154-1.git.1.148db48.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.154-1.git.1.148db48.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-18T16:26:09+00:00", "details": "See the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_release_notes.html", "product_ids": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.x86_64", "7Server-RH7-RHOSE-3.11:cockpit-0:195-2.rhaos.el7.src", "7Server-RH7-RHOSE-3.11:cockpit-debuginfo-0:195-2.rhaos.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.11:cockpit-kubernetes-0:195-2.rhaos.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.src", "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.src", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-debuginfo-0:0.2.0-2.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-debuginfo-0:0.2.0-2.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.src", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.src", "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-provisioner-debuginfo-0:0.2.0-3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-provisioner-debuginfo-0:0.2.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.154-1.git.1.bc9f224.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.154-1.git.1.148db48.el7.src", "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.src", "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.ppc64le", "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.src", "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.ppc64le", "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.src", "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.src", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-0:0.0.2-9.gitd3c94f0.el7.src", "7Server-RH7-RHOSE-3.11:openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.154-1.git.1.148db48.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.154-1.git.1.148db48.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3906" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.x86_64", "7Server-RH7-RHOSE-3.11:cockpit-0:195-2.rhaos.el7.src", "7Server-RH7-RHOSE-3.11:cockpit-debuginfo-0:195-2.rhaos.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.11:cockpit-kubernetes-0:195-2.rhaos.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.src", "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.src", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-debuginfo-0:0.2.0-2.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-debuginfo-0:0.2.0-2.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.src", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.src", "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-provisioner-debuginfo-0:0.2.0-3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-provisioner-debuginfo-0:0.2.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.154-1.git.1.bc9f224.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.154-1.git.1.148db48.el7.src", "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.src", "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.ppc64le", "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.src", "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.ppc64le", "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.src", "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.src", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-0:0.0.2-9.gitd3c94f0.el7.src", "7Server-RH7-RHOSE-3.11:openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.154-1.git.1.148db48.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.154-1.git.1.148db48.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.x86_64", "7Server-RH7-RHOSE-3.11:cockpit-0:195-2.rhaos.el7.src", "7Server-RH7-RHOSE-3.11:cockpit-debuginfo-0:195-2.rhaos.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.11:cockpit-kubernetes-0:195-2.rhaos.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.src", "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.src", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-debuginfo-0:0.2.0-2.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-debuginfo-0:0.2.0-2.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.src", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.src", "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-provisioner-debuginfo-0:0.2.0-3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-provisioner-debuginfo-0:0.2.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.154-1.git.1.bc9f224.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.154-1.git.1.148db48.el7.src", "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.src", "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.ppc64le", "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.src", "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.ppc64le", "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.src", "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.src", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-0:0.0.2-9.gitd3c94f0.el7.src", "7Server-RH7-RHOSE-3.11:openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.154-1.git.1.148db48.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.154-1.git.1.148db48.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-18T16:26:09+00:00", "details": "See the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_release_notes.html", "product_ids": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.x86_64", "7Server-RH7-RHOSE-3.11:cockpit-0:195-2.rhaos.el7.src", "7Server-RH7-RHOSE-3.11:cockpit-debuginfo-0:195-2.rhaos.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.11:cockpit-kubernetes-0:195-2.rhaos.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.src", "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.src", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-debuginfo-0:0.2.0-2.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-debuginfo-0:0.2.0-2.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.src", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.src", "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-provisioner-debuginfo-0:0.2.0-3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-provisioner-debuginfo-0:0.2.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.154-1.git.1.bc9f224.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.154-1.git.1.148db48.el7.src", "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.src", "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.ppc64le", "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.src", "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.ppc64le", "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.src", "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.src", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-0:0.0.2-9.gitd3c94f0.el7.src", "7Server-RH7-RHOSE-3.11:openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.154-1.git.1.148db48.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.154-1.git.1.148db48.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3906" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.x86_64", "7Server-RH7-RHOSE-3.11:cockpit-0:195-2.rhaos.el7.src", "7Server-RH7-RHOSE-3.11:cockpit-debuginfo-0:195-2.rhaos.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.11:cockpit-kubernetes-0:195-2.rhaos.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.src", "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.src", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-debuginfo-0:0.2.0-2.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-debuginfo-0:0.2.0-2.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.src", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.src", "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-provisioner-debuginfo-0:0.2.0-3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-provisioner-debuginfo-0:0.2.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.154-1.git.1.bc9f224.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.154-1.git.1.148db48.el7.src", "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.src", "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.ppc64le", "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.src", "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.ppc64le", "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.src", "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.src", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-0:0.0.2-9.gitd3c94f0.el7.src", "7Server-RH7-RHOSE-3.11:openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.154-1.git.1.148db48.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.154-1.git.1.148db48.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" } ] }
rhsa-2019_3265
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat OpenShift Container Platform 4.1.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the ansible-operator, apb, containernetworking-plugins, golang-github-openshift-prometheus-alert-buffer, golang-github-prometheus-promu and openshift-eventrouter RPM packages for Red Hat OpenShift Container Platform 4.1.21. These packages have been rebuilt with an updated version of Go to address the below security issues.\n\nSecurity Fix(es):\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:3265", "url": "https://access.redhat.com/errata/RHSA-2019:3265" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3265.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 4.1 security update", "tracking": { "current_release_date": "2024-11-13T22:09:57+00:00", "generator": { "date": "2024-11-13T22:09:57+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2019:3265", "initial_release_date": "2019-10-30T18:20:03+00:00", "revision_history": [ { "date": "2019-10-30T18:20:03+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-10-30T18:20:03+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-13T22:09:57+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.1", "product": { "name": "Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.1::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "apb-0:2.0.3-2.el7.x86_64", "product": { "name": "apb-0:2.0.3-2.el7.x86_64", "product_id": "apb-0:2.0.3-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.8.1-4.el7.x86_64", "product": { "name": "containernetworking-plugins-0:0.8.1-4.el7.x86_64", "product_id": "containernetworking-plugins-0:0.8.1-4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64", "product": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64", "product_id": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "product": { "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "product_id": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-openshift-prometheus-alert-buffer@0-3.gitceca8c1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "product": { "name": "golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "product_id": "golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "product": { "name": "prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "product_id": "prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-eventrouter-0:0.2-3.gited73fb6.el7.x86_64", "product": { "name": "openshift-eventrouter-0:0.2-3.gited73fb6.el7.x86_64", "product_id": "openshift-eventrouter-0:0.2-3.gited73fb6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-eventrouter-debuginfo-0:0.2-3.gited73fb6.el7.x86_64", "product": { "name": "openshift-eventrouter-debuginfo-0:0.2-3.gited73fb6.el7.x86_64", "product_id": "openshift-eventrouter-debuginfo-0:0.2-3.gited73fb6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.x86_64", "product": { "name": "ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.x86_64", "product_id": "ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "apb-0:2.0.3-2.el7.src", "product": { "name": "apb-0:2.0.3-2.el7.src", "product_id": "apb-0:2.0.3-2.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.8.1-4.el7.src", "product": { "name": "containernetworking-plugins-0:0.8.1-4.el7.src", "product_id": "containernetworking-plugins-0:0.8.1-4.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "product": { "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "product_id": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-openshift-prometheus-alert-buffer@0-3.gitceca8c1.el7?arch=src" } } }, { "category": "product_version", "name": "golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "product": { "name": "golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "product_id": "golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "openshift-eventrouter-0:0.2-3.gited73fb6.el7.src", "product": { "name": "openshift-eventrouter-0:0.2-3.gited73fb6.el7.src", "product_id": "openshift-eventrouter-0:0.2-3.gited73fb6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.src", "product": { "name": "ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.src", "product_id": "ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "apb-container-scripts-0:2.0.3-2.el7.noarch", "product": { "name": "apb-container-scripts-0:2.0.3-2.el7.noarch", "product_id": "apb-container-scripts-0:2.0.3-2.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } }, { "category": "product_version", "name": "apb-devel-0:2.0.3-2.el7.noarch", "product": { "name": "apb-devel-0:2.0.3-2.el7.noarch", "product_id": "apb-devel-0:2.0.3-2.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } }, { "category": "product_version", "name": "ansible-operator-container-scripts-0:0.0.1-3.git.59.4beb3d2.el7.noarch", "product": { "name": "ansible-operator-container-scripts-0:0.0.1-3.git.59.4beb3d2.el7.noarch", "product_id": "ansible-operator-container-scripts-0:0.0.1-3.git.59.4beb3d2.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } }, { "category": "product_version", "name": "ansible-operator-devel-0:0.0.1-3.git.59.4beb3d2.el7.noarch", "product": { "name": "ansible-operator-devel-0:0.0.1-3.git.59.4beb3d2.el7.noarch", "product_id": "ansible-operator-devel-0:0.0.1-3.git.59.4beb3d2.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.src" }, "product_reference": "ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.x86_64" }, "product_reference": "ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-operator-container-scripts-0:0.0.1-3.git.59.4beb3d2.el7.noarch as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:ansible-operator-container-scripts-0:0.0.1-3.git.59.4beb3d2.el7.noarch" }, "product_reference": "ansible-operator-container-scripts-0:0.0.1-3.git.59.4beb3d2.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-operator-devel-0:0.0.1-3.git.59.4beb3d2.el7.noarch as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:ansible-operator-devel-0:0.0.1-3.git.59.4beb3d2.el7.noarch" }, "product_reference": "ansible-operator-devel-0:0.0.1-3.git.59.4beb3d2.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "apb-0:2.0.3-2.el7.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:apb-0:2.0.3-2.el7.src" }, "product_reference": "apb-0:2.0.3-2.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "apb-0:2.0.3-2.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:apb-0:2.0.3-2.el7.x86_64" }, "product_reference": "apb-0:2.0.3-2.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "apb-container-scripts-0:2.0.3-2.el7.noarch as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:apb-container-scripts-0:2.0.3-2.el7.noarch" }, "product_reference": "apb-container-scripts-0:2.0.3-2.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "apb-devel-0:2.0.3-2.el7.noarch as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:apb-devel-0:2.0.3-2.el7.noarch" }, "product_reference": "apb-devel-0:2.0.3-2.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.1-4.el7.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:containernetworking-plugins-0:0.8.1-4.el7.src" }, "product_reference": "containernetworking-plugins-0:0.8.1-4.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.1-4.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:containernetworking-plugins-0:0.8.1-4.el7.x86_64" }, "product_reference": "containernetworking-plugins-0:0.8.1-4.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src" }, "product_reference": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64" }, "product_reference": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src" }, "product_reference": "golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64" }, "product_reference": "golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-eventrouter-0:0.2-3.gited73fb6.el7.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-eventrouter-0:0.2-3.gited73fb6.el7.src" }, "product_reference": "openshift-eventrouter-0:0.2-3.gited73fb6.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-eventrouter-0:0.2-3.gited73fb6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-eventrouter-0:0.2-3.gited73fb6.el7.x86_64" }, "product_reference": "openshift-eventrouter-0:0.2-3.gited73fb6.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-eventrouter-debuginfo-0:0.2-3.gited73fb6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-eventrouter-debuginfo-0:0.2-3.gited73fb6.el7.x86_64" }, "product_reference": "openshift-eventrouter-debuginfo-0:0.2-3.gited73fb6.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-promu-0:0-5.git85ceabc.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:prometheus-promu-0:0-5.git85ceabc.el7.x86_64" }, "product_reference": "prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.1:ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.src", "7Server-RH7-RHOSE-4.1:ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.x86_64", "7Server-RH7-RHOSE-4.1:ansible-operator-container-scripts-0:0.0.1-3.git.59.4beb3d2.el7.noarch", "7Server-RH7-RHOSE-4.1:ansible-operator-devel-0:0.0.1-3.git.59.4beb3d2.el7.noarch", "7Server-RH7-RHOSE-4.1:apb-0:2.0.3-2.el7.src", "7Server-RH7-RHOSE-4.1:apb-0:2.0.3-2.el7.x86_64", "7Server-RH7-RHOSE-4.1:apb-container-scripts-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.1:apb-devel-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.1:containernetworking-plugins-0:0.8.1-4.el7.src", "7Server-RH7-RHOSE-4.1:containernetworking-plugins-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-4.1:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-4.1:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "7Server-RH7-RHOSE-4.1:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-eventrouter-0:0.2-3.gited73fb6.el7.src", "7Server-RH7-RHOSE-4.1:openshift-eventrouter-0:0.2-3.gited73fb6.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-eventrouter-debuginfo-0:0.2-3.gited73fb6.el7.x86_64", "7Server-RH7-RHOSE-4.1:prometheus-promu-0:0-5.git85ceabc.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-30T18:20:03+00:00", "details": "For OpenShift Container Platform 4.1 see the following documentation, which\nwill be updated shortly for release 4.1.21, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-release-notes.html", "product_ids": [ "7Server-RH7-RHOSE-4.1:ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.src", "7Server-RH7-RHOSE-4.1:ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.x86_64", "7Server-RH7-RHOSE-4.1:ansible-operator-container-scripts-0:0.0.1-3.git.59.4beb3d2.el7.noarch", "7Server-RH7-RHOSE-4.1:ansible-operator-devel-0:0.0.1-3.git.59.4beb3d2.el7.noarch", "7Server-RH7-RHOSE-4.1:apb-0:2.0.3-2.el7.src", "7Server-RH7-RHOSE-4.1:apb-0:2.0.3-2.el7.x86_64", "7Server-RH7-RHOSE-4.1:apb-container-scripts-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.1:apb-devel-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.1:containernetworking-plugins-0:0.8.1-4.el7.src", "7Server-RH7-RHOSE-4.1:containernetworking-plugins-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-4.1:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-4.1:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "7Server-RH7-RHOSE-4.1:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-eventrouter-0:0.2-3.gited73fb6.el7.src", "7Server-RH7-RHOSE-4.1:openshift-eventrouter-0:0.2-3.gited73fb6.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-eventrouter-debuginfo-0:0.2-3.gited73fb6.el7.x86_64", "7Server-RH7-RHOSE-4.1:prometheus-promu-0:0-5.git85ceabc.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3265" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-4.1:ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.src", "7Server-RH7-RHOSE-4.1:ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.x86_64", "7Server-RH7-RHOSE-4.1:ansible-operator-container-scripts-0:0.0.1-3.git.59.4beb3d2.el7.noarch", "7Server-RH7-RHOSE-4.1:ansible-operator-devel-0:0.0.1-3.git.59.4beb3d2.el7.noarch", "7Server-RH7-RHOSE-4.1:apb-0:2.0.3-2.el7.src", "7Server-RH7-RHOSE-4.1:apb-0:2.0.3-2.el7.x86_64", "7Server-RH7-RHOSE-4.1:apb-container-scripts-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.1:apb-devel-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.1:containernetworking-plugins-0:0.8.1-4.el7.src", "7Server-RH7-RHOSE-4.1:containernetworking-plugins-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-4.1:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-4.1:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "7Server-RH7-RHOSE-4.1:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-eventrouter-0:0.2-3.gited73fb6.el7.src", "7Server-RH7-RHOSE-4.1:openshift-eventrouter-0:0.2-3.gited73fb6.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-eventrouter-debuginfo-0:0.2-3.gited73fb6.el7.x86_64", "7Server-RH7-RHOSE-4.1:prometheus-promu-0:0-5.git85ceabc.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.1:ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.src", "7Server-RH7-RHOSE-4.1:ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.x86_64", "7Server-RH7-RHOSE-4.1:ansible-operator-container-scripts-0:0.0.1-3.git.59.4beb3d2.el7.noarch", "7Server-RH7-RHOSE-4.1:ansible-operator-devel-0:0.0.1-3.git.59.4beb3d2.el7.noarch", "7Server-RH7-RHOSE-4.1:apb-0:2.0.3-2.el7.src", "7Server-RH7-RHOSE-4.1:apb-0:2.0.3-2.el7.x86_64", "7Server-RH7-RHOSE-4.1:apb-container-scripts-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.1:apb-devel-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.1:containernetworking-plugins-0:0.8.1-4.el7.src", "7Server-RH7-RHOSE-4.1:containernetworking-plugins-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-4.1:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-4.1:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "7Server-RH7-RHOSE-4.1:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-eventrouter-0:0.2-3.gited73fb6.el7.src", "7Server-RH7-RHOSE-4.1:openshift-eventrouter-0:0.2-3.gited73fb6.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-eventrouter-debuginfo-0:0.2-3.gited73fb6.el7.x86_64", "7Server-RH7-RHOSE-4.1:prometheus-promu-0:0-5.git85ceabc.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-30T18:20:03+00:00", "details": "For OpenShift Container Platform 4.1 see the following documentation, which\nwill be updated shortly for release 4.1.21, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-release-notes.html", "product_ids": [ "7Server-RH7-RHOSE-4.1:ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.src", "7Server-RH7-RHOSE-4.1:ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.x86_64", "7Server-RH7-RHOSE-4.1:ansible-operator-container-scripts-0:0.0.1-3.git.59.4beb3d2.el7.noarch", "7Server-RH7-RHOSE-4.1:ansible-operator-devel-0:0.0.1-3.git.59.4beb3d2.el7.noarch", "7Server-RH7-RHOSE-4.1:apb-0:2.0.3-2.el7.src", "7Server-RH7-RHOSE-4.1:apb-0:2.0.3-2.el7.x86_64", "7Server-RH7-RHOSE-4.1:apb-container-scripts-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.1:apb-devel-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.1:containernetworking-plugins-0:0.8.1-4.el7.src", "7Server-RH7-RHOSE-4.1:containernetworking-plugins-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-4.1:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-4.1:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "7Server-RH7-RHOSE-4.1:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-eventrouter-0:0.2-3.gited73fb6.el7.src", "7Server-RH7-RHOSE-4.1:openshift-eventrouter-0:0.2-3.gited73fb6.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-eventrouter-debuginfo-0:0.2-3.gited73fb6.el7.x86_64", "7Server-RH7-RHOSE-4.1:prometheus-promu-0:0-5.git85ceabc.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3265" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-4.1:ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.src", "7Server-RH7-RHOSE-4.1:ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.x86_64", "7Server-RH7-RHOSE-4.1:ansible-operator-container-scripts-0:0.0.1-3.git.59.4beb3d2.el7.noarch", "7Server-RH7-RHOSE-4.1:ansible-operator-devel-0:0.0.1-3.git.59.4beb3d2.el7.noarch", "7Server-RH7-RHOSE-4.1:apb-0:2.0.3-2.el7.src", "7Server-RH7-RHOSE-4.1:apb-0:2.0.3-2.el7.x86_64", "7Server-RH7-RHOSE-4.1:apb-container-scripts-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.1:apb-devel-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.1:containernetworking-plugins-0:0.8.1-4.el7.src", "7Server-RH7-RHOSE-4.1:containernetworking-plugins-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-4.1:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-4.1:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "7Server-RH7-RHOSE-4.1:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-eventrouter-0:0.2-3.gited73fb6.el7.src", "7Server-RH7-RHOSE-4.1:openshift-eventrouter-0:0.2-3.gited73fb6.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-eventrouter-debuginfo-0:0.2-3.gited73fb6.el7.x86_64", "7Server-RH7-RHOSE-4.1:prometheus-promu-0:0-5.git85ceabc.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" } ] }
RHSA-2019:2594
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat OpenShift Container Platform 4.1.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the container images for Red Hat\nOpenShift Container Platform 4.1.14. All container images have been rebuilt with updated versions of golang. See the following advisory for the\nRPM packages for this release:\n\nhttps://access.redhat.com/errata/RHBA-2019:2660\n\nSecurity Fix(es):\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nThis release also includes the following bugs: \n\n* Previously, users would see an error in the web console when navigating to the ClusterResourceQuota instances from the CRD list. The problem has been fixed, and you can now successfully list ClusterResourceQuota instances from the CRD page. (BZ#1743259)\n\nSpace precludes documenting all of the container images in this advisory.\nSee the following Release Notes documentation, which will be updated\nshortly for this release, for details about these changes:\n\nhttps://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-rel\nease-notes.html\n\nYou may download the oc tool and use it to inspect release image metadata\nas follows:\n\n $ oc adm release info quay.io/openshift-release-dev/ocp-release:4.1.14\n\nThe image digest is sha256:fd41c9bda9e0ff306954f1fd7af6428edff8c3989b75f9fe984968db66846231\n\nAll OpenShift Container Platform 4.1 users are advised to upgrade to these\nupdated packages and images.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:2594", "url": "https://access.redhat.com/errata/RHSA-2019:2594" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1717794", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1717794" }, { "category": "external", "summary": "1729510", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1729510" }, { "category": "external", "summary": "1735363", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735363" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1737156", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1737156" }, { "category": "external", "summary": "1737164", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1737164" }, { "category": "external", "summary": "1737386", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1737386" }, { "category": "external", "summary": "1740044", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1740044" }, { "category": "external", "summary": "1741067", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741067" }, { "category": "external", "summary": "1741499", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741499" }, { "category": "external", "summary": "1741694", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741694" }, { "category": "external", "summary": "1743119", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1743119" }, { "category": "external", "summary": "1743259", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1743259" }, { "category": "external", "summary": "1743418", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1743418" }, { "category": "external", "summary": "1743587", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1743587" }, { "category": "external", "summary": "1743748", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1743748" }, { "category": "external", "summary": "1743771", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1743771" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2594.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 4.1.14 security and bug fix update", "tracking": { "current_release_date": "2025-03-19T15:00:09+00:00", "generator": { "date": "2025-03-19T15:00:09+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.1" } }, "id": "RHSA-2019:2594", "initial_release_date": "2019-09-10T15:58:57+00:00", "revision_history": [ { "date": "2019-09-10T15:58:57+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-09-10T15:58:57+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-03-19T15:00:09+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.1", "product": { "name": "Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.1::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "openshift4/ose-cluster-autoscaler@sha256:b995c30d43493a8d393282c760584605951048dbe395eeac6b6b1bec269ff3ad_amd64", "product": { "name": "openshift4/ose-cluster-autoscaler@sha256:b995c30d43493a8d393282c760584605951048dbe395eeac6b6b1bec269ff3ad_amd64", "product_id": "openshift4/ose-cluster-autoscaler@sha256:b995c30d43493a8d393282c760584605951048dbe395eeac6b6b1bec269ff3ad_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-autoscaler@sha256:b995c30d43493a8d393282c760584605951048dbe395eeac6b6b1bec269ff3ad?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-autoscaler\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-descheduler@sha256:f7527c56780840d4062768e88f098229effd9796639ad67f6cdf841941a7e4a1_amd64", "product": { "name": "openshift4/ose-descheduler@sha256:f7527c56780840d4062768e88f098229effd9796639ad67f6cdf841941a7e4a1_amd64", "product_id": "openshift4/ose-descheduler@sha256:f7527c56780840d4062768e88f098229effd9796639ad67f6cdf841941a7e4a1_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-descheduler@sha256:f7527c56780840d4062768e88f098229effd9796639ad67f6cdf841941a7e4a1?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-descheduler\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-baremetal-machine-controllers@sha256:d9ca5e81aa2fb401f9c5bfb63e85fc5d93ae1e657ab992e879a2b9d520f3fea3_amd64", "product": { "name": "openshift4/ose-baremetal-machine-controllers@sha256:d9ca5e81aa2fb401f9c5bfb63e85fc5d93ae1e657ab992e879a2b9d520f3fea3_amd64", "product_id": "openshift4/ose-baremetal-machine-controllers@sha256:d9ca5e81aa2fb401f9c5bfb63e85fc5d93ae1e657ab992e879a2b9d520f3fea3_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-baremetal-machine-controllers@sha256:d9ca5e81aa2fb401f9c5bfb63e85fc5d93ae1e657ab992e879a2b9d520f3fea3?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-machine-controllers\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-logging-operator@sha256:7926e2be0854ff3edac0ced6950a0be04ad26d46a5da638611457c3fe0f1a19a_amd64", "product": { "name": "openshift4/ose-cluster-logging-operator@sha256:7926e2be0854ff3edac0ced6950a0be04ad26d46a5da638611457c3fe0f1a19a_amd64", "product_id": "openshift4/ose-cluster-logging-operator@sha256:7926e2be0854ff3edac0ced6950a0be04ad26d46a5da638611457c3fe0f1a19a_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-logging-operator@sha256:7926e2be0854ff3edac0ced6950a0be04ad26d46a5da638611457c3fe0f1a19a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-logging-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-monitoring-operator@sha256:05d69056c09c34d095ccedc757ecf2692690c72d2bee4e6b6afc58b01ec55d9c_amd64", "product": { "name": "openshift4/ose-cluster-monitoring-operator@sha256:05d69056c09c34d095ccedc757ecf2692690c72d2bee4e6b6afc58b01ec55d9c_amd64", "product_id": "openshift4/ose-cluster-monitoring-operator@sha256:05d69056c09c34d095ccedc757ecf2692690c72d2bee4e6b6afc58b01ec55d9c_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-monitoring-operator@sha256:05d69056c09c34d095ccedc757ecf2692690c72d2bee4e6b6afc58b01ec55d9c?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-monitoring-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-network-operator@sha256:2561079cceff11035c216fea71c0a10622696266aa5a9323ef13806c91537a68_amd64", "product": { "name": "openshift4/ose-cluster-network-operator@sha256:2561079cceff11035c216fea71c0a10622696266aa5a9323ef13806c91537a68_amd64", "product_id": "openshift4/ose-cluster-network-operator@sha256:2561079cceff11035c216fea71c0a10622696266aa5a9323ef13806c91537a68_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-network-operator@sha256:2561079cceff11035c216fea71c0a10622696266aa5a9323ef13806c91537a68?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-network-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-node-tuning-operator@sha256:b6fa66947d674eb2fc12b38fb9355c43c57a484d85e56dd013960a760046b793_amd64", "product": { "name": "openshift4/ose-cluster-node-tuning-operator@sha256:b6fa66947d674eb2fc12b38fb9355c43c57a484d85e56dd013960a760046b793_amd64", "product_id": "openshift4/ose-cluster-node-tuning-operator@sha256:b6fa66947d674eb2fc12b38fb9355c43c57a484d85e56dd013960a760046b793_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-node-tuning-operator@sha256:b6fa66947d674eb2fc12b38fb9355c43c57a484d85e56dd013960a760046b793?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-node-tuning-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-version-operator@sha256:2d99cc15d95e08541d60ebc1966b534fda48d00ee69c7c226996ac407a813d6b_amd64", "product": { "name": "openshift4/ose-cluster-version-operator@sha256:2d99cc15d95e08541d60ebc1966b534fda48d00ee69c7c226996ac407a813d6b_amd64", "product_id": "openshift4/ose-cluster-version-operator@sha256:2d99cc15d95e08541d60ebc1966b534fda48d00ee69c7c226996ac407a813d6b_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-version-operator@sha256:2d99cc15d95e08541d60ebc1966b534fda48d00ee69c7c226996ac407a813d6b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-version-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-configmap-reloader@sha256:84bb7a8504eb34ff5e4e9ca92aab960c078ededed07ab0fe79620c0b9f32a51f_amd64", "product": { "name": "openshift4/ose-configmap-reloader@sha256:84bb7a8504eb34ff5e4e9ca92aab960c078ededed07ab0fe79620c0b9f32a51f_amd64", "product_id": "openshift4/ose-configmap-reloader@sha256:84bb7a8504eb34ff5e4e9ca92aab960c078ededed07ab0fe79620c0b9f32a51f_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-configmap-reloader@sha256:84bb7a8504eb34ff5e4e9ca92aab960c078ededed07ab0fe79620c0b9f32a51f?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-configmap-reloader\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-coredns@sha256:9a330c9540816c13ddbbc93e99107f3d2a194c79eae20d81e8b8d252e9282c14_amd64", "product": { "name": "openshift4/ose-coredns@sha256:9a330c9540816c13ddbbc93e99107f3d2a194c79eae20d81e8b8d252e9282c14_amd64", "product_id": "openshift4/ose-coredns@sha256:9a330c9540816c13ddbbc93e99107f3d2a194c79eae20d81e8b8d252e9282c14_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-coredns@sha256:9a330c9540816c13ddbbc93e99107f3d2a194c79eae20d81e8b8d252e9282c14?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-coredns\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-descheduler-operator@sha256:71ba5a71c71074c282634a6261825c57977abd4999cc03957b8c407808a72902_amd64", "product": { "name": "openshift4/ose-descheduler-operator@sha256:71ba5a71c71074c282634a6261825c57977abd4999cc03957b8c407808a72902_amd64", "product_id": "openshift4/ose-descheduler-operator@sha256:71ba5a71c71074c282634a6261825c57977abd4999cc03957b8c407808a72902_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-descheduler-operator@sha256:71ba5a71c71074c282634a6261825c57977abd4999cc03957b8c407808a72902?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-descheduler-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-elasticsearch-operator@sha256:6b153238aa96aa4128de68a8df8dde185ebb930d2cee6fe1c033ff7b713fb6f9_amd64", "product": { "name": "openshift4/ose-elasticsearch-operator@sha256:6b153238aa96aa4128de68a8df8dde185ebb930d2cee6fe1c033ff7b713fb6f9_amd64", "product_id": "openshift4/ose-elasticsearch-operator@sha256:6b153238aa96aa4128de68a8df8dde185ebb930d2cee6fe1c033ff7b713fb6f9_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-elasticsearch-operator@sha256:6b153238aa96aa4128de68a8df8dde185ebb930d2cee6fe1c033ff7b713fb6f9?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-elasticsearch-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-oauth-proxy@sha256:383360705efc0605760c3b2b1d0fa288094eb6dad8158c540d950f661b4ba880_amd64", "product": { "name": "openshift4/ose-oauth-proxy@sha256:383360705efc0605760c3b2b1d0fa288094eb6dad8158c540d950f661b4ba880_amd64", "product_id": "openshift4/ose-oauth-proxy@sha256:383360705efc0605760c3b2b1d0fa288094eb6dad8158c540d950f661b4ba880_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-oauth-proxy@sha256:383360705efc0605760c3b2b1d0fa288094eb6dad8158c540d950f661b4ba880?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-proxy\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-prometheus-alertmanager@sha256:ef6c822baa9167856e613e7f1c14a1b44da42a394d91b9e0407d01d769a8fb40_amd64", "product": { "name": "openshift4/ose-prometheus-alertmanager@sha256:ef6c822baa9167856e613e7f1c14a1b44da42a394d91b9e0407d01d769a8fb40_amd64", "product_id": "openshift4/ose-prometheus-alertmanager@sha256:ef6c822baa9167856e613e7f1c14a1b44da42a394d91b9e0407d01d769a8fb40_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-prometheus-alertmanager@sha256:ef6c822baa9167856e613e7f1c14a1b44da42a394d91b9e0407d01d769a8fb40?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-alertmanager\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-prometheus-node-exporter@sha256:56c31eb82f202b0ab38bc600ef01ef68302a0a57b7274c9537d3518855e2da1d_amd64", "product": { "name": "openshift4/ose-prometheus-node-exporter@sha256:56c31eb82f202b0ab38bc600ef01ef68302a0a57b7274c9537d3518855e2da1d_amd64", "product_id": "openshift4/ose-prometheus-node-exporter@sha256:56c31eb82f202b0ab38bc600ef01ef68302a0a57b7274c9537d3518855e2da1d_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-prometheus-node-exporter@sha256:56c31eb82f202b0ab38bc600ef01ef68302a0a57b7274c9537d3518855e2da1d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-node-exporter\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-prometheus@sha256:38e663d919d2c96af52656b42d18556cf457b84ef3160e27496f6db36ffa92a3_amd64", "product": { "name": "openshift4/ose-prometheus@sha256:38e663d919d2c96af52656b42d18556cf457b84ef3160e27496f6db36ffa92a3_amd64", "product_id": "openshift4/ose-prometheus@sha256:38e663d919d2c96af52656b42d18556cf457b84ef3160e27496f6db36ffa92a3_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-prometheus@sha256:38e663d919d2c96af52656b42d18556cf457b84ef3160e27496f6db36ffa92a3?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-grafana@sha256:4304ba0edd79f4b2b7b6f4766dd696e8fb21423ff0dc50a18388e2163d9df3de_amd64", "product": { "name": "openshift4/ose-grafana@sha256:4304ba0edd79f4b2b7b6f4766dd696e8fb21423ff0dc50a18388e2163d9df3de_amd64", "product_id": "openshift4/ose-grafana@sha256:4304ba0edd79f4b2b7b6f4766dd696e8fb21423ff0dc50a18388e2163d9df3de_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-grafana@sha256:4304ba0edd79f4b2b7b6f4766dd696e8fb21423ff0dc50a18388e2163d9df3de?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-grafana\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-jenkins-agent-maven@sha256:ce5dd50d7005ed2d5ef36de673a2cf2cec07ad997ed93956605fe8fc8836d15c_amd64", "product": { "name": "openshift4/ose-jenkins-agent-maven@sha256:ce5dd50d7005ed2d5ef36de673a2cf2cec07ad997ed93956605fe8fc8836d15c_amd64", "product_id": "openshift4/ose-jenkins-agent-maven@sha256:ce5dd50d7005ed2d5ef36de673a2cf2cec07ad997ed93956605fe8fc8836d15c_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-jenkins-agent-maven@sha256:ce5dd50d7005ed2d5ef36de673a2cf2cec07ad997ed93956605fe8fc8836d15c?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-maven\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-jenkins-agent-base@sha256:c29122b0ed52c031f5f99ddb3338b6515bc05ac1e90864dda1131dcf9af87924_amd64", "product": { "name": "openshift4/ose-jenkins-agent-base@sha256:c29122b0ed52c031f5f99ddb3338b6515bc05ac1e90864dda1131dcf9af87924_amd64", "product_id": "openshift4/ose-jenkins-agent-base@sha256:c29122b0ed52c031f5f99ddb3338b6515bc05ac1e90864dda1131dcf9af87924_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-jenkins-agent-base@sha256:c29122b0ed52c031f5f99ddb3338b6515bc05ac1e90864dda1131dcf9af87924?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-base\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-kube-proxy@sha256:3afce3e28952226f1bb959b2859050e848ed5d4549ac5e2fc267f51b11fc6ec3_amd64", "product": { "name": "openshift4/ose-kube-proxy@sha256:3afce3e28952226f1bb959b2859050e848ed5d4549ac5e2fc267f51b11fc6ec3_amd64", "product_id": "openshift4/ose-kube-proxy@sha256:3afce3e28952226f1bb959b2859050e848ed5d4549ac5e2fc267f51b11fc6ec3_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-kube-proxy@sha256:3afce3e28952226f1bb959b2859050e848ed5d4549ac5e2fc267f51b11fc6ec3?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kube-proxy\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-kube-rbac-proxy@sha256:dab4af2713fa59499ee8d2cb169d636ddb425590e6924bc2c03597c0b10bd246_amd64", "product": { "name": "openshift4/ose-kube-rbac-proxy@sha256:dab4af2713fa59499ee8d2cb169d636ddb425590e6924bc2c03597c0b10bd246_amd64", "product_id": "openshift4/ose-kube-rbac-proxy@sha256:dab4af2713fa59499ee8d2cb169d636ddb425590e6924bc2c03597c0b10bd246_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-kube-rbac-proxy@sha256:dab4af2713fa59499ee8d2cb169d636ddb425590e6924bc2c03597c0b10bd246?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kube-rbac-proxy\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-kube-state-metrics@sha256:4ff6cd48b319093041c2fa9c32ce16c6ea4dffb1c66ef4923f9cfc108cdfe6cc_amd64", "product": { "name": "openshift4/ose-kube-state-metrics@sha256:4ff6cd48b319093041c2fa9c32ce16c6ea4dffb1c66ef4923f9cfc108cdfe6cc_amd64", "product_id": "openshift4/ose-kube-state-metrics@sha256:4ff6cd48b319093041c2fa9c32ce16c6ea4dffb1c66ef4923f9cfc108cdfe6cc_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-kube-state-metrics@sha256:4ff6cd48b319093041c2fa9c32ce16c6ea4dffb1c66ef4923f9cfc108cdfe6cc?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kube-state-metrics\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-logging-curator5@sha256:91942a469532fda2a4609f2d7ddf693cca5b2ccd8c770d0e36823f0cc67d884c_amd64", "product": { "name": "openshift4/ose-logging-curator5@sha256:91942a469532fda2a4609f2d7ddf693cca5b2ccd8c770d0e36823f0cc67d884c_amd64", "product_id": "openshift4/ose-logging-curator5@sha256:91942a469532fda2a4609f2d7ddf693cca5b2ccd8c770d0e36823f0cc67d884c_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-logging-curator5@sha256:91942a469532fda2a4609f2d7ddf693cca5b2ccd8c770d0e36823f0cc67d884c?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-logging-curator5\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-logging-elasticsearch5@sha256:c4693439c2f0f114238cc4034bfc6cd17f93bb9562ac2c0f9feb30f9c657fcd7_amd64", "product": { "name": "openshift4/ose-logging-elasticsearch5@sha256:c4693439c2f0f114238cc4034bfc6cd17f93bb9562ac2c0f9feb30f9c657fcd7_amd64", "product_id": "openshift4/ose-logging-elasticsearch5@sha256:c4693439c2f0f114238cc4034bfc6cd17f93bb9562ac2c0f9feb30f9c657fcd7_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-logging-elasticsearch5@sha256:c4693439c2f0f114238cc4034bfc6cd17f93bb9562ac2c0f9feb30f9c657fcd7?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-logging-elasticsearch5\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-logging-eventrouter@sha256:7668a706700163a35def516d1e1be336fef418ea477ef014ba90f5317569384b_amd64", "product": { "name": "openshift4/ose-logging-eventrouter@sha256:7668a706700163a35def516d1e1be336fef418ea477ef014ba90f5317569384b_amd64", "product_id": "openshift4/ose-logging-eventrouter@sha256:7668a706700163a35def516d1e1be336fef418ea477ef014ba90f5317569384b_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-logging-eventrouter@sha256:7668a706700163a35def516d1e1be336fef418ea477ef014ba90f5317569384b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-logging-eventrouter\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-logging-fluentd@sha256:3ef99bc79d891b111828c6c29faa8f3cd37d8ab8897186eff2bc85824939f632_amd64", "product": { "name": "openshift4/ose-logging-fluentd@sha256:3ef99bc79d891b111828c6c29faa8f3cd37d8ab8897186eff2bc85824939f632_amd64", "product_id": "openshift4/ose-logging-fluentd@sha256:3ef99bc79d891b111828c6c29faa8f3cd37d8ab8897186eff2bc85824939f632_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-logging-fluentd@sha256:3ef99bc79d891b111828c6c29faa8f3cd37d8ab8897186eff2bc85824939f632?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-logging-fluentd\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-operator-marketplace@sha256:3c5b9b86c9a9cd3c11290a44e29f016fe054b7068dd5b8469956909a63813db8_amd64", "product": { "name": "openshift4/ose-operator-marketplace@sha256:3c5b9b86c9a9cd3c11290a44e29f016fe054b7068dd5b8469956909a63813db8_amd64", "product_id": "openshift4/ose-operator-marketplace@sha256:3c5b9b86c9a9cd3c11290a44e29f016fe054b7068dd5b8469956909a63813db8_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-operator-marketplace@sha256:3c5b9b86c9a9cd3c11290a44e29f016fe054b7068dd5b8469956909a63813db8?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-marketplace\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-multus-cni@sha256:9be2123934d7f80af6439a84b5a9887459c1655549c7790fd080e965e89049b4_amd64", "product": { "name": "openshift4/ose-multus-cni@sha256:9be2123934d7f80af6439a84b5a9887459c1655549c7790fd080e965e89049b4_amd64", "product_id": "openshift4/ose-multus-cni@sha256:9be2123934d7f80af6439a84b5a9887459c1655549c7790fd080e965e89049b4_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-multus-cni@sha256:9be2123934d7f80af6439a84b5a9887459c1655549c7790fd080e965e89049b4?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-cni\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-ansible-operator@sha256:9469e5ed49937aeb64f0a3dbb5332f087c8498494127a5c507c02c3d4286afb1_amd64", "product": { "name": "openshift4/ose-ansible-operator@sha256:9469e5ed49937aeb64f0a3dbb5332f087c8498494127a5c507c02c3d4286afb1_amd64", "product_id": "openshift4/ose-ansible-operator@sha256:9469e5ed49937aeb64f0a3dbb5332f087c8498494127a5c507c02c3d4286afb1_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-ansible-operator@sha256:9469e5ed49937aeb64f0a3dbb5332f087c8498494127a5c507c02c3d4286afb1?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ansible-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/apb-base@sha256:183441575a8a0ba144fdd346e5ab560a067725a9b66d890493c326e14135512e_amd64", "product": { "name": "openshift4/apb-base@sha256:183441575a8a0ba144fdd346e5ab560a067725a9b66d890493c326e14135512e_amd64", "product_id": "openshift4/apb-base@sha256:183441575a8a0ba144fdd346e5ab560a067725a9b66d890493c326e14135512e_amd64", "product_identification_helper": { "purl": "pkg:oci/apb-base@sha256:183441575a8a0ba144fdd346e5ab560a067725a9b66d890493c326e14135512e?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/apb-base\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-docker-builder@sha256:25b131fc577def1179ce8a2022211d366fa461b6afef2f566b3f177930a3d0db_amd64", "product": { "name": "openshift4/ose-docker-builder@sha256:25b131fc577def1179ce8a2022211d366fa461b6afef2f566b3f177930a3d0db_amd64", "product_id": "openshift4/ose-docker-builder@sha256:25b131fc577def1179ce8a2022211d366fa461b6afef2f566b3f177930a3d0db_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-docker-builder@sha256:25b131fc577def1179ce8a2022211d366fa461b6afef2f566b3f177930a3d0db?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-docker-builder\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cli@sha256:bb846647aa233adddf5ed39056fdf98a7d9dc3abef4c985df3de698a44ecc7fd_amd64", "product": { "name": "openshift4/ose-cli@sha256:bb846647aa233adddf5ed39056fdf98a7d9dc3abef4c985df3de698a44ecc7fd_amd64", "product_id": "openshift4/ose-cli@sha256:bb846647aa233adddf5ed39056fdf98a7d9dc3abef4c985df3de698a44ecc7fd_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cli@sha256:bb846647aa233adddf5ed39056fdf98a7d9dc3abef4c985df3de698a44ecc7fd?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cli\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-capacity@sha256:24db95a9d24960c14775136419eed7dfddb7b7d70577fab77a63b64fc66d53a7_amd64", "product": { "name": "openshift4/ose-cluster-capacity@sha256:24db95a9d24960c14775136419eed7dfddb7b7d70577fab77a63b64fc66d53a7_amd64", "product_id": "openshift4/ose-cluster-capacity@sha256:24db95a9d24960c14775136419eed7dfddb7b7d70577fab77a63b64fc66d53a7_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-capacity@sha256:24db95a9d24960c14775136419eed7dfddb7b7d70577fab77a63b64fc66d53a7?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-capacity\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-console@sha256:68c4a7514623c31f7fdf7058a0dcd968dc4e4a63bcf0236ff21333bfb27cc4aa_amd64", "product": { "name": "openshift4/ose-console@sha256:68c4a7514623c31f7fdf7058a0dcd968dc4e4a63bcf0236ff21333bfb27cc4aa_amd64", "product_id": "openshift4/ose-console@sha256:68c4a7514623c31f7fdf7058a0dcd968dc4e4a63bcf0236ff21333bfb27cc4aa_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-console@sha256:68c4a7514623c31f7fdf7058a0dcd968dc4e4a63bcf0236ff21333bfb27cc4aa?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-console\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-console-operator@sha256:665d6d89d83c51de08526c08365317b3dbb9f20e1528ffb35697f6c8bd409ca3_amd64", "product": { "name": "openshift4/ose-console-operator@sha256:665d6d89d83c51de08526c08365317b3dbb9f20e1528ffb35697f6c8bd409ca3_amd64", "product_id": "openshift4/ose-console-operator@sha256:665d6d89d83c51de08526c08365317b3dbb9f20e1528ffb35697f6c8bd409ca3_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-console-operator@sha256:665d6d89d83c51de08526c08365317b3dbb9f20e1528ffb35697f6c8bd409ca3?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-console-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-deployer@sha256:ab62d8277ea2e69cf6697343c4b6bfef67f04c5f31cdf47fc510cb76969ca2ca_amd64", "product": { "name": "openshift4/ose-deployer@sha256:ab62d8277ea2e69cf6697343c4b6bfef67f04c5f31cdf47fc510cb76969ca2ca_amd64", "product_id": "openshift4/ose-deployer@sha256:ab62d8277ea2e69cf6697343c4b6bfef67f04c5f31cdf47fc510cb76969ca2ca_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-deployer@sha256:ab62d8277ea2e69cf6697343c4b6bfef67f04c5f31cdf47fc510cb76969ca2ca?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-deployer\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-egress-dns-proxy@sha256:2c00e51829c679d3573f813b0eced5c16382966ecf609915b47a8472872bbb64_amd64", "product": { "name": "openshift4/ose-egress-dns-proxy@sha256:2c00e51829c679d3573f813b0eced5c16382966ecf609915b47a8472872bbb64_amd64", "product_id": "openshift4/ose-egress-dns-proxy@sha256:2c00e51829c679d3573f813b0eced5c16382966ecf609915b47a8472872bbb64_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-egress-dns-proxy@sha256:2c00e51829c679d3573f813b0eced5c16382966ecf609915b47a8472872bbb64?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-egress-dns-proxy\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-egress-router@sha256:c46ed6f837821decadaaf07266b9d67f89b98621618bc073abdc38db51bc692a_amd64", "product": { "name": "openshift4/ose-egress-router@sha256:c46ed6f837821decadaaf07266b9d67f89b98621618bc073abdc38db51bc692a_amd64", "product_id": "openshift4/ose-egress-router@sha256:c46ed6f837821decadaaf07266b9d67f89b98621618bc073abdc38db51bc692a_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-egress-router@sha256:c46ed6f837821decadaaf07266b9d67f89b98621618bc073abdc38db51bc692a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-egress-router\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-haproxy-router@sha256:e0c7adba792e43e96c8d6f4e0845e2d001d0f652ece6f567b09ac481b07eafdc_amd64", "product": { "name": "openshift4/ose-haproxy-router@sha256:e0c7adba792e43e96c8d6f4e0845e2d001d0f652ece6f567b09ac481b07eafdc_amd64", "product_id": "openshift4/ose-haproxy-router@sha256:e0c7adba792e43e96c8d6f4e0845e2d001d0f652ece6f567b09ac481b07eafdc_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-haproxy-router@sha256:e0c7adba792e43e96c8d6f4e0845e2d001d0f652ece6f567b09ac481b07eafdc?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-haproxy-router\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-hyperkube@sha256:150fe3e51c75f09bd366d06a96749e17cd01aa845319032c327387950b52a34e_amd64", "product": { "name": "openshift4/ose-hyperkube@sha256:150fe3e51c75f09bd366d06a96749e17cd01aa845319032c327387950b52a34e_amd64", "product_id": "openshift4/ose-hyperkube@sha256:150fe3e51c75f09bd366d06a96749e17cd01aa845319032c327387950b52a34e_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-hyperkube@sha256:150fe3e51c75f09bd366d06a96749e17cd01aa845319032c327387950b52a34e?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-hyperkube\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-hypershift@sha256:48392b80092bca63f2969b14412017601ebfda1b54141db53c2bc5b2317c389a_amd64", "product": { "name": "openshift4/ose-hypershift@sha256:48392b80092bca63f2969b14412017601ebfda1b54141db53c2bc5b2317c389a_amd64", "product_id": "openshift4/ose-hypershift@sha256:48392b80092bca63f2969b14412017601ebfda1b54141db53c2bc5b2317c389a_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-hypershift@sha256:48392b80092bca63f2969b14412017601ebfda1b54141db53c2bc5b2317c389a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-hypershift\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-keepalived-ipfailover@sha256:1c0b3bde2963560aa0c50bd8365abd39bc5cfae28409fbdc60abf786546eb2e8_amd64", "product": { "name": "openshift4/ose-keepalived-ipfailover@sha256:1c0b3bde2963560aa0c50bd8365abd39bc5cfae28409fbdc60abf786546eb2e8_amd64", "product_id": "openshift4/ose-keepalived-ipfailover@sha256:1c0b3bde2963560aa0c50bd8365abd39bc5cfae28409fbdc60abf786546eb2e8_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-keepalived-ipfailover@sha256:1c0b3bde2963560aa0c50bd8365abd39bc5cfae28409fbdc60abf786546eb2e8?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-keepalived-ipfailover\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/mariadb-apb@sha256:a446829513325ac146b2aa1b555347b57a2377712df6cd8a431c1dbec0614331_amd64", "product": { "name": "openshift4/mariadb-apb@sha256:a446829513325ac146b2aa1b555347b57a2377712df6cd8a431c1dbec0614331_amd64", "product_id": "openshift4/mariadb-apb@sha256:a446829513325ac146b2aa1b555347b57a2377712df6cd8a431c1dbec0614331_amd64", "product_identification_helper": { "purl": "pkg:oci/mariadb-apb@sha256:a446829513325ac146b2aa1b555347b57a2377712df6cd8a431c1dbec0614331?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/mariadb-apb\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/mediawiki-apb@sha256:0a1ab047c6a93e3531f20673b275854361f36e2ebd4894b5ad1705c3dde42a76_amd64", "product": { "name": "openshift4/mediawiki-apb@sha256:0a1ab047c6a93e3531f20673b275854361f36e2ebd4894b5ad1705c3dde42a76_amd64", "product_id": "openshift4/mediawiki-apb@sha256:0a1ab047c6a93e3531f20673b275854361f36e2ebd4894b5ad1705c3dde42a76_amd64", "product_identification_helper": { "purl": "pkg:oci/mediawiki-apb@sha256:0a1ab047c6a93e3531f20673b275854361f36e2ebd4894b5ad1705c3dde42a76?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/mediawiki-apb\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/mediawiki@sha256:8014f0d73799f7f26b56a3d908b55de3103103f57a507d48fe9830c7d605f85d_amd64", "product": { "name": "openshift4/mediawiki@sha256:8014f0d73799f7f26b56a3d908b55de3103103f57a507d48fe9830c7d605f85d_amd64", "product_id": "openshift4/mediawiki@sha256:8014f0d73799f7f26b56a3d908b55de3103103f57a507d48fe9830c7d605f85d_amd64", "product_identification_helper": { "purl": "pkg:oci/mediawiki@sha256:8014f0d73799f7f26b56a3d908b55de3103103f57a507d48fe9830c7d605f85d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/mediawiki\u0026tag=v4.1.14-201909040920" } } }, { "category": "product_version", "name": "openshift4/mysql-apb@sha256:5772d2a584b96249c535df55b501ffe891162d7651b18244cdc16ab2f0d563dc_amd64", "product": { "name": "openshift4/mysql-apb@sha256:5772d2a584b96249c535df55b501ffe891162d7651b18244cdc16ab2f0d563dc_amd64", "product_id": "openshift4/mysql-apb@sha256:5772d2a584b96249c535df55b501ffe891162d7651b18244cdc16ab2f0d563dc_amd64", "product_identification_helper": { "purl": "pkg:oci/mysql-apb@sha256:5772d2a584b96249c535df55b501ffe891162d7651b18244cdc16ab2f0d563dc?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/mysql-apb\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-pod@sha256:40b2f3ff0b5ff873669613882579b2a714aed77e1fea4e28a26ebf2726177707_amd64", "product": { "name": "openshift4/ose-pod@sha256:40b2f3ff0b5ff873669613882579b2a714aed77e1fea4e28a26ebf2726177707_amd64", "product_id": "openshift4/ose-pod@sha256:40b2f3ff0b5ff873669613882579b2a714aed77e1fea4e28a26ebf2726177707_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-pod@sha256:40b2f3ff0b5ff873669613882579b2a714aed77e1fea4e28a26ebf2726177707?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-pod\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/postgresql-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64", "product": { "name": "openshift4/postgresql-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64", "product_id": "openshift4/postgresql-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64", "product_identification_helper": { "purl": "pkg:oci/postgresql-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/postgresql-apb\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/postgres-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64", "product": { "name": "openshift4/postgres-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64", "product_id": "openshift4/postgres-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64", "product_identification_helper": { "purl": "pkg:oci/postgres-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/postgres-apb\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-docker-registry@sha256:f7bd292dde7bd96195b313b4c459980fe8541bd89c442a4065a0114f42f3fe46_amd64", "product": { "name": "openshift4/ose-docker-registry@sha256:f7bd292dde7bd96195b313b4c459980fe8541bd89c442a4065a0114f42f3fe46_amd64", "product_id": "openshift4/ose-docker-registry@sha256:f7bd292dde7bd96195b313b4c459980fe8541bd89c442a4065a0114f42f3fe46_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-docker-registry@sha256:f7bd292dde7bd96195b313b4c459980fe8541bd89c442a4065a0114f42f3fe46?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-docker-registry\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-tests@sha256:28866a167dd7df474b053e92de3ba9bc0d95d918180b1e676637df30c2a27ef4_amd64", "product": { "name": "openshift4/ose-tests@sha256:28866a167dd7df474b053e92de3ba9bc0d95d918180b1e676637df30c2a27ef4_amd64", "product_id": "openshift4/ose-tests@sha256:28866a167dd7df474b053e92de3ba9bc0d95d918180b1e676637df30c2a27ef4_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-tests@sha256:28866a167dd7df474b053e92de3ba9bc0d95d918180b1e676637df30c2a27ef4?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-tests\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-jenkins@sha256:8da877d1df3fbb0fd4df607718847382d3ab38b862f868077c8938a1a7014f71_amd64", "product": { "name": "openshift4/ose-jenkins@sha256:8da877d1df3fbb0fd4df607718847382d3ab38b862f868077c8938a1a7014f71_amd64", "product_id": "openshift4/ose-jenkins@sha256:8da877d1df3fbb0fd4df607718847382d3ab38b862f868077c8938a1a7014f71_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-jenkins@sha256:8da877d1df3fbb0fd4df607718847382d3ab38b862f868077c8938a1a7014f71?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-operator-lifecycle-manager@sha256:9254b8d3097a0d067f07bcf735b3530eccc888466f99a6282aebb7bbdd9cbcc8_amd64", "product": { "name": "openshift4/ose-operator-lifecycle-manager@sha256:9254b8d3097a0d067f07bcf735b3530eccc888466f99a6282aebb7bbdd9cbcc8_amd64", "product_id": "openshift4/ose-operator-lifecycle-manager@sha256:9254b8d3097a0d067f07bcf735b3530eccc888466f99a6282aebb7bbdd9cbcc8_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-operator-lifecycle-manager@sha256:9254b8d3097a0d067f07bcf735b3530eccc888466f99a6282aebb7bbdd9cbcc8?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-lifecycle-manager\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-operator-registry@sha256:5eecc9d91c1ae4f0af586aa7d97fce8a32f23dfcdd64dcc61b9c536fbf4e8663_amd64", "product": { "name": "openshift4/ose-operator-registry@sha256:5eecc9d91c1ae4f0af586aa7d97fce8a32f23dfcdd64dcc61b9c536fbf4e8663_amd64", "product_id": "openshift4/ose-operator-registry@sha256:5eecc9d91c1ae4f0af586aa7d97fce8a32f23dfcdd64dcc61b9c536fbf4e8663_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-operator-registry@sha256:5eecc9d91c1ae4f0af586aa7d97fce8a32f23dfcdd64dcc61b9c536fbf4e8663?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-registry\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-aws-machine-controllers@sha256:e5f585aa452461ee95d55e84d81be54a82a458a54dbcad1f68a8f28edeb7638b_amd64", "product": { "name": "openshift4/ose-aws-machine-controllers@sha256:e5f585aa452461ee95d55e84d81be54a82a458a54dbcad1f68a8f28edeb7638b_amd64", "product_id": "openshift4/ose-aws-machine-controllers@sha256:e5f585aa452461ee95d55e84d81be54a82a458a54dbcad1f68a8f28edeb7638b_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-aws-machine-controllers@sha256:e5f585aa452461ee95d55e84d81be54a82a458a54dbcad1f68a8f28edeb7638b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-aws-machine-controllers\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-azure-machine-controllers@sha256:9f3199e5226fdcd5abe34a6f2e3a6ad7e7ad3f59edbff2bfd9b4c84566897eae_amd64", "product": { "name": "openshift4/ose-azure-machine-controllers@sha256:9f3199e5226fdcd5abe34a6f2e3a6ad7e7ad3f59edbff2bfd9b4c84566897eae_amd64", "product_id": "openshift4/ose-azure-machine-controllers@sha256:9f3199e5226fdcd5abe34a6f2e3a6ad7e7ad3f59edbff2bfd9b4c84566897eae_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-azure-machine-controllers@sha256:9f3199e5226fdcd5abe34a6f2e3a6ad7e7ad3f59edbff2bfd9b4c84566897eae?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-azure-machine-controllers\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cli-artifacts@sha256:bacaec21f6101ef686bb07b5d6e80b0b3ad06ab9a4d4f6e611ca3103c0030d7e_amd64", "product": { "name": "openshift4/ose-cli-artifacts@sha256:bacaec21f6101ef686bb07b5d6e80b0b3ad06ab9a4d4f6e611ca3103c0030d7e_amd64", "product_id": "openshift4/ose-cli-artifacts@sha256:bacaec21f6101ef686bb07b5d6e80b0b3ad06ab9a4d4f6e611ca3103c0030d7e_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cli-artifacts@sha256:bacaec21f6101ef686bb07b5d6e80b0b3ad06ab9a4d4f6e611ca3103c0030d7e?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cli-artifacts\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cloud-credential-operator@sha256:27c7bac07c2a2a38ddb65a9997b22946fbe37ddd06ecf52eccd0ef9235ae47ba_amd64", "product": { "name": "openshift4/ose-cloud-credential-operator@sha256:27c7bac07c2a2a38ddb65a9997b22946fbe37ddd06ecf52eccd0ef9235ae47ba_amd64", "product_id": "openshift4/ose-cloud-credential-operator@sha256:27c7bac07c2a2a38ddb65a9997b22946fbe37ddd06ecf52eccd0ef9235ae47ba_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cloud-credential-operator@sha256:27c7bac07c2a2a38ddb65a9997b22946fbe37ddd06ecf52eccd0ef9235ae47ba?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cloud-credential-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-authentication-operator@sha256:67dc9d9d90e5b37c73eda524a13e0bd98834b225adbfccc9d6c09a35a130c8f4_amd64", "product": { "name": "openshift4/ose-cluster-authentication-operator@sha256:67dc9d9d90e5b37c73eda524a13e0bd98834b225adbfccc9d6c09a35a130c8f4_amd64", "product_id": "openshift4/ose-cluster-authentication-operator@sha256:67dc9d9d90e5b37c73eda524a13e0bd98834b225adbfccc9d6c09a35a130c8f4_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-authentication-operator@sha256:67dc9d9d90e5b37c73eda524a13e0bd98834b225adbfccc9d6c09a35a130c8f4?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-authentication-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-autoscaler-operator@sha256:989948cb9998b518f3c325a2af3b24cfb7033ad2ac8be96cb3fafce2b4077435_amd64", "product": { "name": "openshift4/ose-cluster-autoscaler-operator@sha256:989948cb9998b518f3c325a2af3b24cfb7033ad2ac8be96cb3fafce2b4077435_amd64", "product_id": "openshift4/ose-cluster-autoscaler-operator@sha256:989948cb9998b518f3c325a2af3b24cfb7033ad2ac8be96cb3fafce2b4077435_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-autoscaler-operator@sha256:989948cb9998b518f3c325a2af3b24cfb7033ad2ac8be96cb3fafce2b4077435?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-autoscaler-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-bootstrap@sha256:9a676b7e363f022a511ab07ae81242b5c6d03523db11c37b0bf47e0f0324c9d8_amd64", "product": { "name": "openshift4/ose-cluster-bootstrap@sha256:9a676b7e363f022a511ab07ae81242b5c6d03523db11c37b0bf47e0f0324c9d8_amd64", "product_id": "openshift4/ose-cluster-bootstrap@sha256:9a676b7e363f022a511ab07ae81242b5c6d03523db11c37b0bf47e0f0324c9d8_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-bootstrap@sha256:9a676b7e363f022a511ab07ae81242b5c6d03523db11c37b0bf47e0f0324c9d8?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-bootstrap\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-config-operator@sha256:3b210b7313b4853f777d19248ba746b3d29251a3409124f984ae212809930427_amd64", "product": { "name": "openshift4/ose-cluster-config-operator@sha256:3b210b7313b4853f777d19248ba746b3d29251a3409124f984ae212809930427_amd64", "product_id": "openshift4/ose-cluster-config-operator@sha256:3b210b7313b4853f777d19248ba746b3d29251a3409124f984ae212809930427_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-config-operator@sha256:3b210b7313b4853f777d19248ba746b3d29251a3409124f984ae212809930427?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-config-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-dns-operator@sha256:5f70ba7ebcee1ecb9f65c8b43280935866607fc3dee6329ed473169f2acebe05_amd64", "product": { "name": "openshift4/ose-cluster-dns-operator@sha256:5f70ba7ebcee1ecb9f65c8b43280935866607fc3dee6329ed473169f2acebe05_amd64", "product_id": "openshift4/ose-cluster-dns-operator@sha256:5f70ba7ebcee1ecb9f65c8b43280935866607fc3dee6329ed473169f2acebe05_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-dns-operator@sha256:5f70ba7ebcee1ecb9f65c8b43280935866607fc3dee6329ed473169f2acebe05?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-dns-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-image-registry-operator@sha256:5c8fa5eb3828277f31ca0d4f7aedfee8e66dc0cfa3542772e6ac13c6b131644d_amd64", "product": { "name": "openshift4/ose-cluster-image-registry-operator@sha256:5c8fa5eb3828277f31ca0d4f7aedfee8e66dc0cfa3542772e6ac13c6b131644d_amd64", "product_id": "openshift4/ose-cluster-image-registry-operator@sha256:5c8fa5eb3828277f31ca0d4f7aedfee8e66dc0cfa3542772e6ac13c6b131644d_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-image-registry-operator@sha256:5c8fa5eb3828277f31ca0d4f7aedfee8e66dc0cfa3542772e6ac13c6b131644d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-image-registry-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-ingress-operator@sha256:b33e32eaac7d15947e32cbeb9d45e9ae3e6fbe470611ab78f28cfc99d8759b68_amd64", "product": { "name": "openshift4/ose-cluster-ingress-operator@sha256:b33e32eaac7d15947e32cbeb9d45e9ae3e6fbe470611ab78f28cfc99d8759b68_amd64", "product_id": "openshift4/ose-cluster-ingress-operator@sha256:b33e32eaac7d15947e32cbeb9d45e9ae3e6fbe470611ab78f28cfc99d8759b68_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-ingress-operator@sha256:b33e32eaac7d15947e32cbeb9d45e9ae3e6fbe470611ab78f28cfc99d8759b68?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-ingress-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:af88e84a2957ba9eeb1e5e3cdf9cf559ccb0de08d7a16c58a19c8eb805ba5a39_amd64", "product": { "name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:af88e84a2957ba9eeb1e5e3cdf9cf559ccb0de08d7a16c58a19c8eb805ba5a39_amd64", "product_id": "openshift4/ose-cluster-kube-apiserver-operator@sha256:af88e84a2957ba9eeb1e5e3cdf9cf559ccb0de08d7a16c58a19c8eb805ba5a39_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-apiserver-operator@sha256:af88e84a2957ba9eeb1e5e3cdf9cf559ccb0de08d7a16c58a19c8eb805ba5a39?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-apiserver-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:ca1e29c0c4eb029ed4d5544d5fde000000aa007f1d8e0fcf0fc0d317b5e06784_amd64", "product": { "name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:ca1e29c0c4eb029ed4d5544d5fde000000aa007f1d8e0fcf0fc0d317b5e06784_amd64", "product_id": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:ca1e29c0c4eb029ed4d5544d5fde000000aa007f1d8e0fcf0fc0d317b5e06784_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-controller-manager-operator@sha256:ca1e29c0c4eb029ed4d5544d5fde000000aa007f1d8e0fcf0fc0d317b5e06784?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-controller-manager-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:6f30eebebe4b774acd19eadeae80c4a7c8ccb503389c354bc76fc0f778cefe2b_amd64", "product": { "name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:6f30eebebe4b774acd19eadeae80c4a7c8ccb503389c354bc76fc0f778cefe2b_amd64", "product_id": "openshift4/ose-cluster-kube-scheduler-operator@sha256:6f30eebebe4b774acd19eadeae80c4a7c8ccb503389c354bc76fc0f778cefe2b_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-scheduler-operator@sha256:6f30eebebe4b774acd19eadeae80c4a7c8ccb503389c354bc76fc0f778cefe2b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-scheduler-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-machine-approver@sha256:3535b9ccd701ac3fa6b6a8339f6c10d6e74dd4d8f5f810690fa7e272ee82f837_amd64", "product": { "name": "openshift4/ose-cluster-machine-approver@sha256:3535b9ccd701ac3fa6b6a8339f6c10d6e74dd4d8f5f810690fa7e272ee82f837_amd64", "product_id": "openshift4/ose-cluster-machine-approver@sha256:3535b9ccd701ac3fa6b6a8339f6c10d6e74dd4d8f5f810690fa7e272ee82f837_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-machine-approver@sha256:3535b9ccd701ac3fa6b6a8339f6c10d6e74dd4d8f5f810690fa7e272ee82f837?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-machine-approver\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:1291555580ce58d7855c7b93ace6826cd2b1a22499fc5df3aad7d36a30b880ee_amd64", "product": { "name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:1291555580ce58d7855c7b93ace6826cd2b1a22499fc5df3aad7d36a30b880ee_amd64", "product_id": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:1291555580ce58d7855c7b93ace6826cd2b1a22499fc5df3aad7d36a30b880ee_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-openshift-apiserver-operator@sha256:1291555580ce58d7855c7b93ace6826cd2b1a22499fc5df3aad7d36a30b880ee?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-openshift-apiserver-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:3bdcfac3e9dcd30754f1e4158706bbcef77449fc3893521c86fd793cc1f7f32a_amd64", "product": { "name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:3bdcfac3e9dcd30754f1e4158706bbcef77449fc3893521c86fd793cc1f7f32a_amd64", "product_id": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:3bdcfac3e9dcd30754f1e4158706bbcef77449fc3893521c86fd793cc1f7f32a_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-openshift-controller-manager-operator@sha256:3bdcfac3e9dcd30754f1e4158706bbcef77449fc3893521c86fd793cc1f7f32a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-openshift-controller-manager-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-samples-operator@sha256:79ba26ee177bc7cd2ab89ddaa6c66b5dcfc6970dc457cc737d64b18b5d378637_amd64", "product": { "name": "openshift4/ose-cluster-samples-operator@sha256:79ba26ee177bc7cd2ab89ddaa6c66b5dcfc6970dc457cc737d64b18b5d378637_amd64", "product_id": "openshift4/ose-cluster-samples-operator@sha256:79ba26ee177bc7cd2ab89ddaa6c66b5dcfc6970dc457cc737d64b18b5d378637_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-samples-operator@sha256:79ba26ee177bc7cd2ab89ddaa6c66b5dcfc6970dc457cc737d64b18b5d378637?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-samples-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-storage-operator@sha256:95ad59eb2e2cc58f7ae6b850f648259687f266f05ac91166a39da6bf441e3e86_amd64", "product": { "name": "openshift4/ose-cluster-storage-operator@sha256:95ad59eb2e2cc58f7ae6b850f648259687f266f05ac91166a39da6bf441e3e86_amd64", "product_id": "openshift4/ose-cluster-storage-operator@sha256:95ad59eb2e2cc58f7ae6b850f648259687f266f05ac91166a39da6bf441e3e86_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-storage-operator@sha256:95ad59eb2e2cc58f7ae6b850f648259687f266f05ac91166a39da6bf441e3e86?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-storage-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-update-keys@sha256:f919d82bd99ecd768271c8ef7ad6bf6d2b5cb902410b93bbafc829c58b59a48f_amd64", "product": { "name": "openshift4/ose-cluster-update-keys@sha256:f919d82bd99ecd768271c8ef7ad6bf6d2b5cb902410b93bbafc829c58b59a48f_amd64", "product_id": "openshift4/ose-cluster-update-keys@sha256:f919d82bd99ecd768271c8ef7ad6bf6d2b5cb902410b93bbafc829c58b59a48f_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-update-keys@sha256:f919d82bd99ecd768271c8ef7ad6bf6d2b5cb902410b93bbafc829c58b59a48f?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-update-keys\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-egress-http-proxy@sha256:77ffd3c6dbb51743a13ce6a9cbd385602c24165848c205aca864b88af5b3c503_amd64", "product": { "name": "openshift4/ose-egress-http-proxy@sha256:77ffd3c6dbb51743a13ce6a9cbd385602c24165848c205aca864b88af5b3c503_amd64", "product_id": "openshift4/ose-egress-http-proxy@sha256:77ffd3c6dbb51743a13ce6a9cbd385602c24165848c205aca864b88af5b3c503_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-egress-http-proxy@sha256:77ffd3c6dbb51743a13ce6a9cbd385602c24165848c205aca864b88af5b3c503?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-egress-http-proxy\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-etcd@sha256:3df453713db7ea9a1bd8556a0a986fcd8d8c0a4649c262b9d8652ccfe648bb1e_amd64", "product": { "name": "openshift4/ose-etcd@sha256:3df453713db7ea9a1bd8556a0a986fcd8d8c0a4649c262b9d8652ccfe648bb1e_amd64", "product_id": "openshift4/ose-etcd@sha256:3df453713db7ea9a1bd8556a0a986fcd8d8c0a4649c262b9d8652ccfe648bb1e_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-etcd@sha256:3df453713db7ea9a1bd8556a0a986fcd8d8c0a4649c262b9d8652ccfe648bb1e?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-etcd\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-installer-artifacts@sha256:7f3e05fa013dead5501513b86c19719973d0f9ee5dbdd4d3f5264fe601dbf809_amd64", "product": { "name": "openshift4/ose-installer-artifacts@sha256:7f3e05fa013dead5501513b86c19719973d0f9ee5dbdd4d3f5264fe601dbf809_amd64", "product_id": "openshift4/ose-installer-artifacts@sha256:7f3e05fa013dead5501513b86c19719973d0f9ee5dbdd4d3f5264fe601dbf809_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-installer-artifacts@sha256:7f3e05fa013dead5501513b86c19719973d0f9ee5dbdd4d3f5264fe601dbf809?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-installer-artifacts\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-installer@sha256:7f0fb099018d7fba695adfff2c6cec1af789e3c3ccab61bb084a30ae1bdff79f_amd64", "product": { "name": "openshift4/ose-installer@sha256:7f0fb099018d7fba695adfff2c6cec1af789e3c3ccab61bb084a30ae1bdff79f_amd64", "product_id": "openshift4/ose-installer@sha256:7f0fb099018d7fba695adfff2c6cec1af789e3c3ccab61bb084a30ae1bdff79f_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-installer@sha256:7f0fb099018d7fba695adfff2c6cec1af789e3c3ccab61bb084a30ae1bdff79f?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-installer\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-libvirt-machine-controllers@sha256:2446ea720c26b213b9419bd2ad867c0ca1ec6df6d972cd5ffd6037b8fe0fbc88_amd64", "product": { "name": "openshift4/ose-libvirt-machine-controllers@sha256:2446ea720c26b213b9419bd2ad867c0ca1ec6df6d972cd5ffd6037b8fe0fbc88_amd64", "product_id": "openshift4/ose-libvirt-machine-controllers@sha256:2446ea720c26b213b9419bd2ad867c0ca1ec6df6d972cd5ffd6037b8fe0fbc88_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-libvirt-machine-controllers@sha256:2446ea720c26b213b9419bd2ad867c0ca1ec6df6d972cd5ffd6037b8fe0fbc88?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-libvirt-machine-controllers\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-machine-api-operator@sha256:6dfe7c13a6ae6c6e509f0d8cd0cb6e5284f9efd8cc2c949d87a471643e730957_amd64", "product": { "name": "openshift4/ose-machine-api-operator@sha256:6dfe7c13a6ae6c6e509f0d8cd0cb6e5284f9efd8cc2c949d87a471643e730957_amd64", "product_id": "openshift4/ose-machine-api-operator@sha256:6dfe7c13a6ae6c6e509f0d8cd0cb6e5284f9efd8cc2c949d87a471643e730957_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-machine-api-operator@sha256:6dfe7c13a6ae6c6e509f0d8cd0cb6e5284f9efd8cc2c949d87a471643e730957?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-machine-api-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-machine-config-operator@sha256:ebffd73f3e4ff92792bad0cfa5bba5bec17e2124c7618ae7c4bd49ac777b7deb_amd64", "product": { "name": "openshift4/ose-machine-config-operator@sha256:ebffd73f3e4ff92792bad0cfa5bba5bec17e2124c7618ae7c4bd49ac777b7deb_amd64", "product_id": "openshift4/ose-machine-config-operator@sha256:ebffd73f3e4ff92792bad0cfa5bba5bec17e2124c7618ae7c4bd49ac777b7deb_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-machine-config-operator@sha256:ebffd73f3e4ff92792bad0cfa5bba5bec17e2124c7618ae7c4bd49ac777b7deb?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-machine-config-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-multus-admission-controller@sha256:101d1c2eeebf1c5e336238056ff9415de50855363eebce3b75cf6ac562adca05_amd64", "product": { "name": "openshift4/ose-multus-admission-controller@sha256:101d1c2eeebf1c5e336238056ff9415de50855363eebce3b75cf6ac562adca05_amd64", "product_id": "openshift4/ose-multus-admission-controller@sha256:101d1c2eeebf1c5e336238056ff9415de50855363eebce3b75cf6ac562adca05_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-multus-admission-controller@sha256:101d1c2eeebf1c5e336238056ff9415de50855363eebce3b75cf6ac562adca05?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-admission-controller\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-must-gather@sha256:1acef66db6179f4289fc4abbb297df32c01d3b13fd85530ac6a0d925b517c3df_amd64", "product": { "name": "openshift4/ose-must-gather@sha256:1acef66db6179f4289fc4abbb297df32c01d3b13fd85530ac6a0d925b517c3df_amd64", "product_id": "openshift4/ose-must-gather@sha256:1acef66db6179f4289fc4abbb297df32c01d3b13fd85530ac6a0d925b517c3df_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-must-gather@sha256:1acef66db6179f4289fc4abbb297df32c01d3b13fd85530ac6a0d925b517c3df?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-must-gather\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-openstack-machine-controllers@sha256:1779881159f1548a75e4dfd8a285e6ecab2ceede42acd9d07f036ec28bf1e6f9_amd64", "product": { "name": "openshift4/ose-openstack-machine-controllers@sha256:1779881159f1548a75e4dfd8a285e6ecab2ceede42acd9d07f036ec28bf1e6f9_amd64", "product_id": "openshift4/ose-openstack-machine-controllers@sha256:1779881159f1548a75e4dfd8a285e6ecab2ceede42acd9d07f036ec28bf1e6f9_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-openstack-machine-controllers@sha256:1779881159f1548a75e4dfd8a285e6ecab2ceede42acd9d07f036ec28bf1e6f9?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-machine-controllers\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-ovn-kubernetes@sha256:d4234553bb7e59323ee19b5d87d189f78fb4cd747551af6a6413b88001e27e13_amd64", "product": { "name": "openshift4/ose-ovn-kubernetes@sha256:d4234553bb7e59323ee19b5d87d189f78fb4cd747551af6a6413b88001e27e13_amd64", "product_id": "openshift4/ose-ovn-kubernetes@sha256:d4234553bb7e59323ee19b5d87d189f78fb4cd747551af6a6413b88001e27e13_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-ovn-kubernetes@sha256:d4234553bb7e59323ee19b5d87d189f78fb4cd747551af6a6413b88001e27e13?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ovn-kubernetes\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-k8s-prometheus-adapter@sha256:95e7924437a3d110b334b1b03c01e2a65292f092110acde1a59db280ce8c7bda_amd64", "product": { "name": "openshift4/ose-k8s-prometheus-adapter@sha256:95e7924437a3d110b334b1b03c01e2a65292f092110acde1a59db280ce8c7bda_amd64", "product_id": "openshift4/ose-k8s-prometheus-adapter@sha256:95e7924437a3d110b334b1b03c01e2a65292f092110acde1a59db280ce8c7bda_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-k8s-prometheus-adapter@sha256:95e7924437a3d110b334b1b03c01e2a65292f092110acde1a59db280ce8c7bda?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-k8s-prometheus-adapter\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-service-ca-operator@sha256:ba2867ef0021af24b6667d114983400a0f7f5824842f1e11d1cda5aa91286737_amd64", "product": { "name": "openshift4/ose-service-ca-operator@sha256:ba2867ef0021af24b6667d114983400a0f7f5824842f1e11d1cda5aa91286737_amd64", "product_id": "openshift4/ose-service-ca-operator@sha256:ba2867ef0021af24b6667d114983400a0f7f5824842f1e11d1cda5aa91286737_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-service-ca-operator@sha256:ba2867ef0021af24b6667d114983400a0f7f5824842f1e11d1cda5aa91286737?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-service-ca-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-prometheus-config-reloader@sha256:6c0551dd87cc7eacc18ccbac093043b1178225f64843f13435f02ae7c2b4d91e_amd64", "product": { "name": "openshift4/ose-prometheus-config-reloader@sha256:6c0551dd87cc7eacc18ccbac093043b1178225f64843f13435f02ae7c2b4d91e_amd64", "product_id": "openshift4/ose-prometheus-config-reloader@sha256:6c0551dd87cc7eacc18ccbac093043b1178225f64843f13435f02ae7c2b4d91e_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-prometheus-config-reloader@sha256:6c0551dd87cc7eacc18ccbac093043b1178225f64843f13435f02ae7c2b4d91e?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-config-reloader\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-prometheus-operator@sha256:a5f9da1798e6b598157343e8751eda45ead551ddfb34ac5e742c6b1d8c8bf0d4_amd64", "product": { "name": "openshift4/ose-prometheus-operator@sha256:a5f9da1798e6b598157343e8751eda45ead551ddfb34ac5e742c6b1d8c8bf0d4_amd64", "product_id": "openshift4/ose-prometheus-operator@sha256:a5f9da1798e6b598157343e8751eda45ead551ddfb34ac5e742c6b1d8c8bf0d4_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-prometheus-operator@sha256:a5f9da1798e6b598157343e8751eda45ead551ddfb34ac5e742c6b1d8c8bf0d4?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-prom-label-proxy@sha256:c77261cc981cc8a5193ca1199c0a119db5757de135f4f7f5e558744371d2bd8a_amd64", "product": { "name": "openshift4/ose-prom-label-proxy@sha256:c77261cc981cc8a5193ca1199c0a119db5757de135f4f7f5e558744371d2bd8a_amd64", "product_id": "openshift4/ose-prom-label-proxy@sha256:c77261cc981cc8a5193ca1199c0a119db5757de135f4f7f5e558744371d2bd8a_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-prom-label-proxy@sha256:c77261cc981cc8a5193ca1199c0a119db5757de135f4f7f5e558744371d2bd8a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prom-label-proxy\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-cni@sha256:7a129a17d719761425ce26a47eaa115789be893f4a1054e37f3c76f891157886_amd64", "product": { "name": "openshift4/ose-sriov-cni@sha256:7a129a17d719761425ce26a47eaa115789be893f4a1054e37f3c76f891157886_amd64", "product_id": "openshift4/ose-sriov-cni@sha256:7a129a17d719761425ce26a47eaa115789be893f4a1054e37f3c76f891157886_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-cni@sha256:7a129a17d719761425ce26a47eaa115789be893f4a1054e37f3c76f891157886?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-cni\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-dp-admission-controller@sha256:e98327978a09c28baa5f10365d2df1e2c33bb689644d581aa6f7ff095e0c1c5d_amd64", "product": { "name": "openshift4/ose-sriov-dp-admission-controller@sha256:e98327978a09c28baa5f10365d2df1e2c33bb689644d581aa6f7ff095e0c1c5d_amd64", "product_id": "openshift4/ose-sriov-dp-admission-controller@sha256:e98327978a09c28baa5f10365d2df1e2c33bb689644d581aa6f7ff095e0c1c5d_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-dp-admission-controller@sha256:e98327978a09c28baa5f10365d2df1e2c33bb689644d581aa6f7ff095e0c1c5d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-dp-admission-controller\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-device-plugin@sha256:4dc4017eee056448d0192834de329c6563c48f625f21ca9db59b22d54db70de8_amd64", "product": { "name": "openshift4/ose-sriov-network-device-plugin@sha256:4dc4017eee056448d0192834de329c6563c48f625f21ca9db59b22d54db70de8_amd64", "product_id": "openshift4/ose-sriov-network-device-plugin@sha256:4dc4017eee056448d0192834de329c6563c48f625f21ca9db59b22d54db70de8_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-device-plugin@sha256:4dc4017eee056448d0192834de329c6563c48f625f21ca9db59b22d54db70de8?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-device-plugin\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-telemeter@sha256:5abb2f8cd1758441ba75e07e0a2f1180dbda0f13e6b51993d7c945b3d91b3bef_amd64", "product": { "name": "openshift4/ose-telemeter@sha256:5abb2f8cd1758441ba75e07e0a2f1180dbda0f13e6b51993d7c945b3d91b3bef_amd64", "product_id": "openshift4/ose-telemeter@sha256:5abb2f8cd1758441ba75e07e0a2f1180dbda0f13e6b51993d7c945b3d91b3bef_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-telemeter@sha256:5abb2f8cd1758441ba75e07e0a2f1180dbda0f13e6b51993d7c945b3d91b3bef?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-telemeter\u0026tag=v4.1.14-201908291507" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift4/apb-base@sha256:183441575a8a0ba144fdd346e5ab560a067725a9b66d890493c326e14135512e_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/apb-base@sha256:183441575a8a0ba144fdd346e5ab560a067725a9b66d890493c326e14135512e_amd64" }, "product_reference": "openshift4/apb-base@sha256:183441575a8a0ba144fdd346e5ab560a067725a9b66d890493c326e14135512e_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/mariadb-apb@sha256:a446829513325ac146b2aa1b555347b57a2377712df6cd8a431c1dbec0614331_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/mariadb-apb@sha256:a446829513325ac146b2aa1b555347b57a2377712df6cd8a431c1dbec0614331_amd64" }, "product_reference": "openshift4/mariadb-apb@sha256:a446829513325ac146b2aa1b555347b57a2377712df6cd8a431c1dbec0614331_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/mediawiki-apb@sha256:0a1ab047c6a93e3531f20673b275854361f36e2ebd4894b5ad1705c3dde42a76_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/mediawiki-apb@sha256:0a1ab047c6a93e3531f20673b275854361f36e2ebd4894b5ad1705c3dde42a76_amd64" }, "product_reference": "openshift4/mediawiki-apb@sha256:0a1ab047c6a93e3531f20673b275854361f36e2ebd4894b5ad1705c3dde42a76_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/mediawiki@sha256:8014f0d73799f7f26b56a3d908b55de3103103f57a507d48fe9830c7d605f85d_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/mediawiki@sha256:8014f0d73799f7f26b56a3d908b55de3103103f57a507d48fe9830c7d605f85d_amd64" }, "product_reference": "openshift4/mediawiki@sha256:8014f0d73799f7f26b56a3d908b55de3103103f57a507d48fe9830c7d605f85d_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/mysql-apb@sha256:5772d2a584b96249c535df55b501ffe891162d7651b18244cdc16ab2f0d563dc_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/mysql-apb@sha256:5772d2a584b96249c535df55b501ffe891162d7651b18244cdc16ab2f0d563dc_amd64" }, "product_reference": "openshift4/mysql-apb@sha256:5772d2a584b96249c535df55b501ffe891162d7651b18244cdc16ab2f0d563dc_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ansible-operator@sha256:9469e5ed49937aeb64f0a3dbb5332f087c8498494127a5c507c02c3d4286afb1_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-ansible-operator@sha256:9469e5ed49937aeb64f0a3dbb5332f087c8498494127a5c507c02c3d4286afb1_amd64" }, "product_reference": "openshift4/ose-ansible-operator@sha256:9469e5ed49937aeb64f0a3dbb5332f087c8498494127a5c507c02c3d4286afb1_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-aws-machine-controllers@sha256:e5f585aa452461ee95d55e84d81be54a82a458a54dbcad1f68a8f28edeb7638b_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-aws-machine-controllers@sha256:e5f585aa452461ee95d55e84d81be54a82a458a54dbcad1f68a8f28edeb7638b_amd64" }, "product_reference": "openshift4/ose-aws-machine-controllers@sha256:e5f585aa452461ee95d55e84d81be54a82a458a54dbcad1f68a8f28edeb7638b_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-azure-machine-controllers@sha256:9f3199e5226fdcd5abe34a6f2e3a6ad7e7ad3f59edbff2bfd9b4c84566897eae_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-azure-machine-controllers@sha256:9f3199e5226fdcd5abe34a6f2e3a6ad7e7ad3f59edbff2bfd9b4c84566897eae_amd64" }, "product_reference": "openshift4/ose-azure-machine-controllers@sha256:9f3199e5226fdcd5abe34a6f2e3a6ad7e7ad3f59edbff2bfd9b4c84566897eae_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-baremetal-machine-controllers@sha256:d9ca5e81aa2fb401f9c5bfb63e85fc5d93ae1e657ab992e879a2b9d520f3fea3_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-baremetal-machine-controllers@sha256:d9ca5e81aa2fb401f9c5bfb63e85fc5d93ae1e657ab992e879a2b9d520f3fea3_amd64" }, "product_reference": "openshift4/ose-baremetal-machine-controllers@sha256:d9ca5e81aa2fb401f9c5bfb63e85fc5d93ae1e657ab992e879a2b9d520f3fea3_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cli-artifacts@sha256:bacaec21f6101ef686bb07b5d6e80b0b3ad06ab9a4d4f6e611ca3103c0030d7e_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cli-artifacts@sha256:bacaec21f6101ef686bb07b5d6e80b0b3ad06ab9a4d4f6e611ca3103c0030d7e_amd64" }, "product_reference": "openshift4/ose-cli-artifacts@sha256:bacaec21f6101ef686bb07b5d6e80b0b3ad06ab9a4d4f6e611ca3103c0030d7e_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cli@sha256:bb846647aa233adddf5ed39056fdf98a7d9dc3abef4c985df3de698a44ecc7fd_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cli@sha256:bb846647aa233adddf5ed39056fdf98a7d9dc3abef4c985df3de698a44ecc7fd_amd64" }, "product_reference": "openshift4/ose-cli@sha256:bb846647aa233adddf5ed39056fdf98a7d9dc3abef4c985df3de698a44ecc7fd_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cloud-credential-operator@sha256:27c7bac07c2a2a38ddb65a9997b22946fbe37ddd06ecf52eccd0ef9235ae47ba_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cloud-credential-operator@sha256:27c7bac07c2a2a38ddb65a9997b22946fbe37ddd06ecf52eccd0ef9235ae47ba_amd64" }, "product_reference": "openshift4/ose-cloud-credential-operator@sha256:27c7bac07c2a2a38ddb65a9997b22946fbe37ddd06ecf52eccd0ef9235ae47ba_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-authentication-operator@sha256:67dc9d9d90e5b37c73eda524a13e0bd98834b225adbfccc9d6c09a35a130c8f4_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-authentication-operator@sha256:67dc9d9d90e5b37c73eda524a13e0bd98834b225adbfccc9d6c09a35a130c8f4_amd64" }, "product_reference": "openshift4/ose-cluster-authentication-operator@sha256:67dc9d9d90e5b37c73eda524a13e0bd98834b225adbfccc9d6c09a35a130c8f4_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-autoscaler-operator@sha256:989948cb9998b518f3c325a2af3b24cfb7033ad2ac8be96cb3fafce2b4077435_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-autoscaler-operator@sha256:989948cb9998b518f3c325a2af3b24cfb7033ad2ac8be96cb3fafce2b4077435_amd64" }, "product_reference": "openshift4/ose-cluster-autoscaler-operator@sha256:989948cb9998b518f3c325a2af3b24cfb7033ad2ac8be96cb3fafce2b4077435_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-autoscaler@sha256:b995c30d43493a8d393282c760584605951048dbe395eeac6b6b1bec269ff3ad_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-autoscaler@sha256:b995c30d43493a8d393282c760584605951048dbe395eeac6b6b1bec269ff3ad_amd64" }, "product_reference": "openshift4/ose-cluster-autoscaler@sha256:b995c30d43493a8d393282c760584605951048dbe395eeac6b6b1bec269ff3ad_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-bootstrap@sha256:9a676b7e363f022a511ab07ae81242b5c6d03523db11c37b0bf47e0f0324c9d8_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-bootstrap@sha256:9a676b7e363f022a511ab07ae81242b5c6d03523db11c37b0bf47e0f0324c9d8_amd64" }, "product_reference": "openshift4/ose-cluster-bootstrap@sha256:9a676b7e363f022a511ab07ae81242b5c6d03523db11c37b0bf47e0f0324c9d8_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-capacity@sha256:24db95a9d24960c14775136419eed7dfddb7b7d70577fab77a63b64fc66d53a7_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-capacity@sha256:24db95a9d24960c14775136419eed7dfddb7b7d70577fab77a63b64fc66d53a7_amd64" }, "product_reference": "openshift4/ose-cluster-capacity@sha256:24db95a9d24960c14775136419eed7dfddb7b7d70577fab77a63b64fc66d53a7_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-config-operator@sha256:3b210b7313b4853f777d19248ba746b3d29251a3409124f984ae212809930427_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-config-operator@sha256:3b210b7313b4853f777d19248ba746b3d29251a3409124f984ae212809930427_amd64" }, "product_reference": "openshift4/ose-cluster-config-operator@sha256:3b210b7313b4853f777d19248ba746b3d29251a3409124f984ae212809930427_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-dns-operator@sha256:5f70ba7ebcee1ecb9f65c8b43280935866607fc3dee6329ed473169f2acebe05_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-dns-operator@sha256:5f70ba7ebcee1ecb9f65c8b43280935866607fc3dee6329ed473169f2acebe05_amd64" }, "product_reference": "openshift4/ose-cluster-dns-operator@sha256:5f70ba7ebcee1ecb9f65c8b43280935866607fc3dee6329ed473169f2acebe05_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-image-registry-operator@sha256:5c8fa5eb3828277f31ca0d4f7aedfee8e66dc0cfa3542772e6ac13c6b131644d_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-image-registry-operator@sha256:5c8fa5eb3828277f31ca0d4f7aedfee8e66dc0cfa3542772e6ac13c6b131644d_amd64" }, "product_reference": "openshift4/ose-cluster-image-registry-operator@sha256:5c8fa5eb3828277f31ca0d4f7aedfee8e66dc0cfa3542772e6ac13c6b131644d_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-ingress-operator@sha256:b33e32eaac7d15947e32cbeb9d45e9ae3e6fbe470611ab78f28cfc99d8759b68_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-ingress-operator@sha256:b33e32eaac7d15947e32cbeb9d45e9ae3e6fbe470611ab78f28cfc99d8759b68_amd64" }, "product_reference": "openshift4/ose-cluster-ingress-operator@sha256:b33e32eaac7d15947e32cbeb9d45e9ae3e6fbe470611ab78f28cfc99d8759b68_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:af88e84a2957ba9eeb1e5e3cdf9cf559ccb0de08d7a16c58a19c8eb805ba5a39_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-apiserver-operator@sha256:af88e84a2957ba9eeb1e5e3cdf9cf559ccb0de08d7a16c58a19c8eb805ba5a39_amd64" }, "product_reference": "openshift4/ose-cluster-kube-apiserver-operator@sha256:af88e84a2957ba9eeb1e5e3cdf9cf559ccb0de08d7a16c58a19c8eb805ba5a39_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:ca1e29c0c4eb029ed4d5544d5fde000000aa007f1d8e0fcf0fc0d317b5e06784_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-controller-manager-operator@sha256:ca1e29c0c4eb029ed4d5544d5fde000000aa007f1d8e0fcf0fc0d317b5e06784_amd64" }, "product_reference": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:ca1e29c0c4eb029ed4d5544d5fde000000aa007f1d8e0fcf0fc0d317b5e06784_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:6f30eebebe4b774acd19eadeae80c4a7c8ccb503389c354bc76fc0f778cefe2b_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-scheduler-operator@sha256:6f30eebebe4b774acd19eadeae80c4a7c8ccb503389c354bc76fc0f778cefe2b_amd64" }, "product_reference": "openshift4/ose-cluster-kube-scheduler-operator@sha256:6f30eebebe4b774acd19eadeae80c4a7c8ccb503389c354bc76fc0f778cefe2b_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-logging-operator@sha256:7926e2be0854ff3edac0ced6950a0be04ad26d46a5da638611457c3fe0f1a19a_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-logging-operator@sha256:7926e2be0854ff3edac0ced6950a0be04ad26d46a5da638611457c3fe0f1a19a_amd64" }, "product_reference": "openshift4/ose-cluster-logging-operator@sha256:7926e2be0854ff3edac0ced6950a0be04ad26d46a5da638611457c3fe0f1a19a_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-machine-approver@sha256:3535b9ccd701ac3fa6b6a8339f6c10d6e74dd4d8f5f810690fa7e272ee82f837_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-machine-approver@sha256:3535b9ccd701ac3fa6b6a8339f6c10d6e74dd4d8f5f810690fa7e272ee82f837_amd64" }, "product_reference": "openshift4/ose-cluster-machine-approver@sha256:3535b9ccd701ac3fa6b6a8339f6c10d6e74dd4d8f5f810690fa7e272ee82f837_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-monitoring-operator@sha256:05d69056c09c34d095ccedc757ecf2692690c72d2bee4e6b6afc58b01ec55d9c_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-monitoring-operator@sha256:05d69056c09c34d095ccedc757ecf2692690c72d2bee4e6b6afc58b01ec55d9c_amd64" }, "product_reference": "openshift4/ose-cluster-monitoring-operator@sha256:05d69056c09c34d095ccedc757ecf2692690c72d2bee4e6b6afc58b01ec55d9c_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-network-operator@sha256:2561079cceff11035c216fea71c0a10622696266aa5a9323ef13806c91537a68_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-network-operator@sha256:2561079cceff11035c216fea71c0a10622696266aa5a9323ef13806c91537a68_amd64" }, "product_reference": "openshift4/ose-cluster-network-operator@sha256:2561079cceff11035c216fea71c0a10622696266aa5a9323ef13806c91537a68_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-node-tuning-operator@sha256:b6fa66947d674eb2fc12b38fb9355c43c57a484d85e56dd013960a760046b793_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-node-tuning-operator@sha256:b6fa66947d674eb2fc12b38fb9355c43c57a484d85e56dd013960a760046b793_amd64" }, "product_reference": "openshift4/ose-cluster-node-tuning-operator@sha256:b6fa66947d674eb2fc12b38fb9355c43c57a484d85e56dd013960a760046b793_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:1291555580ce58d7855c7b93ace6826cd2b1a22499fc5df3aad7d36a30b880ee_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-openshift-apiserver-operator@sha256:1291555580ce58d7855c7b93ace6826cd2b1a22499fc5df3aad7d36a30b880ee_amd64" }, "product_reference": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:1291555580ce58d7855c7b93ace6826cd2b1a22499fc5df3aad7d36a30b880ee_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:3bdcfac3e9dcd30754f1e4158706bbcef77449fc3893521c86fd793cc1f7f32a_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:3bdcfac3e9dcd30754f1e4158706bbcef77449fc3893521c86fd793cc1f7f32a_amd64" }, "product_reference": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:3bdcfac3e9dcd30754f1e4158706bbcef77449fc3893521c86fd793cc1f7f32a_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-samples-operator@sha256:79ba26ee177bc7cd2ab89ddaa6c66b5dcfc6970dc457cc737d64b18b5d378637_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-samples-operator@sha256:79ba26ee177bc7cd2ab89ddaa6c66b5dcfc6970dc457cc737d64b18b5d378637_amd64" }, "product_reference": "openshift4/ose-cluster-samples-operator@sha256:79ba26ee177bc7cd2ab89ddaa6c66b5dcfc6970dc457cc737d64b18b5d378637_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-storage-operator@sha256:95ad59eb2e2cc58f7ae6b850f648259687f266f05ac91166a39da6bf441e3e86_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-storage-operator@sha256:95ad59eb2e2cc58f7ae6b850f648259687f266f05ac91166a39da6bf441e3e86_amd64" }, "product_reference": "openshift4/ose-cluster-storage-operator@sha256:95ad59eb2e2cc58f7ae6b850f648259687f266f05ac91166a39da6bf441e3e86_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-update-keys@sha256:f919d82bd99ecd768271c8ef7ad6bf6d2b5cb902410b93bbafc829c58b59a48f_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-update-keys@sha256:f919d82bd99ecd768271c8ef7ad6bf6d2b5cb902410b93bbafc829c58b59a48f_amd64" }, "product_reference": "openshift4/ose-cluster-update-keys@sha256:f919d82bd99ecd768271c8ef7ad6bf6d2b5cb902410b93bbafc829c58b59a48f_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-version-operator@sha256:2d99cc15d95e08541d60ebc1966b534fda48d00ee69c7c226996ac407a813d6b_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-version-operator@sha256:2d99cc15d95e08541d60ebc1966b534fda48d00ee69c7c226996ac407a813d6b_amd64" }, "product_reference": "openshift4/ose-cluster-version-operator@sha256:2d99cc15d95e08541d60ebc1966b534fda48d00ee69c7c226996ac407a813d6b_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-configmap-reloader@sha256:84bb7a8504eb34ff5e4e9ca92aab960c078ededed07ab0fe79620c0b9f32a51f_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-configmap-reloader@sha256:84bb7a8504eb34ff5e4e9ca92aab960c078ededed07ab0fe79620c0b9f32a51f_amd64" }, "product_reference": "openshift4/ose-configmap-reloader@sha256:84bb7a8504eb34ff5e4e9ca92aab960c078ededed07ab0fe79620c0b9f32a51f_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-console-operator@sha256:665d6d89d83c51de08526c08365317b3dbb9f20e1528ffb35697f6c8bd409ca3_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-console-operator@sha256:665d6d89d83c51de08526c08365317b3dbb9f20e1528ffb35697f6c8bd409ca3_amd64" }, "product_reference": "openshift4/ose-console-operator@sha256:665d6d89d83c51de08526c08365317b3dbb9f20e1528ffb35697f6c8bd409ca3_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-console@sha256:68c4a7514623c31f7fdf7058a0dcd968dc4e4a63bcf0236ff21333bfb27cc4aa_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-console@sha256:68c4a7514623c31f7fdf7058a0dcd968dc4e4a63bcf0236ff21333bfb27cc4aa_amd64" }, "product_reference": "openshift4/ose-console@sha256:68c4a7514623c31f7fdf7058a0dcd968dc4e4a63bcf0236ff21333bfb27cc4aa_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-coredns@sha256:9a330c9540816c13ddbbc93e99107f3d2a194c79eae20d81e8b8d252e9282c14_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-coredns@sha256:9a330c9540816c13ddbbc93e99107f3d2a194c79eae20d81e8b8d252e9282c14_amd64" }, "product_reference": "openshift4/ose-coredns@sha256:9a330c9540816c13ddbbc93e99107f3d2a194c79eae20d81e8b8d252e9282c14_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-deployer@sha256:ab62d8277ea2e69cf6697343c4b6bfef67f04c5f31cdf47fc510cb76969ca2ca_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-deployer@sha256:ab62d8277ea2e69cf6697343c4b6bfef67f04c5f31cdf47fc510cb76969ca2ca_amd64" }, "product_reference": "openshift4/ose-deployer@sha256:ab62d8277ea2e69cf6697343c4b6bfef67f04c5f31cdf47fc510cb76969ca2ca_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-descheduler-operator@sha256:71ba5a71c71074c282634a6261825c57977abd4999cc03957b8c407808a72902_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-descheduler-operator@sha256:71ba5a71c71074c282634a6261825c57977abd4999cc03957b8c407808a72902_amd64" }, "product_reference": "openshift4/ose-descheduler-operator@sha256:71ba5a71c71074c282634a6261825c57977abd4999cc03957b8c407808a72902_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-descheduler@sha256:f7527c56780840d4062768e88f098229effd9796639ad67f6cdf841941a7e4a1_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-descheduler@sha256:f7527c56780840d4062768e88f098229effd9796639ad67f6cdf841941a7e4a1_amd64" }, "product_reference": "openshift4/ose-descheduler@sha256:f7527c56780840d4062768e88f098229effd9796639ad67f6cdf841941a7e4a1_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-docker-builder@sha256:25b131fc577def1179ce8a2022211d366fa461b6afef2f566b3f177930a3d0db_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-docker-builder@sha256:25b131fc577def1179ce8a2022211d366fa461b6afef2f566b3f177930a3d0db_amd64" }, "product_reference": "openshift4/ose-docker-builder@sha256:25b131fc577def1179ce8a2022211d366fa461b6afef2f566b3f177930a3d0db_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-docker-registry@sha256:f7bd292dde7bd96195b313b4c459980fe8541bd89c442a4065a0114f42f3fe46_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-docker-registry@sha256:f7bd292dde7bd96195b313b4c459980fe8541bd89c442a4065a0114f42f3fe46_amd64" }, "product_reference": "openshift4/ose-docker-registry@sha256:f7bd292dde7bd96195b313b4c459980fe8541bd89c442a4065a0114f42f3fe46_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-egress-dns-proxy@sha256:2c00e51829c679d3573f813b0eced5c16382966ecf609915b47a8472872bbb64_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-dns-proxy@sha256:2c00e51829c679d3573f813b0eced5c16382966ecf609915b47a8472872bbb64_amd64" }, "product_reference": "openshift4/ose-egress-dns-proxy@sha256:2c00e51829c679d3573f813b0eced5c16382966ecf609915b47a8472872bbb64_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-egress-http-proxy@sha256:77ffd3c6dbb51743a13ce6a9cbd385602c24165848c205aca864b88af5b3c503_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-http-proxy@sha256:77ffd3c6dbb51743a13ce6a9cbd385602c24165848c205aca864b88af5b3c503_amd64" }, "product_reference": "openshift4/ose-egress-http-proxy@sha256:77ffd3c6dbb51743a13ce6a9cbd385602c24165848c205aca864b88af5b3c503_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-egress-router@sha256:c46ed6f837821decadaaf07266b9d67f89b98621618bc073abdc38db51bc692a_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-router@sha256:c46ed6f837821decadaaf07266b9d67f89b98621618bc073abdc38db51bc692a_amd64" }, "product_reference": "openshift4/ose-egress-router@sha256:c46ed6f837821decadaaf07266b9d67f89b98621618bc073abdc38db51bc692a_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-elasticsearch-operator@sha256:6b153238aa96aa4128de68a8df8dde185ebb930d2cee6fe1c033ff7b713fb6f9_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-elasticsearch-operator@sha256:6b153238aa96aa4128de68a8df8dde185ebb930d2cee6fe1c033ff7b713fb6f9_amd64" }, "product_reference": "openshift4/ose-elasticsearch-operator@sha256:6b153238aa96aa4128de68a8df8dde185ebb930d2cee6fe1c033ff7b713fb6f9_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-etcd@sha256:3df453713db7ea9a1bd8556a0a986fcd8d8c0a4649c262b9d8652ccfe648bb1e_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-etcd@sha256:3df453713db7ea9a1bd8556a0a986fcd8d8c0a4649c262b9d8652ccfe648bb1e_amd64" }, "product_reference": "openshift4/ose-etcd@sha256:3df453713db7ea9a1bd8556a0a986fcd8d8c0a4649c262b9d8652ccfe648bb1e_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-grafana@sha256:4304ba0edd79f4b2b7b6f4766dd696e8fb21423ff0dc50a18388e2163d9df3de_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-grafana@sha256:4304ba0edd79f4b2b7b6f4766dd696e8fb21423ff0dc50a18388e2163d9df3de_amd64" }, "product_reference": "openshift4/ose-grafana@sha256:4304ba0edd79f4b2b7b6f4766dd696e8fb21423ff0dc50a18388e2163d9df3de_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-haproxy-router@sha256:e0c7adba792e43e96c8d6f4e0845e2d001d0f652ece6f567b09ac481b07eafdc_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-haproxy-router@sha256:e0c7adba792e43e96c8d6f4e0845e2d001d0f652ece6f567b09ac481b07eafdc_amd64" }, "product_reference": "openshift4/ose-haproxy-router@sha256:e0c7adba792e43e96c8d6f4e0845e2d001d0f652ece6f567b09ac481b07eafdc_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-hyperkube@sha256:150fe3e51c75f09bd366d06a96749e17cd01aa845319032c327387950b52a34e_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-hyperkube@sha256:150fe3e51c75f09bd366d06a96749e17cd01aa845319032c327387950b52a34e_amd64" }, "product_reference": "openshift4/ose-hyperkube@sha256:150fe3e51c75f09bd366d06a96749e17cd01aa845319032c327387950b52a34e_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-hypershift@sha256:48392b80092bca63f2969b14412017601ebfda1b54141db53c2bc5b2317c389a_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-hypershift@sha256:48392b80092bca63f2969b14412017601ebfda1b54141db53c2bc5b2317c389a_amd64" }, "product_reference": "openshift4/ose-hypershift@sha256:48392b80092bca63f2969b14412017601ebfda1b54141db53c2bc5b2317c389a_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-installer-artifacts@sha256:7f3e05fa013dead5501513b86c19719973d0f9ee5dbdd4d3f5264fe601dbf809_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-installer-artifacts@sha256:7f3e05fa013dead5501513b86c19719973d0f9ee5dbdd4d3f5264fe601dbf809_amd64" }, "product_reference": "openshift4/ose-installer-artifacts@sha256:7f3e05fa013dead5501513b86c19719973d0f9ee5dbdd4d3f5264fe601dbf809_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-installer@sha256:7f0fb099018d7fba695adfff2c6cec1af789e3c3ccab61bb084a30ae1bdff79f_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-installer@sha256:7f0fb099018d7fba695adfff2c6cec1af789e3c3ccab61bb084a30ae1bdff79f_amd64" }, "product_reference": "openshift4/ose-installer@sha256:7f0fb099018d7fba695adfff2c6cec1af789e3c3ccab61bb084a30ae1bdff79f_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins-agent-base@sha256:c29122b0ed52c031f5f99ddb3338b6515bc05ac1e90864dda1131dcf9af87924_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins-agent-base@sha256:c29122b0ed52c031f5f99ddb3338b6515bc05ac1e90864dda1131dcf9af87924_amd64" }, "product_reference": "openshift4/ose-jenkins-agent-base@sha256:c29122b0ed52c031f5f99ddb3338b6515bc05ac1e90864dda1131dcf9af87924_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins-agent-maven@sha256:ce5dd50d7005ed2d5ef36de673a2cf2cec07ad997ed93956605fe8fc8836d15c_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins-agent-maven@sha256:ce5dd50d7005ed2d5ef36de673a2cf2cec07ad997ed93956605fe8fc8836d15c_amd64" }, "product_reference": "openshift4/ose-jenkins-agent-maven@sha256:ce5dd50d7005ed2d5ef36de673a2cf2cec07ad997ed93956605fe8fc8836d15c_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins@sha256:8da877d1df3fbb0fd4df607718847382d3ab38b862f868077c8938a1a7014f71_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins@sha256:8da877d1df3fbb0fd4df607718847382d3ab38b862f868077c8938a1a7014f71_amd64" }, "product_reference": "openshift4/ose-jenkins@sha256:8da877d1df3fbb0fd4df607718847382d3ab38b862f868077c8938a1a7014f71_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-k8s-prometheus-adapter@sha256:95e7924437a3d110b334b1b03c01e2a65292f092110acde1a59db280ce8c7bda_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-k8s-prometheus-adapter@sha256:95e7924437a3d110b334b1b03c01e2a65292f092110acde1a59db280ce8c7bda_amd64" }, "product_reference": "openshift4/ose-k8s-prometheus-adapter@sha256:95e7924437a3d110b334b1b03c01e2a65292f092110acde1a59db280ce8c7bda_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-keepalived-ipfailover@sha256:1c0b3bde2963560aa0c50bd8365abd39bc5cfae28409fbdc60abf786546eb2e8_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-keepalived-ipfailover@sha256:1c0b3bde2963560aa0c50bd8365abd39bc5cfae28409fbdc60abf786546eb2e8_amd64" }, "product_reference": "openshift4/ose-keepalived-ipfailover@sha256:1c0b3bde2963560aa0c50bd8365abd39bc5cfae28409fbdc60abf786546eb2e8_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kube-proxy@sha256:3afce3e28952226f1bb959b2859050e848ed5d4549ac5e2fc267f51b11fc6ec3_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-proxy@sha256:3afce3e28952226f1bb959b2859050e848ed5d4549ac5e2fc267f51b11fc6ec3_amd64" }, "product_reference": "openshift4/ose-kube-proxy@sha256:3afce3e28952226f1bb959b2859050e848ed5d4549ac5e2fc267f51b11fc6ec3_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kube-rbac-proxy@sha256:dab4af2713fa59499ee8d2cb169d636ddb425590e6924bc2c03597c0b10bd246_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-rbac-proxy@sha256:dab4af2713fa59499ee8d2cb169d636ddb425590e6924bc2c03597c0b10bd246_amd64" }, "product_reference": "openshift4/ose-kube-rbac-proxy@sha256:dab4af2713fa59499ee8d2cb169d636ddb425590e6924bc2c03597c0b10bd246_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kube-state-metrics@sha256:4ff6cd48b319093041c2fa9c32ce16c6ea4dffb1c66ef4923f9cfc108cdfe6cc_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-state-metrics@sha256:4ff6cd48b319093041c2fa9c32ce16c6ea4dffb1c66ef4923f9cfc108cdfe6cc_amd64" }, "product_reference": "openshift4/ose-kube-state-metrics@sha256:4ff6cd48b319093041c2fa9c32ce16c6ea4dffb1c66ef4923f9cfc108cdfe6cc_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-libvirt-machine-controllers@sha256:2446ea720c26b213b9419bd2ad867c0ca1ec6df6d972cd5ffd6037b8fe0fbc88_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-libvirt-machine-controllers@sha256:2446ea720c26b213b9419bd2ad867c0ca1ec6df6d972cd5ffd6037b8fe0fbc88_amd64" }, "product_reference": "openshift4/ose-libvirt-machine-controllers@sha256:2446ea720c26b213b9419bd2ad867c0ca1ec6df6d972cd5ffd6037b8fe0fbc88_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-logging-curator5@sha256:91942a469532fda2a4609f2d7ddf693cca5b2ccd8c770d0e36823f0cc67d884c_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-curator5@sha256:91942a469532fda2a4609f2d7ddf693cca5b2ccd8c770d0e36823f0cc67d884c_amd64" }, "product_reference": "openshift4/ose-logging-curator5@sha256:91942a469532fda2a4609f2d7ddf693cca5b2ccd8c770d0e36823f0cc67d884c_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-logging-elasticsearch5@sha256:c4693439c2f0f114238cc4034bfc6cd17f93bb9562ac2c0f9feb30f9c657fcd7_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-elasticsearch5@sha256:c4693439c2f0f114238cc4034bfc6cd17f93bb9562ac2c0f9feb30f9c657fcd7_amd64" }, "product_reference": "openshift4/ose-logging-elasticsearch5@sha256:c4693439c2f0f114238cc4034bfc6cd17f93bb9562ac2c0f9feb30f9c657fcd7_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-logging-eventrouter@sha256:7668a706700163a35def516d1e1be336fef418ea477ef014ba90f5317569384b_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-eventrouter@sha256:7668a706700163a35def516d1e1be336fef418ea477ef014ba90f5317569384b_amd64" }, "product_reference": "openshift4/ose-logging-eventrouter@sha256:7668a706700163a35def516d1e1be336fef418ea477ef014ba90f5317569384b_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-logging-fluentd@sha256:3ef99bc79d891b111828c6c29faa8f3cd37d8ab8897186eff2bc85824939f632_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-fluentd@sha256:3ef99bc79d891b111828c6c29faa8f3cd37d8ab8897186eff2bc85824939f632_amd64" }, "product_reference": "openshift4/ose-logging-fluentd@sha256:3ef99bc79d891b111828c6c29faa8f3cd37d8ab8897186eff2bc85824939f632_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-machine-api-operator@sha256:6dfe7c13a6ae6c6e509f0d8cd0cb6e5284f9efd8cc2c949d87a471643e730957_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-machine-api-operator@sha256:6dfe7c13a6ae6c6e509f0d8cd0cb6e5284f9efd8cc2c949d87a471643e730957_amd64" }, "product_reference": "openshift4/ose-machine-api-operator@sha256:6dfe7c13a6ae6c6e509f0d8cd0cb6e5284f9efd8cc2c949d87a471643e730957_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-machine-config-operator@sha256:ebffd73f3e4ff92792bad0cfa5bba5bec17e2124c7618ae7c4bd49ac777b7deb_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-machine-config-operator@sha256:ebffd73f3e4ff92792bad0cfa5bba5bec17e2124c7618ae7c4bd49ac777b7deb_amd64" }, "product_reference": "openshift4/ose-machine-config-operator@sha256:ebffd73f3e4ff92792bad0cfa5bba5bec17e2124c7618ae7c4bd49ac777b7deb_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-admission-controller@sha256:101d1c2eeebf1c5e336238056ff9415de50855363eebce3b75cf6ac562adca05_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-admission-controller@sha256:101d1c2eeebf1c5e336238056ff9415de50855363eebce3b75cf6ac562adca05_amd64" }, "product_reference": "openshift4/ose-multus-admission-controller@sha256:101d1c2eeebf1c5e336238056ff9415de50855363eebce3b75cf6ac562adca05_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-cni@sha256:9be2123934d7f80af6439a84b5a9887459c1655549c7790fd080e965e89049b4_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-cni@sha256:9be2123934d7f80af6439a84b5a9887459c1655549c7790fd080e965e89049b4_amd64" }, "product_reference": "openshift4/ose-multus-cni@sha256:9be2123934d7f80af6439a84b5a9887459c1655549c7790fd080e965e89049b4_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-must-gather@sha256:1acef66db6179f4289fc4abbb297df32c01d3b13fd85530ac6a0d925b517c3df_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-must-gather@sha256:1acef66db6179f4289fc4abbb297df32c01d3b13fd85530ac6a0d925b517c3df_amd64" }, "product_reference": "openshift4/ose-must-gather@sha256:1acef66db6179f4289fc4abbb297df32c01d3b13fd85530ac6a0d925b517c3df_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-oauth-proxy@sha256:383360705efc0605760c3b2b1d0fa288094eb6dad8158c540d950f661b4ba880_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-oauth-proxy@sha256:383360705efc0605760c3b2b1d0fa288094eb6dad8158c540d950f661b4ba880_amd64" }, "product_reference": "openshift4/ose-oauth-proxy@sha256:383360705efc0605760c3b2b1d0fa288094eb6dad8158c540d950f661b4ba880_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openstack-machine-controllers@sha256:1779881159f1548a75e4dfd8a285e6ecab2ceede42acd9d07f036ec28bf1e6f9_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-openstack-machine-controllers@sha256:1779881159f1548a75e4dfd8a285e6ecab2ceede42acd9d07f036ec28bf1e6f9_amd64" }, "product_reference": "openshift4/ose-openstack-machine-controllers@sha256:1779881159f1548a75e4dfd8a285e6ecab2ceede42acd9d07f036ec28bf1e6f9_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-lifecycle-manager@sha256:9254b8d3097a0d067f07bcf735b3530eccc888466f99a6282aebb7bbdd9cbcc8_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-lifecycle-manager@sha256:9254b8d3097a0d067f07bcf735b3530eccc888466f99a6282aebb7bbdd9cbcc8_amd64" }, "product_reference": "openshift4/ose-operator-lifecycle-manager@sha256:9254b8d3097a0d067f07bcf735b3530eccc888466f99a6282aebb7bbdd9cbcc8_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-marketplace@sha256:3c5b9b86c9a9cd3c11290a44e29f016fe054b7068dd5b8469956909a63813db8_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-marketplace@sha256:3c5b9b86c9a9cd3c11290a44e29f016fe054b7068dd5b8469956909a63813db8_amd64" }, "product_reference": "openshift4/ose-operator-marketplace@sha256:3c5b9b86c9a9cd3c11290a44e29f016fe054b7068dd5b8469956909a63813db8_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-registry@sha256:5eecc9d91c1ae4f0af586aa7d97fce8a32f23dfcdd64dcc61b9c536fbf4e8663_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-registry@sha256:5eecc9d91c1ae4f0af586aa7d97fce8a32f23dfcdd64dcc61b9c536fbf4e8663_amd64" }, "product_reference": "openshift4/ose-operator-registry@sha256:5eecc9d91c1ae4f0af586aa7d97fce8a32f23dfcdd64dcc61b9c536fbf4e8663_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ovn-kubernetes@sha256:d4234553bb7e59323ee19b5d87d189f78fb4cd747551af6a6413b88001e27e13_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-ovn-kubernetes@sha256:d4234553bb7e59323ee19b5d87d189f78fb4cd747551af6a6413b88001e27e13_amd64" }, "product_reference": "openshift4/ose-ovn-kubernetes@sha256:d4234553bb7e59323ee19b5d87d189f78fb4cd747551af6a6413b88001e27e13_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-pod@sha256:40b2f3ff0b5ff873669613882579b2a714aed77e1fea4e28a26ebf2726177707_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-pod@sha256:40b2f3ff0b5ff873669613882579b2a714aed77e1fea4e28a26ebf2726177707_amd64" }, "product_reference": "openshift4/ose-pod@sha256:40b2f3ff0b5ff873669613882579b2a714aed77e1fea4e28a26ebf2726177707_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prom-label-proxy@sha256:c77261cc981cc8a5193ca1199c0a119db5757de135f4f7f5e558744371d2bd8a_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-prom-label-proxy@sha256:c77261cc981cc8a5193ca1199c0a119db5757de135f4f7f5e558744371d2bd8a_amd64" }, "product_reference": "openshift4/ose-prom-label-proxy@sha256:c77261cc981cc8a5193ca1199c0a119db5757de135f4f7f5e558744371d2bd8a_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus-alertmanager@sha256:ef6c822baa9167856e613e7f1c14a1b44da42a394d91b9e0407d01d769a8fb40_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-alertmanager@sha256:ef6c822baa9167856e613e7f1c14a1b44da42a394d91b9e0407d01d769a8fb40_amd64" }, "product_reference": "openshift4/ose-prometheus-alertmanager@sha256:ef6c822baa9167856e613e7f1c14a1b44da42a394d91b9e0407d01d769a8fb40_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus-config-reloader@sha256:6c0551dd87cc7eacc18ccbac093043b1178225f64843f13435f02ae7c2b4d91e_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-config-reloader@sha256:6c0551dd87cc7eacc18ccbac093043b1178225f64843f13435f02ae7c2b4d91e_amd64" }, "product_reference": "openshift4/ose-prometheus-config-reloader@sha256:6c0551dd87cc7eacc18ccbac093043b1178225f64843f13435f02ae7c2b4d91e_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus-node-exporter@sha256:56c31eb82f202b0ab38bc600ef01ef68302a0a57b7274c9537d3518855e2da1d_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-node-exporter@sha256:56c31eb82f202b0ab38bc600ef01ef68302a0a57b7274c9537d3518855e2da1d_amd64" }, "product_reference": "openshift4/ose-prometheus-node-exporter@sha256:56c31eb82f202b0ab38bc600ef01ef68302a0a57b7274c9537d3518855e2da1d_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus-operator@sha256:a5f9da1798e6b598157343e8751eda45ead551ddfb34ac5e742c6b1d8c8bf0d4_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-operator@sha256:a5f9da1798e6b598157343e8751eda45ead551ddfb34ac5e742c6b1d8c8bf0d4_amd64" }, "product_reference": "openshift4/ose-prometheus-operator@sha256:a5f9da1798e6b598157343e8751eda45ead551ddfb34ac5e742c6b1d8c8bf0d4_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus@sha256:38e663d919d2c96af52656b42d18556cf457b84ef3160e27496f6db36ffa92a3_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus@sha256:38e663d919d2c96af52656b42d18556cf457b84ef3160e27496f6db36ffa92a3_amd64" }, "product_reference": "openshift4/ose-prometheus@sha256:38e663d919d2c96af52656b42d18556cf457b84ef3160e27496f6db36ffa92a3_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-service-ca-operator@sha256:ba2867ef0021af24b6667d114983400a0f7f5824842f1e11d1cda5aa91286737_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-service-ca-operator@sha256:ba2867ef0021af24b6667d114983400a0f7f5824842f1e11d1cda5aa91286737_amd64" }, "product_reference": "openshift4/ose-service-ca-operator@sha256:ba2867ef0021af24b6667d114983400a0f7f5824842f1e11d1cda5aa91286737_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-cni@sha256:7a129a17d719761425ce26a47eaa115789be893f4a1054e37f3c76f891157886_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-cni@sha256:7a129a17d719761425ce26a47eaa115789be893f4a1054e37f3c76f891157886_amd64" }, "product_reference": "openshift4/ose-sriov-cni@sha256:7a129a17d719761425ce26a47eaa115789be893f4a1054e37f3c76f891157886_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-dp-admission-controller@sha256:e98327978a09c28baa5f10365d2df1e2c33bb689644d581aa6f7ff095e0c1c5d_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-dp-admission-controller@sha256:e98327978a09c28baa5f10365d2df1e2c33bb689644d581aa6f7ff095e0c1c5d_amd64" }, "product_reference": "openshift4/ose-sriov-dp-admission-controller@sha256:e98327978a09c28baa5f10365d2df1e2c33bb689644d581aa6f7ff095e0c1c5d_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-device-plugin@sha256:4dc4017eee056448d0192834de329c6563c48f625f21ca9db59b22d54db70de8_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-network-device-plugin@sha256:4dc4017eee056448d0192834de329c6563c48f625f21ca9db59b22d54db70de8_amd64" }, "product_reference": "openshift4/ose-sriov-network-device-plugin@sha256:4dc4017eee056448d0192834de329c6563c48f625f21ca9db59b22d54db70de8_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-telemeter@sha256:5abb2f8cd1758441ba75e07e0a2f1180dbda0f13e6b51993d7c945b3d91b3bef_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-telemeter@sha256:5abb2f8cd1758441ba75e07e0a2f1180dbda0f13e6b51993d7c945b3d91b3bef_amd64" }, "product_reference": "openshift4/ose-telemeter@sha256:5abb2f8cd1758441ba75e07e0a2f1180dbda0f13e6b51993d7c945b3d91b3bef_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-tests@sha256:28866a167dd7df474b053e92de3ba9bc0d95d918180b1e676637df30c2a27ef4_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-tests@sha256:28866a167dd7df474b053e92de3ba9bc0d95d918180b1e676637df30c2a27ef4_amd64" }, "product_reference": "openshift4/ose-tests@sha256:28866a167dd7df474b053e92de3ba9bc0d95d918180b1e676637df30c2a27ef4_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/postgres-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/postgres-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64" }, "product_reference": "openshift4/postgres-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/postgresql-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/postgresql-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64" }, "product_reference": "openshift4/postgresql-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.1:openshift4/apb-base@sha256:183441575a8a0ba144fdd346e5ab560a067725a9b66d890493c326e14135512e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mariadb-apb@sha256:a446829513325ac146b2aa1b555347b57a2377712df6cd8a431c1dbec0614331_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mediawiki-apb@sha256:0a1ab047c6a93e3531f20673b275854361f36e2ebd4894b5ad1705c3dde42a76_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mediawiki@sha256:8014f0d73799f7f26b56a3d908b55de3103103f57a507d48fe9830c7d605f85d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mysql-apb@sha256:5772d2a584b96249c535df55b501ffe891162d7651b18244cdc16ab2f0d563dc_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-ansible-operator@sha256:9469e5ed49937aeb64f0a3dbb5332f087c8498494127a5c507c02c3d4286afb1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-aws-machine-controllers@sha256:e5f585aa452461ee95d55e84d81be54a82a458a54dbcad1f68a8f28edeb7638b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-azure-machine-controllers@sha256:9f3199e5226fdcd5abe34a6f2e3a6ad7e7ad3f59edbff2bfd9b4c84566897eae_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-baremetal-machine-controllers@sha256:d9ca5e81aa2fb401f9c5bfb63e85fc5d93ae1e657ab992e879a2b9d520f3fea3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cli-artifacts@sha256:bacaec21f6101ef686bb07b5d6e80b0b3ad06ab9a4d4f6e611ca3103c0030d7e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cli@sha256:bb846647aa233adddf5ed39056fdf98a7d9dc3abef4c985df3de698a44ecc7fd_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cloud-credential-operator@sha256:27c7bac07c2a2a38ddb65a9997b22946fbe37ddd06ecf52eccd0ef9235ae47ba_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-authentication-operator@sha256:67dc9d9d90e5b37c73eda524a13e0bd98834b225adbfccc9d6c09a35a130c8f4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-autoscaler-operator@sha256:989948cb9998b518f3c325a2af3b24cfb7033ad2ac8be96cb3fafce2b4077435_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-autoscaler@sha256:b995c30d43493a8d393282c760584605951048dbe395eeac6b6b1bec269ff3ad_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-bootstrap@sha256:9a676b7e363f022a511ab07ae81242b5c6d03523db11c37b0bf47e0f0324c9d8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-capacity@sha256:24db95a9d24960c14775136419eed7dfddb7b7d70577fab77a63b64fc66d53a7_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-config-operator@sha256:3b210b7313b4853f777d19248ba746b3d29251a3409124f984ae212809930427_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-dns-operator@sha256:5f70ba7ebcee1ecb9f65c8b43280935866607fc3dee6329ed473169f2acebe05_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-image-registry-operator@sha256:5c8fa5eb3828277f31ca0d4f7aedfee8e66dc0cfa3542772e6ac13c6b131644d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-ingress-operator@sha256:b33e32eaac7d15947e32cbeb9d45e9ae3e6fbe470611ab78f28cfc99d8759b68_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-apiserver-operator@sha256:af88e84a2957ba9eeb1e5e3cdf9cf559ccb0de08d7a16c58a19c8eb805ba5a39_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-controller-manager-operator@sha256:ca1e29c0c4eb029ed4d5544d5fde000000aa007f1d8e0fcf0fc0d317b5e06784_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-scheduler-operator@sha256:6f30eebebe4b774acd19eadeae80c4a7c8ccb503389c354bc76fc0f778cefe2b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-logging-operator@sha256:7926e2be0854ff3edac0ced6950a0be04ad26d46a5da638611457c3fe0f1a19a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-machine-approver@sha256:3535b9ccd701ac3fa6b6a8339f6c10d6e74dd4d8f5f810690fa7e272ee82f837_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-monitoring-operator@sha256:05d69056c09c34d095ccedc757ecf2692690c72d2bee4e6b6afc58b01ec55d9c_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-network-operator@sha256:2561079cceff11035c216fea71c0a10622696266aa5a9323ef13806c91537a68_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-node-tuning-operator@sha256:b6fa66947d674eb2fc12b38fb9355c43c57a484d85e56dd013960a760046b793_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-openshift-apiserver-operator@sha256:1291555580ce58d7855c7b93ace6826cd2b1a22499fc5df3aad7d36a30b880ee_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:3bdcfac3e9dcd30754f1e4158706bbcef77449fc3893521c86fd793cc1f7f32a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-samples-operator@sha256:79ba26ee177bc7cd2ab89ddaa6c66b5dcfc6970dc457cc737d64b18b5d378637_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-storage-operator@sha256:95ad59eb2e2cc58f7ae6b850f648259687f266f05ac91166a39da6bf441e3e86_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-update-keys@sha256:f919d82bd99ecd768271c8ef7ad6bf6d2b5cb902410b93bbafc829c58b59a48f_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-version-operator@sha256:2d99cc15d95e08541d60ebc1966b534fda48d00ee69c7c226996ac407a813d6b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-configmap-reloader@sha256:84bb7a8504eb34ff5e4e9ca92aab960c078ededed07ab0fe79620c0b9f32a51f_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-console-operator@sha256:665d6d89d83c51de08526c08365317b3dbb9f20e1528ffb35697f6c8bd409ca3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-console@sha256:68c4a7514623c31f7fdf7058a0dcd968dc4e4a63bcf0236ff21333bfb27cc4aa_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-coredns@sha256:9a330c9540816c13ddbbc93e99107f3d2a194c79eae20d81e8b8d252e9282c14_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-deployer@sha256:ab62d8277ea2e69cf6697343c4b6bfef67f04c5f31cdf47fc510cb76969ca2ca_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-descheduler-operator@sha256:71ba5a71c71074c282634a6261825c57977abd4999cc03957b8c407808a72902_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-descheduler@sha256:f7527c56780840d4062768e88f098229effd9796639ad67f6cdf841941a7e4a1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-docker-builder@sha256:25b131fc577def1179ce8a2022211d366fa461b6afef2f566b3f177930a3d0db_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-docker-registry@sha256:f7bd292dde7bd96195b313b4c459980fe8541bd89c442a4065a0114f42f3fe46_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-dns-proxy@sha256:2c00e51829c679d3573f813b0eced5c16382966ecf609915b47a8472872bbb64_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-http-proxy@sha256:77ffd3c6dbb51743a13ce6a9cbd385602c24165848c205aca864b88af5b3c503_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-router@sha256:c46ed6f837821decadaaf07266b9d67f89b98621618bc073abdc38db51bc692a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-elasticsearch-operator@sha256:6b153238aa96aa4128de68a8df8dde185ebb930d2cee6fe1c033ff7b713fb6f9_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-etcd@sha256:3df453713db7ea9a1bd8556a0a986fcd8d8c0a4649c262b9d8652ccfe648bb1e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-grafana@sha256:4304ba0edd79f4b2b7b6f4766dd696e8fb21423ff0dc50a18388e2163d9df3de_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-haproxy-router@sha256:e0c7adba792e43e96c8d6f4e0845e2d001d0f652ece6f567b09ac481b07eafdc_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-hyperkube@sha256:150fe3e51c75f09bd366d06a96749e17cd01aa845319032c327387950b52a34e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-hypershift@sha256:48392b80092bca63f2969b14412017601ebfda1b54141db53c2bc5b2317c389a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-installer-artifacts@sha256:7f3e05fa013dead5501513b86c19719973d0f9ee5dbdd4d3f5264fe601dbf809_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-installer@sha256:7f0fb099018d7fba695adfff2c6cec1af789e3c3ccab61bb084a30ae1bdff79f_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins-agent-base@sha256:c29122b0ed52c031f5f99ddb3338b6515bc05ac1e90864dda1131dcf9af87924_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins-agent-maven@sha256:ce5dd50d7005ed2d5ef36de673a2cf2cec07ad997ed93956605fe8fc8836d15c_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins@sha256:8da877d1df3fbb0fd4df607718847382d3ab38b862f868077c8938a1a7014f71_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-k8s-prometheus-adapter@sha256:95e7924437a3d110b334b1b03c01e2a65292f092110acde1a59db280ce8c7bda_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-keepalived-ipfailover@sha256:1c0b3bde2963560aa0c50bd8365abd39bc5cfae28409fbdc60abf786546eb2e8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-proxy@sha256:3afce3e28952226f1bb959b2859050e848ed5d4549ac5e2fc267f51b11fc6ec3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-rbac-proxy@sha256:dab4af2713fa59499ee8d2cb169d636ddb425590e6924bc2c03597c0b10bd246_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-state-metrics@sha256:4ff6cd48b319093041c2fa9c32ce16c6ea4dffb1c66ef4923f9cfc108cdfe6cc_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-libvirt-machine-controllers@sha256:2446ea720c26b213b9419bd2ad867c0ca1ec6df6d972cd5ffd6037b8fe0fbc88_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-curator5@sha256:91942a469532fda2a4609f2d7ddf693cca5b2ccd8c770d0e36823f0cc67d884c_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-elasticsearch5@sha256:c4693439c2f0f114238cc4034bfc6cd17f93bb9562ac2c0f9feb30f9c657fcd7_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-eventrouter@sha256:7668a706700163a35def516d1e1be336fef418ea477ef014ba90f5317569384b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-fluentd@sha256:3ef99bc79d891b111828c6c29faa8f3cd37d8ab8897186eff2bc85824939f632_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-machine-api-operator@sha256:6dfe7c13a6ae6c6e509f0d8cd0cb6e5284f9efd8cc2c949d87a471643e730957_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-machine-config-operator@sha256:ebffd73f3e4ff92792bad0cfa5bba5bec17e2124c7618ae7c4bd49ac777b7deb_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-admission-controller@sha256:101d1c2eeebf1c5e336238056ff9415de50855363eebce3b75cf6ac562adca05_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-cni@sha256:9be2123934d7f80af6439a84b5a9887459c1655549c7790fd080e965e89049b4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-must-gather@sha256:1acef66db6179f4289fc4abbb297df32c01d3b13fd85530ac6a0d925b517c3df_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-oauth-proxy@sha256:383360705efc0605760c3b2b1d0fa288094eb6dad8158c540d950f661b4ba880_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-openstack-machine-controllers@sha256:1779881159f1548a75e4dfd8a285e6ecab2ceede42acd9d07f036ec28bf1e6f9_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-lifecycle-manager@sha256:9254b8d3097a0d067f07bcf735b3530eccc888466f99a6282aebb7bbdd9cbcc8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-marketplace@sha256:3c5b9b86c9a9cd3c11290a44e29f016fe054b7068dd5b8469956909a63813db8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-registry@sha256:5eecc9d91c1ae4f0af586aa7d97fce8a32f23dfcdd64dcc61b9c536fbf4e8663_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-ovn-kubernetes@sha256:d4234553bb7e59323ee19b5d87d189f78fb4cd747551af6a6413b88001e27e13_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-pod@sha256:40b2f3ff0b5ff873669613882579b2a714aed77e1fea4e28a26ebf2726177707_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prom-label-proxy@sha256:c77261cc981cc8a5193ca1199c0a119db5757de135f4f7f5e558744371d2bd8a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-alertmanager@sha256:ef6c822baa9167856e613e7f1c14a1b44da42a394d91b9e0407d01d769a8fb40_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-config-reloader@sha256:6c0551dd87cc7eacc18ccbac093043b1178225f64843f13435f02ae7c2b4d91e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-node-exporter@sha256:56c31eb82f202b0ab38bc600ef01ef68302a0a57b7274c9537d3518855e2da1d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-operator@sha256:a5f9da1798e6b598157343e8751eda45ead551ddfb34ac5e742c6b1d8c8bf0d4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus@sha256:38e663d919d2c96af52656b42d18556cf457b84ef3160e27496f6db36ffa92a3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-service-ca-operator@sha256:ba2867ef0021af24b6667d114983400a0f7f5824842f1e11d1cda5aa91286737_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-cni@sha256:7a129a17d719761425ce26a47eaa115789be893f4a1054e37f3c76f891157886_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-dp-admission-controller@sha256:e98327978a09c28baa5f10365d2df1e2c33bb689644d581aa6f7ff095e0c1c5d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-network-device-plugin@sha256:4dc4017eee056448d0192834de329c6563c48f625f21ca9db59b22d54db70de8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-telemeter@sha256:5abb2f8cd1758441ba75e07e0a2f1180dbda0f13e6b51993d7c945b3d91b3bef_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-tests@sha256:28866a167dd7df474b053e92de3ba9bc0d95d918180b1e676637df30c2a27ef4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/postgres-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64", "7Server-RH7-RHOSE-4.1:openshift4/postgresql-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-10T15:58:57+00:00", "details": "For OpenShift Container Platform 4.1 see the following documentation, which\nwill be updated shortly for release 4.1.14, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.1/updating/updating-cluster-cli.html.", "product_ids": [ "7Server-RH7-RHOSE-4.1:openshift4/apb-base@sha256:183441575a8a0ba144fdd346e5ab560a067725a9b66d890493c326e14135512e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mariadb-apb@sha256:a446829513325ac146b2aa1b555347b57a2377712df6cd8a431c1dbec0614331_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mediawiki-apb@sha256:0a1ab047c6a93e3531f20673b275854361f36e2ebd4894b5ad1705c3dde42a76_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mediawiki@sha256:8014f0d73799f7f26b56a3d908b55de3103103f57a507d48fe9830c7d605f85d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mysql-apb@sha256:5772d2a584b96249c535df55b501ffe891162d7651b18244cdc16ab2f0d563dc_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-ansible-operator@sha256:9469e5ed49937aeb64f0a3dbb5332f087c8498494127a5c507c02c3d4286afb1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-aws-machine-controllers@sha256:e5f585aa452461ee95d55e84d81be54a82a458a54dbcad1f68a8f28edeb7638b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-azure-machine-controllers@sha256:9f3199e5226fdcd5abe34a6f2e3a6ad7e7ad3f59edbff2bfd9b4c84566897eae_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-baremetal-machine-controllers@sha256:d9ca5e81aa2fb401f9c5bfb63e85fc5d93ae1e657ab992e879a2b9d520f3fea3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cli-artifacts@sha256:bacaec21f6101ef686bb07b5d6e80b0b3ad06ab9a4d4f6e611ca3103c0030d7e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cli@sha256:bb846647aa233adddf5ed39056fdf98a7d9dc3abef4c985df3de698a44ecc7fd_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cloud-credential-operator@sha256:27c7bac07c2a2a38ddb65a9997b22946fbe37ddd06ecf52eccd0ef9235ae47ba_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-authentication-operator@sha256:67dc9d9d90e5b37c73eda524a13e0bd98834b225adbfccc9d6c09a35a130c8f4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-autoscaler-operator@sha256:989948cb9998b518f3c325a2af3b24cfb7033ad2ac8be96cb3fafce2b4077435_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-autoscaler@sha256:b995c30d43493a8d393282c760584605951048dbe395eeac6b6b1bec269ff3ad_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-bootstrap@sha256:9a676b7e363f022a511ab07ae81242b5c6d03523db11c37b0bf47e0f0324c9d8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-capacity@sha256:24db95a9d24960c14775136419eed7dfddb7b7d70577fab77a63b64fc66d53a7_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-config-operator@sha256:3b210b7313b4853f777d19248ba746b3d29251a3409124f984ae212809930427_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-dns-operator@sha256:5f70ba7ebcee1ecb9f65c8b43280935866607fc3dee6329ed473169f2acebe05_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-image-registry-operator@sha256:5c8fa5eb3828277f31ca0d4f7aedfee8e66dc0cfa3542772e6ac13c6b131644d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-ingress-operator@sha256:b33e32eaac7d15947e32cbeb9d45e9ae3e6fbe470611ab78f28cfc99d8759b68_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-apiserver-operator@sha256:af88e84a2957ba9eeb1e5e3cdf9cf559ccb0de08d7a16c58a19c8eb805ba5a39_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-controller-manager-operator@sha256:ca1e29c0c4eb029ed4d5544d5fde000000aa007f1d8e0fcf0fc0d317b5e06784_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-scheduler-operator@sha256:6f30eebebe4b774acd19eadeae80c4a7c8ccb503389c354bc76fc0f778cefe2b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-logging-operator@sha256:7926e2be0854ff3edac0ced6950a0be04ad26d46a5da638611457c3fe0f1a19a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-machine-approver@sha256:3535b9ccd701ac3fa6b6a8339f6c10d6e74dd4d8f5f810690fa7e272ee82f837_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-monitoring-operator@sha256:05d69056c09c34d095ccedc757ecf2692690c72d2bee4e6b6afc58b01ec55d9c_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-network-operator@sha256:2561079cceff11035c216fea71c0a10622696266aa5a9323ef13806c91537a68_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-node-tuning-operator@sha256:b6fa66947d674eb2fc12b38fb9355c43c57a484d85e56dd013960a760046b793_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-openshift-apiserver-operator@sha256:1291555580ce58d7855c7b93ace6826cd2b1a22499fc5df3aad7d36a30b880ee_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:3bdcfac3e9dcd30754f1e4158706bbcef77449fc3893521c86fd793cc1f7f32a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-samples-operator@sha256:79ba26ee177bc7cd2ab89ddaa6c66b5dcfc6970dc457cc737d64b18b5d378637_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-storage-operator@sha256:95ad59eb2e2cc58f7ae6b850f648259687f266f05ac91166a39da6bf441e3e86_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-update-keys@sha256:f919d82bd99ecd768271c8ef7ad6bf6d2b5cb902410b93bbafc829c58b59a48f_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-version-operator@sha256:2d99cc15d95e08541d60ebc1966b534fda48d00ee69c7c226996ac407a813d6b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-configmap-reloader@sha256:84bb7a8504eb34ff5e4e9ca92aab960c078ededed07ab0fe79620c0b9f32a51f_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-console-operator@sha256:665d6d89d83c51de08526c08365317b3dbb9f20e1528ffb35697f6c8bd409ca3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-console@sha256:68c4a7514623c31f7fdf7058a0dcd968dc4e4a63bcf0236ff21333bfb27cc4aa_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-coredns@sha256:9a330c9540816c13ddbbc93e99107f3d2a194c79eae20d81e8b8d252e9282c14_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-deployer@sha256:ab62d8277ea2e69cf6697343c4b6bfef67f04c5f31cdf47fc510cb76969ca2ca_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-descheduler-operator@sha256:71ba5a71c71074c282634a6261825c57977abd4999cc03957b8c407808a72902_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-descheduler@sha256:f7527c56780840d4062768e88f098229effd9796639ad67f6cdf841941a7e4a1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-docker-builder@sha256:25b131fc577def1179ce8a2022211d366fa461b6afef2f566b3f177930a3d0db_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-docker-registry@sha256:f7bd292dde7bd96195b313b4c459980fe8541bd89c442a4065a0114f42f3fe46_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-dns-proxy@sha256:2c00e51829c679d3573f813b0eced5c16382966ecf609915b47a8472872bbb64_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-http-proxy@sha256:77ffd3c6dbb51743a13ce6a9cbd385602c24165848c205aca864b88af5b3c503_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-router@sha256:c46ed6f837821decadaaf07266b9d67f89b98621618bc073abdc38db51bc692a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-elasticsearch-operator@sha256:6b153238aa96aa4128de68a8df8dde185ebb930d2cee6fe1c033ff7b713fb6f9_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-etcd@sha256:3df453713db7ea9a1bd8556a0a986fcd8d8c0a4649c262b9d8652ccfe648bb1e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-grafana@sha256:4304ba0edd79f4b2b7b6f4766dd696e8fb21423ff0dc50a18388e2163d9df3de_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-haproxy-router@sha256:e0c7adba792e43e96c8d6f4e0845e2d001d0f652ece6f567b09ac481b07eafdc_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-hyperkube@sha256:150fe3e51c75f09bd366d06a96749e17cd01aa845319032c327387950b52a34e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-hypershift@sha256:48392b80092bca63f2969b14412017601ebfda1b54141db53c2bc5b2317c389a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-installer-artifacts@sha256:7f3e05fa013dead5501513b86c19719973d0f9ee5dbdd4d3f5264fe601dbf809_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-installer@sha256:7f0fb099018d7fba695adfff2c6cec1af789e3c3ccab61bb084a30ae1bdff79f_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins-agent-base@sha256:c29122b0ed52c031f5f99ddb3338b6515bc05ac1e90864dda1131dcf9af87924_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins-agent-maven@sha256:ce5dd50d7005ed2d5ef36de673a2cf2cec07ad997ed93956605fe8fc8836d15c_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins@sha256:8da877d1df3fbb0fd4df607718847382d3ab38b862f868077c8938a1a7014f71_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-k8s-prometheus-adapter@sha256:95e7924437a3d110b334b1b03c01e2a65292f092110acde1a59db280ce8c7bda_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-keepalived-ipfailover@sha256:1c0b3bde2963560aa0c50bd8365abd39bc5cfae28409fbdc60abf786546eb2e8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-proxy@sha256:3afce3e28952226f1bb959b2859050e848ed5d4549ac5e2fc267f51b11fc6ec3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-rbac-proxy@sha256:dab4af2713fa59499ee8d2cb169d636ddb425590e6924bc2c03597c0b10bd246_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-state-metrics@sha256:4ff6cd48b319093041c2fa9c32ce16c6ea4dffb1c66ef4923f9cfc108cdfe6cc_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-libvirt-machine-controllers@sha256:2446ea720c26b213b9419bd2ad867c0ca1ec6df6d972cd5ffd6037b8fe0fbc88_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-curator5@sha256:91942a469532fda2a4609f2d7ddf693cca5b2ccd8c770d0e36823f0cc67d884c_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-elasticsearch5@sha256:c4693439c2f0f114238cc4034bfc6cd17f93bb9562ac2c0f9feb30f9c657fcd7_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-eventrouter@sha256:7668a706700163a35def516d1e1be336fef418ea477ef014ba90f5317569384b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-fluentd@sha256:3ef99bc79d891b111828c6c29faa8f3cd37d8ab8897186eff2bc85824939f632_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-machine-api-operator@sha256:6dfe7c13a6ae6c6e509f0d8cd0cb6e5284f9efd8cc2c949d87a471643e730957_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-machine-config-operator@sha256:ebffd73f3e4ff92792bad0cfa5bba5bec17e2124c7618ae7c4bd49ac777b7deb_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-admission-controller@sha256:101d1c2eeebf1c5e336238056ff9415de50855363eebce3b75cf6ac562adca05_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-cni@sha256:9be2123934d7f80af6439a84b5a9887459c1655549c7790fd080e965e89049b4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-must-gather@sha256:1acef66db6179f4289fc4abbb297df32c01d3b13fd85530ac6a0d925b517c3df_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-oauth-proxy@sha256:383360705efc0605760c3b2b1d0fa288094eb6dad8158c540d950f661b4ba880_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-openstack-machine-controllers@sha256:1779881159f1548a75e4dfd8a285e6ecab2ceede42acd9d07f036ec28bf1e6f9_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-lifecycle-manager@sha256:9254b8d3097a0d067f07bcf735b3530eccc888466f99a6282aebb7bbdd9cbcc8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-marketplace@sha256:3c5b9b86c9a9cd3c11290a44e29f016fe054b7068dd5b8469956909a63813db8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-registry@sha256:5eecc9d91c1ae4f0af586aa7d97fce8a32f23dfcdd64dcc61b9c536fbf4e8663_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-ovn-kubernetes@sha256:d4234553bb7e59323ee19b5d87d189f78fb4cd747551af6a6413b88001e27e13_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-pod@sha256:40b2f3ff0b5ff873669613882579b2a714aed77e1fea4e28a26ebf2726177707_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prom-label-proxy@sha256:c77261cc981cc8a5193ca1199c0a119db5757de135f4f7f5e558744371d2bd8a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-alertmanager@sha256:ef6c822baa9167856e613e7f1c14a1b44da42a394d91b9e0407d01d769a8fb40_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-config-reloader@sha256:6c0551dd87cc7eacc18ccbac093043b1178225f64843f13435f02ae7c2b4d91e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-node-exporter@sha256:56c31eb82f202b0ab38bc600ef01ef68302a0a57b7274c9537d3518855e2da1d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-operator@sha256:a5f9da1798e6b598157343e8751eda45ead551ddfb34ac5e742c6b1d8c8bf0d4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus@sha256:38e663d919d2c96af52656b42d18556cf457b84ef3160e27496f6db36ffa92a3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-service-ca-operator@sha256:ba2867ef0021af24b6667d114983400a0f7f5824842f1e11d1cda5aa91286737_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-cni@sha256:7a129a17d719761425ce26a47eaa115789be893f4a1054e37f3c76f891157886_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-dp-admission-controller@sha256:e98327978a09c28baa5f10365d2df1e2c33bb689644d581aa6f7ff095e0c1c5d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-network-device-plugin@sha256:4dc4017eee056448d0192834de329c6563c48f625f21ca9db59b22d54db70de8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-telemeter@sha256:5abb2f8cd1758441ba75e07e0a2f1180dbda0f13e6b51993d7c945b3d91b3bef_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-tests@sha256:28866a167dd7df474b053e92de3ba9bc0d95d918180b1e676637df30c2a27ef4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/postgres-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64", "7Server-RH7-RHOSE-4.1:openshift4/postgresql-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2594" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-4.1:openshift4/apb-base@sha256:183441575a8a0ba144fdd346e5ab560a067725a9b66d890493c326e14135512e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mariadb-apb@sha256:a446829513325ac146b2aa1b555347b57a2377712df6cd8a431c1dbec0614331_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mediawiki-apb@sha256:0a1ab047c6a93e3531f20673b275854361f36e2ebd4894b5ad1705c3dde42a76_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mediawiki@sha256:8014f0d73799f7f26b56a3d908b55de3103103f57a507d48fe9830c7d605f85d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mysql-apb@sha256:5772d2a584b96249c535df55b501ffe891162d7651b18244cdc16ab2f0d563dc_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-ansible-operator@sha256:9469e5ed49937aeb64f0a3dbb5332f087c8498494127a5c507c02c3d4286afb1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-aws-machine-controllers@sha256:e5f585aa452461ee95d55e84d81be54a82a458a54dbcad1f68a8f28edeb7638b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-azure-machine-controllers@sha256:9f3199e5226fdcd5abe34a6f2e3a6ad7e7ad3f59edbff2bfd9b4c84566897eae_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-baremetal-machine-controllers@sha256:d9ca5e81aa2fb401f9c5bfb63e85fc5d93ae1e657ab992e879a2b9d520f3fea3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cli-artifacts@sha256:bacaec21f6101ef686bb07b5d6e80b0b3ad06ab9a4d4f6e611ca3103c0030d7e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cli@sha256:bb846647aa233adddf5ed39056fdf98a7d9dc3abef4c985df3de698a44ecc7fd_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cloud-credential-operator@sha256:27c7bac07c2a2a38ddb65a9997b22946fbe37ddd06ecf52eccd0ef9235ae47ba_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-authentication-operator@sha256:67dc9d9d90e5b37c73eda524a13e0bd98834b225adbfccc9d6c09a35a130c8f4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-autoscaler-operator@sha256:989948cb9998b518f3c325a2af3b24cfb7033ad2ac8be96cb3fafce2b4077435_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-autoscaler@sha256:b995c30d43493a8d393282c760584605951048dbe395eeac6b6b1bec269ff3ad_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-bootstrap@sha256:9a676b7e363f022a511ab07ae81242b5c6d03523db11c37b0bf47e0f0324c9d8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-capacity@sha256:24db95a9d24960c14775136419eed7dfddb7b7d70577fab77a63b64fc66d53a7_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-config-operator@sha256:3b210b7313b4853f777d19248ba746b3d29251a3409124f984ae212809930427_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-dns-operator@sha256:5f70ba7ebcee1ecb9f65c8b43280935866607fc3dee6329ed473169f2acebe05_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-image-registry-operator@sha256:5c8fa5eb3828277f31ca0d4f7aedfee8e66dc0cfa3542772e6ac13c6b131644d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-ingress-operator@sha256:b33e32eaac7d15947e32cbeb9d45e9ae3e6fbe470611ab78f28cfc99d8759b68_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-apiserver-operator@sha256:af88e84a2957ba9eeb1e5e3cdf9cf559ccb0de08d7a16c58a19c8eb805ba5a39_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-controller-manager-operator@sha256:ca1e29c0c4eb029ed4d5544d5fde000000aa007f1d8e0fcf0fc0d317b5e06784_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-scheduler-operator@sha256:6f30eebebe4b774acd19eadeae80c4a7c8ccb503389c354bc76fc0f778cefe2b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-logging-operator@sha256:7926e2be0854ff3edac0ced6950a0be04ad26d46a5da638611457c3fe0f1a19a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-machine-approver@sha256:3535b9ccd701ac3fa6b6a8339f6c10d6e74dd4d8f5f810690fa7e272ee82f837_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-monitoring-operator@sha256:05d69056c09c34d095ccedc757ecf2692690c72d2bee4e6b6afc58b01ec55d9c_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-network-operator@sha256:2561079cceff11035c216fea71c0a10622696266aa5a9323ef13806c91537a68_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-node-tuning-operator@sha256:b6fa66947d674eb2fc12b38fb9355c43c57a484d85e56dd013960a760046b793_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-openshift-apiserver-operator@sha256:1291555580ce58d7855c7b93ace6826cd2b1a22499fc5df3aad7d36a30b880ee_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:3bdcfac3e9dcd30754f1e4158706bbcef77449fc3893521c86fd793cc1f7f32a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-samples-operator@sha256:79ba26ee177bc7cd2ab89ddaa6c66b5dcfc6970dc457cc737d64b18b5d378637_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-storage-operator@sha256:95ad59eb2e2cc58f7ae6b850f648259687f266f05ac91166a39da6bf441e3e86_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-update-keys@sha256:f919d82bd99ecd768271c8ef7ad6bf6d2b5cb902410b93bbafc829c58b59a48f_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-version-operator@sha256:2d99cc15d95e08541d60ebc1966b534fda48d00ee69c7c226996ac407a813d6b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-configmap-reloader@sha256:84bb7a8504eb34ff5e4e9ca92aab960c078ededed07ab0fe79620c0b9f32a51f_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-console-operator@sha256:665d6d89d83c51de08526c08365317b3dbb9f20e1528ffb35697f6c8bd409ca3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-console@sha256:68c4a7514623c31f7fdf7058a0dcd968dc4e4a63bcf0236ff21333bfb27cc4aa_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-coredns@sha256:9a330c9540816c13ddbbc93e99107f3d2a194c79eae20d81e8b8d252e9282c14_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-deployer@sha256:ab62d8277ea2e69cf6697343c4b6bfef67f04c5f31cdf47fc510cb76969ca2ca_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-descheduler-operator@sha256:71ba5a71c71074c282634a6261825c57977abd4999cc03957b8c407808a72902_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-descheduler@sha256:f7527c56780840d4062768e88f098229effd9796639ad67f6cdf841941a7e4a1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-docker-builder@sha256:25b131fc577def1179ce8a2022211d366fa461b6afef2f566b3f177930a3d0db_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-docker-registry@sha256:f7bd292dde7bd96195b313b4c459980fe8541bd89c442a4065a0114f42f3fe46_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-dns-proxy@sha256:2c00e51829c679d3573f813b0eced5c16382966ecf609915b47a8472872bbb64_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-http-proxy@sha256:77ffd3c6dbb51743a13ce6a9cbd385602c24165848c205aca864b88af5b3c503_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-router@sha256:c46ed6f837821decadaaf07266b9d67f89b98621618bc073abdc38db51bc692a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-elasticsearch-operator@sha256:6b153238aa96aa4128de68a8df8dde185ebb930d2cee6fe1c033ff7b713fb6f9_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-etcd@sha256:3df453713db7ea9a1bd8556a0a986fcd8d8c0a4649c262b9d8652ccfe648bb1e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-grafana@sha256:4304ba0edd79f4b2b7b6f4766dd696e8fb21423ff0dc50a18388e2163d9df3de_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-haproxy-router@sha256:e0c7adba792e43e96c8d6f4e0845e2d001d0f652ece6f567b09ac481b07eafdc_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-hyperkube@sha256:150fe3e51c75f09bd366d06a96749e17cd01aa845319032c327387950b52a34e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-hypershift@sha256:48392b80092bca63f2969b14412017601ebfda1b54141db53c2bc5b2317c389a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-installer-artifacts@sha256:7f3e05fa013dead5501513b86c19719973d0f9ee5dbdd4d3f5264fe601dbf809_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-installer@sha256:7f0fb099018d7fba695adfff2c6cec1af789e3c3ccab61bb084a30ae1bdff79f_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins-agent-base@sha256:c29122b0ed52c031f5f99ddb3338b6515bc05ac1e90864dda1131dcf9af87924_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins-agent-maven@sha256:ce5dd50d7005ed2d5ef36de673a2cf2cec07ad997ed93956605fe8fc8836d15c_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins@sha256:8da877d1df3fbb0fd4df607718847382d3ab38b862f868077c8938a1a7014f71_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-k8s-prometheus-adapter@sha256:95e7924437a3d110b334b1b03c01e2a65292f092110acde1a59db280ce8c7bda_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-keepalived-ipfailover@sha256:1c0b3bde2963560aa0c50bd8365abd39bc5cfae28409fbdc60abf786546eb2e8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-proxy@sha256:3afce3e28952226f1bb959b2859050e848ed5d4549ac5e2fc267f51b11fc6ec3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-rbac-proxy@sha256:dab4af2713fa59499ee8d2cb169d636ddb425590e6924bc2c03597c0b10bd246_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-state-metrics@sha256:4ff6cd48b319093041c2fa9c32ce16c6ea4dffb1c66ef4923f9cfc108cdfe6cc_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-libvirt-machine-controllers@sha256:2446ea720c26b213b9419bd2ad867c0ca1ec6df6d972cd5ffd6037b8fe0fbc88_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-curator5@sha256:91942a469532fda2a4609f2d7ddf693cca5b2ccd8c770d0e36823f0cc67d884c_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-elasticsearch5@sha256:c4693439c2f0f114238cc4034bfc6cd17f93bb9562ac2c0f9feb30f9c657fcd7_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-eventrouter@sha256:7668a706700163a35def516d1e1be336fef418ea477ef014ba90f5317569384b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-fluentd@sha256:3ef99bc79d891b111828c6c29faa8f3cd37d8ab8897186eff2bc85824939f632_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-machine-api-operator@sha256:6dfe7c13a6ae6c6e509f0d8cd0cb6e5284f9efd8cc2c949d87a471643e730957_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-machine-config-operator@sha256:ebffd73f3e4ff92792bad0cfa5bba5bec17e2124c7618ae7c4bd49ac777b7deb_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-admission-controller@sha256:101d1c2eeebf1c5e336238056ff9415de50855363eebce3b75cf6ac562adca05_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-cni@sha256:9be2123934d7f80af6439a84b5a9887459c1655549c7790fd080e965e89049b4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-must-gather@sha256:1acef66db6179f4289fc4abbb297df32c01d3b13fd85530ac6a0d925b517c3df_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-oauth-proxy@sha256:383360705efc0605760c3b2b1d0fa288094eb6dad8158c540d950f661b4ba880_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-openstack-machine-controllers@sha256:1779881159f1548a75e4dfd8a285e6ecab2ceede42acd9d07f036ec28bf1e6f9_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-lifecycle-manager@sha256:9254b8d3097a0d067f07bcf735b3530eccc888466f99a6282aebb7bbdd9cbcc8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-marketplace@sha256:3c5b9b86c9a9cd3c11290a44e29f016fe054b7068dd5b8469956909a63813db8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-registry@sha256:5eecc9d91c1ae4f0af586aa7d97fce8a32f23dfcdd64dcc61b9c536fbf4e8663_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-ovn-kubernetes@sha256:d4234553bb7e59323ee19b5d87d189f78fb4cd747551af6a6413b88001e27e13_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-pod@sha256:40b2f3ff0b5ff873669613882579b2a714aed77e1fea4e28a26ebf2726177707_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prom-label-proxy@sha256:c77261cc981cc8a5193ca1199c0a119db5757de135f4f7f5e558744371d2bd8a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-alertmanager@sha256:ef6c822baa9167856e613e7f1c14a1b44da42a394d91b9e0407d01d769a8fb40_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-config-reloader@sha256:6c0551dd87cc7eacc18ccbac093043b1178225f64843f13435f02ae7c2b4d91e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-node-exporter@sha256:56c31eb82f202b0ab38bc600ef01ef68302a0a57b7274c9537d3518855e2da1d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-operator@sha256:a5f9da1798e6b598157343e8751eda45ead551ddfb34ac5e742c6b1d8c8bf0d4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus@sha256:38e663d919d2c96af52656b42d18556cf457b84ef3160e27496f6db36ffa92a3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-service-ca-operator@sha256:ba2867ef0021af24b6667d114983400a0f7f5824842f1e11d1cda5aa91286737_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-cni@sha256:7a129a17d719761425ce26a47eaa115789be893f4a1054e37f3c76f891157886_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-dp-admission-controller@sha256:e98327978a09c28baa5f10365d2df1e2c33bb689644d581aa6f7ff095e0c1c5d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-network-device-plugin@sha256:4dc4017eee056448d0192834de329c6563c48f625f21ca9db59b22d54db70de8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-telemeter@sha256:5abb2f8cd1758441ba75e07e0a2f1180dbda0f13e6b51993d7c945b3d91b3bef_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-tests@sha256:28866a167dd7df474b053e92de3ba9bc0d95d918180b1e676637df30c2a27ef4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/postgres-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64", "7Server-RH7-RHOSE-4.1:openshift4/postgresql-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.1:openshift4/apb-base@sha256:183441575a8a0ba144fdd346e5ab560a067725a9b66d890493c326e14135512e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mariadb-apb@sha256:a446829513325ac146b2aa1b555347b57a2377712df6cd8a431c1dbec0614331_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mediawiki-apb@sha256:0a1ab047c6a93e3531f20673b275854361f36e2ebd4894b5ad1705c3dde42a76_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mediawiki@sha256:8014f0d73799f7f26b56a3d908b55de3103103f57a507d48fe9830c7d605f85d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mysql-apb@sha256:5772d2a584b96249c535df55b501ffe891162d7651b18244cdc16ab2f0d563dc_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-ansible-operator@sha256:9469e5ed49937aeb64f0a3dbb5332f087c8498494127a5c507c02c3d4286afb1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-aws-machine-controllers@sha256:e5f585aa452461ee95d55e84d81be54a82a458a54dbcad1f68a8f28edeb7638b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-azure-machine-controllers@sha256:9f3199e5226fdcd5abe34a6f2e3a6ad7e7ad3f59edbff2bfd9b4c84566897eae_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-baremetal-machine-controllers@sha256:d9ca5e81aa2fb401f9c5bfb63e85fc5d93ae1e657ab992e879a2b9d520f3fea3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cli-artifacts@sha256:bacaec21f6101ef686bb07b5d6e80b0b3ad06ab9a4d4f6e611ca3103c0030d7e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cli@sha256:bb846647aa233adddf5ed39056fdf98a7d9dc3abef4c985df3de698a44ecc7fd_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cloud-credential-operator@sha256:27c7bac07c2a2a38ddb65a9997b22946fbe37ddd06ecf52eccd0ef9235ae47ba_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-authentication-operator@sha256:67dc9d9d90e5b37c73eda524a13e0bd98834b225adbfccc9d6c09a35a130c8f4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-autoscaler-operator@sha256:989948cb9998b518f3c325a2af3b24cfb7033ad2ac8be96cb3fafce2b4077435_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-autoscaler@sha256:b995c30d43493a8d393282c760584605951048dbe395eeac6b6b1bec269ff3ad_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-bootstrap@sha256:9a676b7e363f022a511ab07ae81242b5c6d03523db11c37b0bf47e0f0324c9d8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-capacity@sha256:24db95a9d24960c14775136419eed7dfddb7b7d70577fab77a63b64fc66d53a7_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-config-operator@sha256:3b210b7313b4853f777d19248ba746b3d29251a3409124f984ae212809930427_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-dns-operator@sha256:5f70ba7ebcee1ecb9f65c8b43280935866607fc3dee6329ed473169f2acebe05_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-image-registry-operator@sha256:5c8fa5eb3828277f31ca0d4f7aedfee8e66dc0cfa3542772e6ac13c6b131644d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-ingress-operator@sha256:b33e32eaac7d15947e32cbeb9d45e9ae3e6fbe470611ab78f28cfc99d8759b68_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-apiserver-operator@sha256:af88e84a2957ba9eeb1e5e3cdf9cf559ccb0de08d7a16c58a19c8eb805ba5a39_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-controller-manager-operator@sha256:ca1e29c0c4eb029ed4d5544d5fde000000aa007f1d8e0fcf0fc0d317b5e06784_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-scheduler-operator@sha256:6f30eebebe4b774acd19eadeae80c4a7c8ccb503389c354bc76fc0f778cefe2b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-logging-operator@sha256:7926e2be0854ff3edac0ced6950a0be04ad26d46a5da638611457c3fe0f1a19a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-machine-approver@sha256:3535b9ccd701ac3fa6b6a8339f6c10d6e74dd4d8f5f810690fa7e272ee82f837_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-monitoring-operator@sha256:05d69056c09c34d095ccedc757ecf2692690c72d2bee4e6b6afc58b01ec55d9c_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-network-operator@sha256:2561079cceff11035c216fea71c0a10622696266aa5a9323ef13806c91537a68_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-node-tuning-operator@sha256:b6fa66947d674eb2fc12b38fb9355c43c57a484d85e56dd013960a760046b793_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-openshift-apiserver-operator@sha256:1291555580ce58d7855c7b93ace6826cd2b1a22499fc5df3aad7d36a30b880ee_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:3bdcfac3e9dcd30754f1e4158706bbcef77449fc3893521c86fd793cc1f7f32a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-samples-operator@sha256:79ba26ee177bc7cd2ab89ddaa6c66b5dcfc6970dc457cc737d64b18b5d378637_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-storage-operator@sha256:95ad59eb2e2cc58f7ae6b850f648259687f266f05ac91166a39da6bf441e3e86_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-update-keys@sha256:f919d82bd99ecd768271c8ef7ad6bf6d2b5cb902410b93bbafc829c58b59a48f_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-version-operator@sha256:2d99cc15d95e08541d60ebc1966b534fda48d00ee69c7c226996ac407a813d6b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-configmap-reloader@sha256:84bb7a8504eb34ff5e4e9ca92aab960c078ededed07ab0fe79620c0b9f32a51f_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-console-operator@sha256:665d6d89d83c51de08526c08365317b3dbb9f20e1528ffb35697f6c8bd409ca3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-console@sha256:68c4a7514623c31f7fdf7058a0dcd968dc4e4a63bcf0236ff21333bfb27cc4aa_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-coredns@sha256:9a330c9540816c13ddbbc93e99107f3d2a194c79eae20d81e8b8d252e9282c14_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-deployer@sha256:ab62d8277ea2e69cf6697343c4b6bfef67f04c5f31cdf47fc510cb76969ca2ca_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-descheduler-operator@sha256:71ba5a71c71074c282634a6261825c57977abd4999cc03957b8c407808a72902_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-descheduler@sha256:f7527c56780840d4062768e88f098229effd9796639ad67f6cdf841941a7e4a1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-docker-builder@sha256:25b131fc577def1179ce8a2022211d366fa461b6afef2f566b3f177930a3d0db_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-docker-registry@sha256:f7bd292dde7bd96195b313b4c459980fe8541bd89c442a4065a0114f42f3fe46_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-dns-proxy@sha256:2c00e51829c679d3573f813b0eced5c16382966ecf609915b47a8472872bbb64_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-http-proxy@sha256:77ffd3c6dbb51743a13ce6a9cbd385602c24165848c205aca864b88af5b3c503_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-router@sha256:c46ed6f837821decadaaf07266b9d67f89b98621618bc073abdc38db51bc692a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-elasticsearch-operator@sha256:6b153238aa96aa4128de68a8df8dde185ebb930d2cee6fe1c033ff7b713fb6f9_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-etcd@sha256:3df453713db7ea9a1bd8556a0a986fcd8d8c0a4649c262b9d8652ccfe648bb1e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-grafana@sha256:4304ba0edd79f4b2b7b6f4766dd696e8fb21423ff0dc50a18388e2163d9df3de_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-haproxy-router@sha256:e0c7adba792e43e96c8d6f4e0845e2d001d0f652ece6f567b09ac481b07eafdc_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-hyperkube@sha256:150fe3e51c75f09bd366d06a96749e17cd01aa845319032c327387950b52a34e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-hypershift@sha256:48392b80092bca63f2969b14412017601ebfda1b54141db53c2bc5b2317c389a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-installer-artifacts@sha256:7f3e05fa013dead5501513b86c19719973d0f9ee5dbdd4d3f5264fe601dbf809_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-installer@sha256:7f0fb099018d7fba695adfff2c6cec1af789e3c3ccab61bb084a30ae1bdff79f_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins-agent-base@sha256:c29122b0ed52c031f5f99ddb3338b6515bc05ac1e90864dda1131dcf9af87924_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins-agent-maven@sha256:ce5dd50d7005ed2d5ef36de673a2cf2cec07ad997ed93956605fe8fc8836d15c_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins@sha256:8da877d1df3fbb0fd4df607718847382d3ab38b862f868077c8938a1a7014f71_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-k8s-prometheus-adapter@sha256:95e7924437a3d110b334b1b03c01e2a65292f092110acde1a59db280ce8c7bda_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-keepalived-ipfailover@sha256:1c0b3bde2963560aa0c50bd8365abd39bc5cfae28409fbdc60abf786546eb2e8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-proxy@sha256:3afce3e28952226f1bb959b2859050e848ed5d4549ac5e2fc267f51b11fc6ec3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-rbac-proxy@sha256:dab4af2713fa59499ee8d2cb169d636ddb425590e6924bc2c03597c0b10bd246_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-state-metrics@sha256:4ff6cd48b319093041c2fa9c32ce16c6ea4dffb1c66ef4923f9cfc108cdfe6cc_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-libvirt-machine-controllers@sha256:2446ea720c26b213b9419bd2ad867c0ca1ec6df6d972cd5ffd6037b8fe0fbc88_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-curator5@sha256:91942a469532fda2a4609f2d7ddf693cca5b2ccd8c770d0e36823f0cc67d884c_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-elasticsearch5@sha256:c4693439c2f0f114238cc4034bfc6cd17f93bb9562ac2c0f9feb30f9c657fcd7_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-eventrouter@sha256:7668a706700163a35def516d1e1be336fef418ea477ef014ba90f5317569384b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-fluentd@sha256:3ef99bc79d891b111828c6c29faa8f3cd37d8ab8897186eff2bc85824939f632_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-machine-api-operator@sha256:6dfe7c13a6ae6c6e509f0d8cd0cb6e5284f9efd8cc2c949d87a471643e730957_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-machine-config-operator@sha256:ebffd73f3e4ff92792bad0cfa5bba5bec17e2124c7618ae7c4bd49ac777b7deb_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-admission-controller@sha256:101d1c2eeebf1c5e336238056ff9415de50855363eebce3b75cf6ac562adca05_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-cni@sha256:9be2123934d7f80af6439a84b5a9887459c1655549c7790fd080e965e89049b4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-must-gather@sha256:1acef66db6179f4289fc4abbb297df32c01d3b13fd85530ac6a0d925b517c3df_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-oauth-proxy@sha256:383360705efc0605760c3b2b1d0fa288094eb6dad8158c540d950f661b4ba880_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-openstack-machine-controllers@sha256:1779881159f1548a75e4dfd8a285e6ecab2ceede42acd9d07f036ec28bf1e6f9_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-lifecycle-manager@sha256:9254b8d3097a0d067f07bcf735b3530eccc888466f99a6282aebb7bbdd9cbcc8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-marketplace@sha256:3c5b9b86c9a9cd3c11290a44e29f016fe054b7068dd5b8469956909a63813db8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-registry@sha256:5eecc9d91c1ae4f0af586aa7d97fce8a32f23dfcdd64dcc61b9c536fbf4e8663_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-ovn-kubernetes@sha256:d4234553bb7e59323ee19b5d87d189f78fb4cd747551af6a6413b88001e27e13_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-pod@sha256:40b2f3ff0b5ff873669613882579b2a714aed77e1fea4e28a26ebf2726177707_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prom-label-proxy@sha256:c77261cc981cc8a5193ca1199c0a119db5757de135f4f7f5e558744371d2bd8a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-alertmanager@sha256:ef6c822baa9167856e613e7f1c14a1b44da42a394d91b9e0407d01d769a8fb40_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-config-reloader@sha256:6c0551dd87cc7eacc18ccbac093043b1178225f64843f13435f02ae7c2b4d91e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-node-exporter@sha256:56c31eb82f202b0ab38bc600ef01ef68302a0a57b7274c9537d3518855e2da1d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-operator@sha256:a5f9da1798e6b598157343e8751eda45ead551ddfb34ac5e742c6b1d8c8bf0d4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus@sha256:38e663d919d2c96af52656b42d18556cf457b84ef3160e27496f6db36ffa92a3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-service-ca-operator@sha256:ba2867ef0021af24b6667d114983400a0f7f5824842f1e11d1cda5aa91286737_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-cni@sha256:7a129a17d719761425ce26a47eaa115789be893f4a1054e37f3c76f891157886_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-dp-admission-controller@sha256:e98327978a09c28baa5f10365d2df1e2c33bb689644d581aa6f7ff095e0c1c5d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-network-device-plugin@sha256:4dc4017eee056448d0192834de329c6563c48f625f21ca9db59b22d54db70de8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-telemeter@sha256:5abb2f8cd1758441ba75e07e0a2f1180dbda0f13e6b51993d7c945b3d91b3bef_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-tests@sha256:28866a167dd7df474b053e92de3ba9bc0d95d918180b1e676637df30c2a27ef4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/postgres-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64", "7Server-RH7-RHOSE-4.1:openshift4/postgresql-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-10T15:58:57+00:00", "details": "For OpenShift Container Platform 4.1 see the following documentation, which\nwill be updated shortly for release 4.1.14, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.1/updating/updating-cluster-cli.html.", "product_ids": [ "7Server-RH7-RHOSE-4.1:openshift4/apb-base@sha256:183441575a8a0ba144fdd346e5ab560a067725a9b66d890493c326e14135512e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mariadb-apb@sha256:a446829513325ac146b2aa1b555347b57a2377712df6cd8a431c1dbec0614331_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mediawiki-apb@sha256:0a1ab047c6a93e3531f20673b275854361f36e2ebd4894b5ad1705c3dde42a76_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mediawiki@sha256:8014f0d73799f7f26b56a3d908b55de3103103f57a507d48fe9830c7d605f85d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mysql-apb@sha256:5772d2a584b96249c535df55b501ffe891162d7651b18244cdc16ab2f0d563dc_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-ansible-operator@sha256:9469e5ed49937aeb64f0a3dbb5332f087c8498494127a5c507c02c3d4286afb1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-aws-machine-controllers@sha256:e5f585aa452461ee95d55e84d81be54a82a458a54dbcad1f68a8f28edeb7638b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-azure-machine-controllers@sha256:9f3199e5226fdcd5abe34a6f2e3a6ad7e7ad3f59edbff2bfd9b4c84566897eae_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-baremetal-machine-controllers@sha256:d9ca5e81aa2fb401f9c5bfb63e85fc5d93ae1e657ab992e879a2b9d520f3fea3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cli-artifacts@sha256:bacaec21f6101ef686bb07b5d6e80b0b3ad06ab9a4d4f6e611ca3103c0030d7e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cli@sha256:bb846647aa233adddf5ed39056fdf98a7d9dc3abef4c985df3de698a44ecc7fd_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cloud-credential-operator@sha256:27c7bac07c2a2a38ddb65a9997b22946fbe37ddd06ecf52eccd0ef9235ae47ba_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-authentication-operator@sha256:67dc9d9d90e5b37c73eda524a13e0bd98834b225adbfccc9d6c09a35a130c8f4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-autoscaler-operator@sha256:989948cb9998b518f3c325a2af3b24cfb7033ad2ac8be96cb3fafce2b4077435_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-autoscaler@sha256:b995c30d43493a8d393282c760584605951048dbe395eeac6b6b1bec269ff3ad_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-bootstrap@sha256:9a676b7e363f022a511ab07ae81242b5c6d03523db11c37b0bf47e0f0324c9d8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-capacity@sha256:24db95a9d24960c14775136419eed7dfddb7b7d70577fab77a63b64fc66d53a7_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-config-operator@sha256:3b210b7313b4853f777d19248ba746b3d29251a3409124f984ae212809930427_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-dns-operator@sha256:5f70ba7ebcee1ecb9f65c8b43280935866607fc3dee6329ed473169f2acebe05_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-image-registry-operator@sha256:5c8fa5eb3828277f31ca0d4f7aedfee8e66dc0cfa3542772e6ac13c6b131644d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-ingress-operator@sha256:b33e32eaac7d15947e32cbeb9d45e9ae3e6fbe470611ab78f28cfc99d8759b68_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-apiserver-operator@sha256:af88e84a2957ba9eeb1e5e3cdf9cf559ccb0de08d7a16c58a19c8eb805ba5a39_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-controller-manager-operator@sha256:ca1e29c0c4eb029ed4d5544d5fde000000aa007f1d8e0fcf0fc0d317b5e06784_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-scheduler-operator@sha256:6f30eebebe4b774acd19eadeae80c4a7c8ccb503389c354bc76fc0f778cefe2b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-logging-operator@sha256:7926e2be0854ff3edac0ced6950a0be04ad26d46a5da638611457c3fe0f1a19a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-machine-approver@sha256:3535b9ccd701ac3fa6b6a8339f6c10d6e74dd4d8f5f810690fa7e272ee82f837_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-monitoring-operator@sha256:05d69056c09c34d095ccedc757ecf2692690c72d2bee4e6b6afc58b01ec55d9c_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-network-operator@sha256:2561079cceff11035c216fea71c0a10622696266aa5a9323ef13806c91537a68_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-node-tuning-operator@sha256:b6fa66947d674eb2fc12b38fb9355c43c57a484d85e56dd013960a760046b793_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-openshift-apiserver-operator@sha256:1291555580ce58d7855c7b93ace6826cd2b1a22499fc5df3aad7d36a30b880ee_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:3bdcfac3e9dcd30754f1e4158706bbcef77449fc3893521c86fd793cc1f7f32a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-samples-operator@sha256:79ba26ee177bc7cd2ab89ddaa6c66b5dcfc6970dc457cc737d64b18b5d378637_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-storage-operator@sha256:95ad59eb2e2cc58f7ae6b850f648259687f266f05ac91166a39da6bf441e3e86_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-update-keys@sha256:f919d82bd99ecd768271c8ef7ad6bf6d2b5cb902410b93bbafc829c58b59a48f_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-version-operator@sha256:2d99cc15d95e08541d60ebc1966b534fda48d00ee69c7c226996ac407a813d6b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-configmap-reloader@sha256:84bb7a8504eb34ff5e4e9ca92aab960c078ededed07ab0fe79620c0b9f32a51f_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-console-operator@sha256:665d6d89d83c51de08526c08365317b3dbb9f20e1528ffb35697f6c8bd409ca3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-console@sha256:68c4a7514623c31f7fdf7058a0dcd968dc4e4a63bcf0236ff21333bfb27cc4aa_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-coredns@sha256:9a330c9540816c13ddbbc93e99107f3d2a194c79eae20d81e8b8d252e9282c14_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-deployer@sha256:ab62d8277ea2e69cf6697343c4b6bfef67f04c5f31cdf47fc510cb76969ca2ca_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-descheduler-operator@sha256:71ba5a71c71074c282634a6261825c57977abd4999cc03957b8c407808a72902_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-descheduler@sha256:f7527c56780840d4062768e88f098229effd9796639ad67f6cdf841941a7e4a1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-docker-builder@sha256:25b131fc577def1179ce8a2022211d366fa461b6afef2f566b3f177930a3d0db_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-docker-registry@sha256:f7bd292dde7bd96195b313b4c459980fe8541bd89c442a4065a0114f42f3fe46_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-dns-proxy@sha256:2c00e51829c679d3573f813b0eced5c16382966ecf609915b47a8472872bbb64_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-http-proxy@sha256:77ffd3c6dbb51743a13ce6a9cbd385602c24165848c205aca864b88af5b3c503_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-router@sha256:c46ed6f837821decadaaf07266b9d67f89b98621618bc073abdc38db51bc692a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-elasticsearch-operator@sha256:6b153238aa96aa4128de68a8df8dde185ebb930d2cee6fe1c033ff7b713fb6f9_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-etcd@sha256:3df453713db7ea9a1bd8556a0a986fcd8d8c0a4649c262b9d8652ccfe648bb1e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-grafana@sha256:4304ba0edd79f4b2b7b6f4766dd696e8fb21423ff0dc50a18388e2163d9df3de_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-haproxy-router@sha256:e0c7adba792e43e96c8d6f4e0845e2d001d0f652ece6f567b09ac481b07eafdc_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-hyperkube@sha256:150fe3e51c75f09bd366d06a96749e17cd01aa845319032c327387950b52a34e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-hypershift@sha256:48392b80092bca63f2969b14412017601ebfda1b54141db53c2bc5b2317c389a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-installer-artifacts@sha256:7f3e05fa013dead5501513b86c19719973d0f9ee5dbdd4d3f5264fe601dbf809_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-installer@sha256:7f0fb099018d7fba695adfff2c6cec1af789e3c3ccab61bb084a30ae1bdff79f_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins-agent-base@sha256:c29122b0ed52c031f5f99ddb3338b6515bc05ac1e90864dda1131dcf9af87924_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins-agent-maven@sha256:ce5dd50d7005ed2d5ef36de673a2cf2cec07ad997ed93956605fe8fc8836d15c_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins@sha256:8da877d1df3fbb0fd4df607718847382d3ab38b862f868077c8938a1a7014f71_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-k8s-prometheus-adapter@sha256:95e7924437a3d110b334b1b03c01e2a65292f092110acde1a59db280ce8c7bda_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-keepalived-ipfailover@sha256:1c0b3bde2963560aa0c50bd8365abd39bc5cfae28409fbdc60abf786546eb2e8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-proxy@sha256:3afce3e28952226f1bb959b2859050e848ed5d4549ac5e2fc267f51b11fc6ec3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-rbac-proxy@sha256:dab4af2713fa59499ee8d2cb169d636ddb425590e6924bc2c03597c0b10bd246_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-state-metrics@sha256:4ff6cd48b319093041c2fa9c32ce16c6ea4dffb1c66ef4923f9cfc108cdfe6cc_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-libvirt-machine-controllers@sha256:2446ea720c26b213b9419bd2ad867c0ca1ec6df6d972cd5ffd6037b8fe0fbc88_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-curator5@sha256:91942a469532fda2a4609f2d7ddf693cca5b2ccd8c770d0e36823f0cc67d884c_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-elasticsearch5@sha256:c4693439c2f0f114238cc4034bfc6cd17f93bb9562ac2c0f9feb30f9c657fcd7_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-eventrouter@sha256:7668a706700163a35def516d1e1be336fef418ea477ef014ba90f5317569384b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-fluentd@sha256:3ef99bc79d891b111828c6c29faa8f3cd37d8ab8897186eff2bc85824939f632_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-machine-api-operator@sha256:6dfe7c13a6ae6c6e509f0d8cd0cb6e5284f9efd8cc2c949d87a471643e730957_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-machine-config-operator@sha256:ebffd73f3e4ff92792bad0cfa5bba5bec17e2124c7618ae7c4bd49ac777b7deb_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-admission-controller@sha256:101d1c2eeebf1c5e336238056ff9415de50855363eebce3b75cf6ac562adca05_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-cni@sha256:9be2123934d7f80af6439a84b5a9887459c1655549c7790fd080e965e89049b4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-must-gather@sha256:1acef66db6179f4289fc4abbb297df32c01d3b13fd85530ac6a0d925b517c3df_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-oauth-proxy@sha256:383360705efc0605760c3b2b1d0fa288094eb6dad8158c540d950f661b4ba880_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-openstack-machine-controllers@sha256:1779881159f1548a75e4dfd8a285e6ecab2ceede42acd9d07f036ec28bf1e6f9_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-lifecycle-manager@sha256:9254b8d3097a0d067f07bcf735b3530eccc888466f99a6282aebb7bbdd9cbcc8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-marketplace@sha256:3c5b9b86c9a9cd3c11290a44e29f016fe054b7068dd5b8469956909a63813db8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-registry@sha256:5eecc9d91c1ae4f0af586aa7d97fce8a32f23dfcdd64dcc61b9c536fbf4e8663_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-ovn-kubernetes@sha256:d4234553bb7e59323ee19b5d87d189f78fb4cd747551af6a6413b88001e27e13_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-pod@sha256:40b2f3ff0b5ff873669613882579b2a714aed77e1fea4e28a26ebf2726177707_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prom-label-proxy@sha256:c77261cc981cc8a5193ca1199c0a119db5757de135f4f7f5e558744371d2bd8a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-alertmanager@sha256:ef6c822baa9167856e613e7f1c14a1b44da42a394d91b9e0407d01d769a8fb40_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-config-reloader@sha256:6c0551dd87cc7eacc18ccbac093043b1178225f64843f13435f02ae7c2b4d91e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-node-exporter@sha256:56c31eb82f202b0ab38bc600ef01ef68302a0a57b7274c9537d3518855e2da1d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-operator@sha256:a5f9da1798e6b598157343e8751eda45ead551ddfb34ac5e742c6b1d8c8bf0d4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus@sha256:38e663d919d2c96af52656b42d18556cf457b84ef3160e27496f6db36ffa92a3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-service-ca-operator@sha256:ba2867ef0021af24b6667d114983400a0f7f5824842f1e11d1cda5aa91286737_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-cni@sha256:7a129a17d719761425ce26a47eaa115789be893f4a1054e37f3c76f891157886_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-dp-admission-controller@sha256:e98327978a09c28baa5f10365d2df1e2c33bb689644d581aa6f7ff095e0c1c5d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-network-device-plugin@sha256:4dc4017eee056448d0192834de329c6563c48f625f21ca9db59b22d54db70de8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-telemeter@sha256:5abb2f8cd1758441ba75e07e0a2f1180dbda0f13e6b51993d7c945b3d91b3bef_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-tests@sha256:28866a167dd7df474b053e92de3ba9bc0d95d918180b1e676637df30c2a27ef4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/postgres-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64", "7Server-RH7-RHOSE-4.1:openshift4/postgresql-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2594" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-4.1:openshift4/apb-base@sha256:183441575a8a0ba144fdd346e5ab560a067725a9b66d890493c326e14135512e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mariadb-apb@sha256:a446829513325ac146b2aa1b555347b57a2377712df6cd8a431c1dbec0614331_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mediawiki-apb@sha256:0a1ab047c6a93e3531f20673b275854361f36e2ebd4894b5ad1705c3dde42a76_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mediawiki@sha256:8014f0d73799f7f26b56a3d908b55de3103103f57a507d48fe9830c7d605f85d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mysql-apb@sha256:5772d2a584b96249c535df55b501ffe891162d7651b18244cdc16ab2f0d563dc_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-ansible-operator@sha256:9469e5ed49937aeb64f0a3dbb5332f087c8498494127a5c507c02c3d4286afb1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-aws-machine-controllers@sha256:e5f585aa452461ee95d55e84d81be54a82a458a54dbcad1f68a8f28edeb7638b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-azure-machine-controllers@sha256:9f3199e5226fdcd5abe34a6f2e3a6ad7e7ad3f59edbff2bfd9b4c84566897eae_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-baremetal-machine-controllers@sha256:d9ca5e81aa2fb401f9c5bfb63e85fc5d93ae1e657ab992e879a2b9d520f3fea3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cli-artifacts@sha256:bacaec21f6101ef686bb07b5d6e80b0b3ad06ab9a4d4f6e611ca3103c0030d7e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cli@sha256:bb846647aa233adddf5ed39056fdf98a7d9dc3abef4c985df3de698a44ecc7fd_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cloud-credential-operator@sha256:27c7bac07c2a2a38ddb65a9997b22946fbe37ddd06ecf52eccd0ef9235ae47ba_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-authentication-operator@sha256:67dc9d9d90e5b37c73eda524a13e0bd98834b225adbfccc9d6c09a35a130c8f4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-autoscaler-operator@sha256:989948cb9998b518f3c325a2af3b24cfb7033ad2ac8be96cb3fafce2b4077435_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-autoscaler@sha256:b995c30d43493a8d393282c760584605951048dbe395eeac6b6b1bec269ff3ad_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-bootstrap@sha256:9a676b7e363f022a511ab07ae81242b5c6d03523db11c37b0bf47e0f0324c9d8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-capacity@sha256:24db95a9d24960c14775136419eed7dfddb7b7d70577fab77a63b64fc66d53a7_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-config-operator@sha256:3b210b7313b4853f777d19248ba746b3d29251a3409124f984ae212809930427_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-dns-operator@sha256:5f70ba7ebcee1ecb9f65c8b43280935866607fc3dee6329ed473169f2acebe05_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-image-registry-operator@sha256:5c8fa5eb3828277f31ca0d4f7aedfee8e66dc0cfa3542772e6ac13c6b131644d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-ingress-operator@sha256:b33e32eaac7d15947e32cbeb9d45e9ae3e6fbe470611ab78f28cfc99d8759b68_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-apiserver-operator@sha256:af88e84a2957ba9eeb1e5e3cdf9cf559ccb0de08d7a16c58a19c8eb805ba5a39_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-controller-manager-operator@sha256:ca1e29c0c4eb029ed4d5544d5fde000000aa007f1d8e0fcf0fc0d317b5e06784_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-scheduler-operator@sha256:6f30eebebe4b774acd19eadeae80c4a7c8ccb503389c354bc76fc0f778cefe2b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-logging-operator@sha256:7926e2be0854ff3edac0ced6950a0be04ad26d46a5da638611457c3fe0f1a19a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-machine-approver@sha256:3535b9ccd701ac3fa6b6a8339f6c10d6e74dd4d8f5f810690fa7e272ee82f837_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-monitoring-operator@sha256:05d69056c09c34d095ccedc757ecf2692690c72d2bee4e6b6afc58b01ec55d9c_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-network-operator@sha256:2561079cceff11035c216fea71c0a10622696266aa5a9323ef13806c91537a68_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-node-tuning-operator@sha256:b6fa66947d674eb2fc12b38fb9355c43c57a484d85e56dd013960a760046b793_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-openshift-apiserver-operator@sha256:1291555580ce58d7855c7b93ace6826cd2b1a22499fc5df3aad7d36a30b880ee_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:3bdcfac3e9dcd30754f1e4158706bbcef77449fc3893521c86fd793cc1f7f32a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-samples-operator@sha256:79ba26ee177bc7cd2ab89ddaa6c66b5dcfc6970dc457cc737d64b18b5d378637_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-storage-operator@sha256:95ad59eb2e2cc58f7ae6b850f648259687f266f05ac91166a39da6bf441e3e86_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-update-keys@sha256:f919d82bd99ecd768271c8ef7ad6bf6d2b5cb902410b93bbafc829c58b59a48f_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-version-operator@sha256:2d99cc15d95e08541d60ebc1966b534fda48d00ee69c7c226996ac407a813d6b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-configmap-reloader@sha256:84bb7a8504eb34ff5e4e9ca92aab960c078ededed07ab0fe79620c0b9f32a51f_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-console-operator@sha256:665d6d89d83c51de08526c08365317b3dbb9f20e1528ffb35697f6c8bd409ca3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-console@sha256:68c4a7514623c31f7fdf7058a0dcd968dc4e4a63bcf0236ff21333bfb27cc4aa_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-coredns@sha256:9a330c9540816c13ddbbc93e99107f3d2a194c79eae20d81e8b8d252e9282c14_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-deployer@sha256:ab62d8277ea2e69cf6697343c4b6bfef67f04c5f31cdf47fc510cb76969ca2ca_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-descheduler-operator@sha256:71ba5a71c71074c282634a6261825c57977abd4999cc03957b8c407808a72902_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-descheduler@sha256:f7527c56780840d4062768e88f098229effd9796639ad67f6cdf841941a7e4a1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-docker-builder@sha256:25b131fc577def1179ce8a2022211d366fa461b6afef2f566b3f177930a3d0db_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-docker-registry@sha256:f7bd292dde7bd96195b313b4c459980fe8541bd89c442a4065a0114f42f3fe46_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-dns-proxy@sha256:2c00e51829c679d3573f813b0eced5c16382966ecf609915b47a8472872bbb64_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-http-proxy@sha256:77ffd3c6dbb51743a13ce6a9cbd385602c24165848c205aca864b88af5b3c503_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-router@sha256:c46ed6f837821decadaaf07266b9d67f89b98621618bc073abdc38db51bc692a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-elasticsearch-operator@sha256:6b153238aa96aa4128de68a8df8dde185ebb930d2cee6fe1c033ff7b713fb6f9_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-etcd@sha256:3df453713db7ea9a1bd8556a0a986fcd8d8c0a4649c262b9d8652ccfe648bb1e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-grafana@sha256:4304ba0edd79f4b2b7b6f4766dd696e8fb21423ff0dc50a18388e2163d9df3de_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-haproxy-router@sha256:e0c7adba792e43e96c8d6f4e0845e2d001d0f652ece6f567b09ac481b07eafdc_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-hyperkube@sha256:150fe3e51c75f09bd366d06a96749e17cd01aa845319032c327387950b52a34e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-hypershift@sha256:48392b80092bca63f2969b14412017601ebfda1b54141db53c2bc5b2317c389a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-installer-artifacts@sha256:7f3e05fa013dead5501513b86c19719973d0f9ee5dbdd4d3f5264fe601dbf809_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-installer@sha256:7f0fb099018d7fba695adfff2c6cec1af789e3c3ccab61bb084a30ae1bdff79f_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins-agent-base@sha256:c29122b0ed52c031f5f99ddb3338b6515bc05ac1e90864dda1131dcf9af87924_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins-agent-maven@sha256:ce5dd50d7005ed2d5ef36de673a2cf2cec07ad997ed93956605fe8fc8836d15c_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins@sha256:8da877d1df3fbb0fd4df607718847382d3ab38b862f868077c8938a1a7014f71_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-k8s-prometheus-adapter@sha256:95e7924437a3d110b334b1b03c01e2a65292f092110acde1a59db280ce8c7bda_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-keepalived-ipfailover@sha256:1c0b3bde2963560aa0c50bd8365abd39bc5cfae28409fbdc60abf786546eb2e8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-proxy@sha256:3afce3e28952226f1bb959b2859050e848ed5d4549ac5e2fc267f51b11fc6ec3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-rbac-proxy@sha256:dab4af2713fa59499ee8d2cb169d636ddb425590e6924bc2c03597c0b10bd246_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-state-metrics@sha256:4ff6cd48b319093041c2fa9c32ce16c6ea4dffb1c66ef4923f9cfc108cdfe6cc_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-libvirt-machine-controllers@sha256:2446ea720c26b213b9419bd2ad867c0ca1ec6df6d972cd5ffd6037b8fe0fbc88_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-curator5@sha256:91942a469532fda2a4609f2d7ddf693cca5b2ccd8c770d0e36823f0cc67d884c_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-elasticsearch5@sha256:c4693439c2f0f114238cc4034bfc6cd17f93bb9562ac2c0f9feb30f9c657fcd7_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-eventrouter@sha256:7668a706700163a35def516d1e1be336fef418ea477ef014ba90f5317569384b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-fluentd@sha256:3ef99bc79d891b111828c6c29faa8f3cd37d8ab8897186eff2bc85824939f632_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-machine-api-operator@sha256:6dfe7c13a6ae6c6e509f0d8cd0cb6e5284f9efd8cc2c949d87a471643e730957_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-machine-config-operator@sha256:ebffd73f3e4ff92792bad0cfa5bba5bec17e2124c7618ae7c4bd49ac777b7deb_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-admission-controller@sha256:101d1c2eeebf1c5e336238056ff9415de50855363eebce3b75cf6ac562adca05_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-cni@sha256:9be2123934d7f80af6439a84b5a9887459c1655549c7790fd080e965e89049b4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-must-gather@sha256:1acef66db6179f4289fc4abbb297df32c01d3b13fd85530ac6a0d925b517c3df_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-oauth-proxy@sha256:383360705efc0605760c3b2b1d0fa288094eb6dad8158c540d950f661b4ba880_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-openstack-machine-controllers@sha256:1779881159f1548a75e4dfd8a285e6ecab2ceede42acd9d07f036ec28bf1e6f9_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-lifecycle-manager@sha256:9254b8d3097a0d067f07bcf735b3530eccc888466f99a6282aebb7bbdd9cbcc8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-marketplace@sha256:3c5b9b86c9a9cd3c11290a44e29f016fe054b7068dd5b8469956909a63813db8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-registry@sha256:5eecc9d91c1ae4f0af586aa7d97fce8a32f23dfcdd64dcc61b9c536fbf4e8663_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-ovn-kubernetes@sha256:d4234553bb7e59323ee19b5d87d189f78fb4cd747551af6a6413b88001e27e13_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-pod@sha256:40b2f3ff0b5ff873669613882579b2a714aed77e1fea4e28a26ebf2726177707_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prom-label-proxy@sha256:c77261cc981cc8a5193ca1199c0a119db5757de135f4f7f5e558744371d2bd8a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-alertmanager@sha256:ef6c822baa9167856e613e7f1c14a1b44da42a394d91b9e0407d01d769a8fb40_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-config-reloader@sha256:6c0551dd87cc7eacc18ccbac093043b1178225f64843f13435f02ae7c2b4d91e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-node-exporter@sha256:56c31eb82f202b0ab38bc600ef01ef68302a0a57b7274c9537d3518855e2da1d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-operator@sha256:a5f9da1798e6b598157343e8751eda45ead551ddfb34ac5e742c6b1d8c8bf0d4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus@sha256:38e663d919d2c96af52656b42d18556cf457b84ef3160e27496f6db36ffa92a3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-service-ca-operator@sha256:ba2867ef0021af24b6667d114983400a0f7f5824842f1e11d1cda5aa91286737_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-cni@sha256:7a129a17d719761425ce26a47eaa115789be893f4a1054e37f3c76f891157886_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-dp-admission-controller@sha256:e98327978a09c28baa5f10365d2df1e2c33bb689644d581aa6f7ff095e0c1c5d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-network-device-plugin@sha256:4dc4017eee056448d0192834de329c6563c48f625f21ca9db59b22d54db70de8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-telemeter@sha256:5abb2f8cd1758441ba75e07e0a2f1180dbda0f13e6b51993d7c945b3d91b3bef_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-tests@sha256:28866a167dd7df474b053e92de3ba9bc0d95d918180b1e676637df30c2a27ef4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/postgres-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64", "7Server-RH7-RHOSE-4.1:openshift4/postgresql-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" } ] }
rhsa-2019_2661
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the openshift and atomic-enterprise-service-catalog packages is now available for Red Hat OpenShift Container Platform 4.1.\n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Both the openshift and atomic-enterprise-service-catalog packages have been rebuilt with updates versions of golang. The golang packages provide the Go programming language compiler.\n\nSecurity Fix(es):\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:2661", "url": "https://access.redhat.com/errata/RHSA-2019:2661" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2661.json" } ], "title": "Red Hat Security Advisory: Red Hat OpenShift Container Platform 4.1 openshift RPM security update", "tracking": { "current_release_date": "2024-11-13T22:08:53+00:00", "generator": { "date": "2024-11-13T22:08:53+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2019:2661", "initial_release_date": "2019-09-11T05:53:28+00:00", "revision_history": [ { "date": "2019-09-11T05:53:28+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-09-11T05:53:28+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-13T22:08:53+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.1", "product": { "name": "Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.1::el7" } } }, { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.1", "product": { "name": "Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.1::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64", "product": { "name": "atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64", "product_id": "atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.1.14-201908290858.git.1.28cc9ff.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "atomic-enterprise-service-catalog-svcat-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64", "product": { "name": "atomic-enterprise-service-catalog-svcat-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64", "product_id": "atomic-enterprise-service-catalog-svcat-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog-svcat@4.1.14-201908290858.git.1.28cc9ff.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "product": { "name": "openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "product_id": "openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "product": { "name": "openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "product_id": "openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.1.14-201908290858.git.0.3bd3467.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "product": { "name": "openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "product_id": "openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "product": { "name": "openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "product_id": "openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "product": { "name": "openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "product_id": "openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.1.14-201908290858.git.0.3bd3467.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "product": { "name": "openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "product_id": "openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.src", "product": { "name": "atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.src", "product_id": "atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.1.14-201908290858.git.1.28cc9ff.el7?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "openshift-0:4.1.14-201908290858.git.0.3bd3467.el7.src", "product": { "name": "openshift-0:4.1.14-201908290858.git.0.3bd3467.el7.src", "product_id": "openshift-0:4.1.14-201908290858.git.0.3bd3467.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "openshift-0:4.1.14-201908290858.git.0.3bd3467.el8.src", "product": { "name": "openshift-0:4.1.14-201908290858.git.0.3bd3467.el8.src", "product_id": "openshift-0:4.1.14-201908290858.git.0.3bd3467.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.src" }, "product_reference": "atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64" }, "product_reference": "atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-svcat-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-svcat-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64" }, "product_reference": "atomic-enterprise-service-catalog-svcat-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-0:4.1.14-201908290858.git.0.3bd3467.el7.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-0:4.1.14-201908290858.git.0.3bd3467.el7.src" }, "product_reference": "openshift-0:4.1.14-201908290858.git.0.3bd3467.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64" }, "product_reference": "openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64" }, "product_reference": "openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64" }, "product_reference": "openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-0:4.1.14-201908290858.git.0.3bd3467.el8.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:openshift-0:4.1.14-201908290858.git.0.3bd3467.el8.src" }, "product_reference": "openshift-0:4.1.14-201908290858.git.0.3bd3467.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64" }, "product_reference": "openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64" }, "product_reference": "openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64" }, "product_reference": "openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.src", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-svcat-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-0:4.1.14-201908290858.git.0.3bd3467.el7.src", "7Server-RH7-RHOSE-4.1:openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "8Base-RHOSE-4.1:openshift-0:4.1.14-201908290858.git.0.3bd3467.el8.src", "8Base-RHOSE-4.1:openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "8Base-RHOSE-4.1:openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "8Base-RHOSE-4.1:openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-11T05:53:28+00:00", "details": "For OpenShift Container Platform 4.1 see the following documentation, which\nwill be updated shortly for release 4.1.14, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.1/updating/updating-cluster-cli.html.", "product_ids": [ "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.src", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-svcat-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-0:4.1.14-201908290858.git.0.3bd3467.el7.src", "7Server-RH7-RHOSE-4.1:openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "8Base-RHOSE-4.1:openshift-0:4.1.14-201908290858.git.0.3bd3467.el8.src", "8Base-RHOSE-4.1:openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "8Base-RHOSE-4.1:openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "8Base-RHOSE-4.1:openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2661" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.src", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-svcat-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-0:4.1.14-201908290858.git.0.3bd3467.el7.src", "7Server-RH7-RHOSE-4.1:openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "8Base-RHOSE-4.1:openshift-0:4.1.14-201908290858.git.0.3bd3467.el8.src", "8Base-RHOSE-4.1:openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "8Base-RHOSE-4.1:openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "8Base-RHOSE-4.1:openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.src", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-svcat-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-0:4.1.14-201908290858.git.0.3bd3467.el7.src", "7Server-RH7-RHOSE-4.1:openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "8Base-RHOSE-4.1:openshift-0:4.1.14-201908290858.git.0.3bd3467.el8.src", "8Base-RHOSE-4.1:openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "8Base-RHOSE-4.1:openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "8Base-RHOSE-4.1:openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-11T05:53:28+00:00", "details": "For OpenShift Container Platform 4.1 see the following documentation, which\nwill be updated shortly for release 4.1.14, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.1/updating/updating-cluster-cli.html.", "product_ids": [ "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.src", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-svcat-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-0:4.1.14-201908290858.git.0.3bd3467.el7.src", "7Server-RH7-RHOSE-4.1:openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "8Base-RHOSE-4.1:openshift-0:4.1.14-201908290858.git.0.3bd3467.el8.src", "8Base-RHOSE-4.1:openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "8Base-RHOSE-4.1:openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "8Base-RHOSE-4.1:openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2661" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.src", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-svcat-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-0:4.1.14-201908290858.git.0.3bd3467.el7.src", "7Server-RH7-RHOSE-4.1:openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "8Base-RHOSE-4.1:openshift-0:4.1.14-201908290858.git.0.3bd3467.el8.src", "8Base-RHOSE-4.1:openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "8Base-RHOSE-4.1:openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "8Base-RHOSE-4.1:openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" } ] }
rhsa-2020_3197
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat Process Automation Manager.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Process Automation Manager is an open source business process management suite that combines process management and decision service management and enables business and IT users to create, manage, validate, and deploy process applications and decision services.\n\nThis release of Red Hat Process Automation Manager 7.8.0 serves as an update to Red Hat Process Automation Manager 7.7.1, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* commons-beanutils: apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default (CVE-2019-10086)\n\n* netty: HTTP request smuggling (CVE-2019-20444)\n\n* netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers (CVE-2019-16869)\n\n* netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling (CVE-2020-7238)\n\n* netty: HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)\n\n* netty: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* netty: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* netty: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header (CVE-2019-20445)\n\n* cxf-core: cxf: does not restrict the number of message attachments (CVE-2019-12406)\n\n* cxf-core: cxf: OpenId Connect token service does not properly validate the clientId (CVE-2019-12423)\n\n* cxf-core: cxf: reflected XSS in the services listing page (CVE-2019-17573)\n\n* jackson-databind: lacks certain net.sf.ehcache blocking (CVE-2019-20330)\n\n* jackson-databind: Lacks certain xbean-reflect/JNDI blocking (CVE-2020-8840)\n\n* jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution (CVE-2020-10672)\n\n* jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution (CVE-2020-10673)\n\n* jackson-databind: Serialization gadgets in anteros-core (CVE-2020-9548)\n\n* jackson-databind: Serialization gadgets in commons-jelly:commons-jelly (CVE-2020-11620)\n\n* jackson-databind: Serialization gadgets in ibatis-sqlmap (CVE-2020-9547)\n\n* jackson-databind: Serialization gadgets in javax.swing.JEditorPane (CVE-2020-10969)\n\n* jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider (CVE-2020-10968)\n\n* jackson-databind: Serialization gadgets in org.apache.activemq.jms.pool.XaPooledConnectionFactory (CVE-2020-11111)\n\n* jackson-databind: Serialization gadgets in org.apache.commons.proxy.provider.remoting.RmiProvider (CVE-2020-11112)\n\n* jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime (CVE-2020-11113)\n\n* jackson-databind: Serialization gadgets in org.springframework:spring-aop (CVE-2020-11619)\n\n* jackson-databind: Serialization gadgets in shaded-hikari-config (CVE-2020-9546)\n\n* jackson-databind: serialization in com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool (CVE-2020-14062)\n\n* jackson-databind: serialization in weblogic/oracle-aqjms (CVE-2020-14061)\n\n* jackson-databind: serialization in oadd.org.apache.xalan.lib.sql.JNDIConnectionPool (CVE-2020-14060)\n\n* netty: compression/decompression codecs don\u0027t enforce limits on buffer allocation sizes (CVE-2020-11612)\n\n* quartz: libquartz: XXE attacks via job description (CVE-2019-13990)\n\n* keycloak: security issue on reset credential flow (CVE-2020-1718)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:3197", "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=rhpam\u0026version=7.8.0", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=rhpam\u0026version=7.8.0" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_process_automation_manager/7.8/html/release_notes_for_red_hat_process_automation_manager_7.8/index", "url": "https://access.redhat.com/documentation/en-us/red_hat_process_automation_manager/7.8/html/release_notes_for_red_hat_process_automation_manager_7.8/index" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "1758619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758619" }, { "category": "external", "summary": "1767483", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767483" }, { "category": "external", "summary": "1793154", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793154" }, { "category": "external", "summary": "1796225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796225" }, { "category": "external", "summary": "1796756", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796756" }, { "category": "external", "summary": "1797006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1797006" }, { "category": "external", "summary": "1797011", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1797011" }, { "category": "external", "summary": "1798509", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798509" }, { "category": "external", "summary": "1798524", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798524" }, { "category": "external", "summary": "1801149", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1801149" }, { "category": "external", "summary": "1815470", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1815470" }, { "category": "external", "summary": "1815495", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1815495" }, { "category": "external", "summary": "1816170", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816170" }, { "category": "external", "summary": "1816216", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816216" }, { "category": "external", "summary": "1816330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816330" }, { "category": "external", "summary": "1816332", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816332" }, { "category": "external", "summary": "1816337", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816337" }, { "category": "external", "summary": "1816340", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816340" }, { "category": "external", "summary": "1819208", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819208" }, { "category": "external", "summary": "1819212", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819212" }, { "category": "external", "summary": "1821304", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821304" }, { "category": "external", "summary": "1821311", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821311" }, { "category": "external", "summary": "1821315", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821315" }, { "category": "external", "summary": "1826798", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1826798" }, { "category": "external", "summary": "1826805", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1826805" }, { "category": "external", "summary": "1848960", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848960" }, { "category": "external", "summary": "1848962", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848962" }, { "category": "external", "summary": "1848966", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848966" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_3197.json" } ], "title": "Red Hat Security Advisory: Red Hat Process Automation Manager 7.8.0 Security Update", "tracking": { "current_release_date": "2024-12-29T18:38:49+00:00", "generator": { "date": "2024-12-29T18:38:49+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.4" } }, "id": "RHSA-2020:3197", "initial_release_date": "2020-07-29T06:21:49+00:00", "revision_history": [ { "date": "2020-07-29T06:21:49+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-07-29T06:21:49+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-29T18:38:49+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Process Automation 7", "product": { "name": "Red Hat Process Automation 7", "product_id": "Red Hat Process Automation 7", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_bpms_platform:7.8" } } } ], "category": "product_family", "name": "Red Hat Process Automation Manager" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9518", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735749" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using frames with an empty payload, a flood could occur that results in excessive CPU usage and starvation of other clients. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using empty frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9518" }, { "category": "external", "summary": "RHBZ#1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9518", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using empty frames results in excessive resource consumption" }, { "cve": "CVE-2019-10086", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-10-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1767483" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Apache Commons BeanUtils, where the class property in PropertyUtilsBean is not suppressed by default. This flaw allows an attacker to access the classloader.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10086" }, { "category": "external", "summary": "RHBZ#1767483", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767483" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10086", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10086" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10086", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10086" }, { "category": "external", "summary": "https://commons.apache.org/proper/commons-beanutils/javadocs/v1.9.4/RELEASE-NOTES.txt", "url": "https://commons.apache.org/proper/commons-beanutils/javadocs/v1.9.4/RELEASE-NOTES.txt" } ], "release_date": "2019-08-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "There is no currently known mitigation for this flaw.", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default" }, { "cve": "CVE-2019-12406", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-03-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816170" } ], "notes": [ { "category": "description", "text": "Apache CXF before 3.3.4 and 3.2.11 does not restrict the number of message attachments present in a given message. This leaves open the possibility of a denial of service type attack, where a malicious user crafts a message containing a very large number of message attachments. From the 3.3.4 and 3.2.11 releases, a default limit of 50 message attachments is enforced. This is configurable via the message property \"attachment-max-count\".", "title": "Vulnerability description" }, { "category": "summary", "text": "cxf: does not restrict the number of message attachments", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-12406" }, { "category": "external", "summary": "RHBZ#1816170", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816170" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-12406", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12406" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-12406", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12406" } ], "release_date": "2019-11-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "cxf: does not restrict the number of message attachments" }, { "cve": "CVE-2019-12423", "cwe": { "id": "CWE-522", "name": "Insufficiently Protected Credentials" }, "discovery_date": "2020-01-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1797006" } ], "notes": [ { "category": "description", "text": "Apache CXF ships with a OpenId Connect JWK Keys service, which allows a client to obtain the public keys in JWK format, which can then be used to verify the signature of tokens issued by the service. Typically, the service obtains the public key from a local keystore (JKS/PKCS12) by specifing the path of the keystore and the alias of the keystore entry. This case is not vulnerable. However it is also possible to obtain the keys from a JWK keystore file, by setting the configuration parameter \"rs.security.keystore.type\" to \"jwk\". For this case all keys are returned in this file \"as is\", including all private key and secret key credentials. This is an obvious security risk if the user has configured the signature keystore file with private or secret key credentials. From CXF 3.3.5 and 3.2.12, it is mandatory to specify an alias corresponding to the id of the key in the JWK file, and only this key is returned. In addition, any private key information is omitted by default. \"oct\" keys, which contain secret keys, are not returned at all.", "title": "Vulnerability description" }, { "category": "summary", "text": "cxf: OpenId Connect token service does not properly validate the clientId", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-12423" }, { "category": "external", "summary": "RHBZ#1797006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1797006" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-12423", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12423" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-12423", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12423" } ], "release_date": "2020-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "cxf: OpenId Connect token service does not properly validate the clientId" }, { "cve": "CVE-2019-13990", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "discovery_date": "2019-07-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1801149" } ], "notes": [ { "category": "description", "text": "The Terracotta Quartz Scheduler is susceptible to an XML external entity attack (XXE) through a job description. This issue stems from inadequate handling of XML external entity (XXE) declarations in the initDocumentParser function within xml/XMLSchedulingDataProcessor.java. By enticing a victim to access a maliciously crafted job description (containing XML content), a remote attacker could exploit this vulnerability to execute an XXE attack on the targeted system.", "title": "Vulnerability description" }, { "category": "summary", "text": "libquartz: XXE attacks via job description", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 uses a vulnerable version of libquartz as a dependency for Candlepin. However, the \u003cjob\u003e\u003cdescrition\u003e entry is not used, and the vulnerability can not be triggered. An update may fix the code in the future.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-13990" }, { "category": "external", "summary": "RHBZ#1801149", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1801149" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-13990", "url": "https://www.cve.org/CVERecord?id=CVE-2019-13990" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-13990", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-13990" } ], "release_date": "2019-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libquartz: XXE attacks via job description" }, { "cve": "CVE-2019-16869", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2019-09-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1758619" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty, where whitespace before the colon in HTTP headers is mishandled. This flaw allows an attacker to cause HTTP request smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that this vulnerability does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships vulnerable netty version embedded in Candlepin, however, is not directly vulnerable since HTTP requests are handled by Tomcat and not netty.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-16869" }, { "category": "external", "summary": "RHBZ#1758619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758619" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16869", "url": "https://www.cve.org/CVERecord?id=CVE-2019-16869" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16869", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16869" } ], "release_date": "2019-09-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers" }, { "cve": "CVE-2019-17573", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2020-01-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1797011" } ], "notes": [ { "category": "description", "text": "By default, Apache CXF creates a /services page containing a listing of the available endpoint names and addresses. This webpage is vulnerable to a reflected Cross-Site Scripting (XSS) attack, which allows a malicious actor to inject javascript into the web page. Please note that the attack exploits a feature which is not typically not present in modern browsers, who remove dot segments before sending the request. However, Mobile applications may be vulnerable.", "title": "Vulnerability description" }, { "category": "summary", "text": "cxf: reflected XSS in the services listing page", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-17573" }, { "category": "external", "summary": "RHBZ#1797011", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1797011" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-17573", "url": "https://www.cve.org/CVERecord?id=CVE-2019-17573" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-17573", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17573" } ], "release_date": "2020-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "Mitigate this flaw by disabling the service listing altogether; via setting the \"hide-service-list-page\" servlet parameter to \"true\".", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "cxf: reflected XSS in the services listing page" }, { "cve": "CVE-2019-20330", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-01-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1793154" } ], "notes": [ { "category": "description", "text": "FasterXML jackson-databind 2.x before 2.9.10.2 lacks certain net.sf.ehcache blocking.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: lacks certain net.sf.ehcache blocking", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20330" }, { "category": "external", "summary": "RHBZ#1793154", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793154" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20330", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20330" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20330", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20330" } ], "release_date": "2020-01-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: lacks certain net.sf.ehcache blocking" }, { "cve": "CVE-2019-20444", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1798524" } ], "notes": [ { "category": "description", "text": "A HTTP smuggling flaw was found in HttpObjectDecoder.java in Netty in versions prior to version 4.1.44. HTTP headers with an invalid fold, in this case CRLF (carriage return, line feed) without being followed by SP (space) or HTAB (horizontal tab), result in situations where headers can be misread. Data integrity is the highest threat with this vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP request smuggling", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that the previous vulnerability, CVE-2019-16869, does not pose a substantial practical threat to ElasticSearch 6. We agree that these issues would be difficult to exploit on OpenShift Container Platform so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships a vulnerable version of netty embedded in Candlepin. However, the flaw can not be triggered in that context, because HTTP requests are handled by Tomcat, not by netty. A future release may fix this.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20444" }, { "category": "external", "summary": "RHBZ#1798524", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798524" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20444", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20444" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20444", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20444" }, { "category": "external", "summary": "https://github.com/elastic/elasticsearch/issues/49396", "url": "https://github.com/elastic/elasticsearch/issues/49396" } ], "release_date": "2020-01-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP request smuggling" }, { "cve": "CVE-2019-20445", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1798509" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty before version 4.1.44, where it accepted multiple Content-Length headers and also accepted both Transfer-Encoding, as well as Content-Length headers where it should reject the message under such circumstances. In circumstances where Netty is used in the context of a server, it could result in a viable HTTP smuggling vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that the previous vulnerability, CVE-2019-16869, does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit both these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships a vulnerable version of netty embedded in Candlepin. However, the flaw can not be triggered in that context, because HTTP requests are handled by Tomcat, not by netty. A future release may fix this.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20445" }, { "category": "external", "summary": "RHBZ#1798509", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798509" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20445", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20445" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20445", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20445" } ], "release_date": "2020-01-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header" }, { "cve": "CVE-2020-1718", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2020-01-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1796756" } ], "notes": [ { "category": "description", "text": "A flaw was found in the reset credential flow in Keycloak. This flaw allows an attacker to gain unauthorized access to the application.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak: security issue on reset credential flow", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-1718" }, { "category": "external", "summary": "RHBZ#1796756", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796756" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-1718", "url": "https://www.cve.org/CVERecord?id=CVE-2020-1718" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1718", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1718" } ], "release_date": "2020-05-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "Disable reset credential flow.", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "keycloak: security issue on reset credential flow" }, { "cve": "CVE-2020-7238", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1796225" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty, where it mishandles Transfer-Encoding whitespace. This flaw allows HTTP Request Smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that the previous vulnerability, CVE-2019-16869, does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit both these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships vulnerable netty version embedded in Candlepin, however, is not directly vulnerable since HTTP requests are handled by Tomcat and not netty.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-7238" }, { "category": "external", "summary": "RHBZ#1796225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796225" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-7238", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7238" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7238", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7238" }, { "category": "external", "summary": "https://netty.io/news/2019/12/18/4-1-44-Final.html", "url": "https://netty.io/news/2019/12/18/4-1-44-Final.html" } ], "release_date": "2020-01-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling" }, { "cve": "CVE-2020-8840", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816330" } ], "notes": [ { "category": "description", "text": "A flaw was found in FasterXML jackson-databind in versions 2.0.0 through 2.9.10.2. A \"gadget\" exploit is possible due to a lack of a Java object being blocking from being deserialized. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Lacks certain xbean-reflect/JNDI blocking", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8840" }, { "category": "external", "summary": "RHBZ#1816330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816330" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8840", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8840" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8840", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8840" } ], "release_date": "2020-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Lacks certain xbean-reflect/JNDI blocking" }, { "cve": "CVE-2020-9546", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816332" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in shaded-hikari-config", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9546" }, { "category": "external", "summary": "RHBZ#1816332", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816332" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9546", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9546" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9546", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9546" } ], "release_date": "2020-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in shaded-hikari-config" }, { "cve": "CVE-2020-9547", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816337" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in ibatis-sqlmap", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9547" }, { "category": "external", "summary": "RHBZ#1816337", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816337" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9547", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9547" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9547", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9547" } ], "release_date": "2020-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in ibatis-sqlmap" }, { "cve": "CVE-2020-9548", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816340" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in anteros-core", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9548" }, { "category": "external", "summary": "RHBZ#1816340", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816340" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9548", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9548" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9548", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9548" } ], "release_date": "2020-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in anteros-core" }, { "cve": "CVE-2020-10672", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2020-03-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1815495" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10672" }, { "category": "external", "summary": "RHBZ#1815495", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1815495" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10672", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10672" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10672", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10672" } ], "release_date": "2020-03-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution" }, { "cve": "CVE-2020-10673", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2020-03-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1815470" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time. Additionally, the gadget is not available within Red Hat Openstack Platform\u0027s OpenDaylight.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10673" }, { "category": "external", "summary": "RHBZ#1815470", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1815470" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10673", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10673" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10673", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10673" } ], "release_date": "2020-03-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution" }, { "cve": "CVE-2020-10968", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1819208" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x prior to version 2.9.10.4. The interaction between serialization gadgets and typing is mishandled in the bus-proxy. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10968" }, { "category": "external", "summary": "RHBZ#1819208", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819208" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10968", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10968" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10968", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10968" } ], "release_date": "2020-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider" }, { "cve": "CVE-2020-10969", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1819212" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in javax.swing.JEditorPane", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10969" }, { "category": "external", "summary": "RHBZ#1819212", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819212" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10969", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10969" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10969", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10969" } ], "release_date": "2020-03-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in javax.swing.JEditorPane" }, { "cve": "CVE-2020-11111", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2020-03-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1821304" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.apache.activemq.jms.pool.XaPooledConnectionFactory", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11111" }, { "category": "external", "summary": "RHBZ#1821304", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821304" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11111", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11111" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11111", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11111" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/2664", "url": "https://github.com/FasterXML/jackson-databind/issues/2664" } ], "release_date": "2020-03-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in org.apache.activemq.jms.pool.XaPooledConnectionFactory" }, { "cve": "CVE-2020-11112", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2020-03-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1821311" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.apache.commons.proxy.provider.remoting.RmiProvider", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11112" }, { "category": "external", "summary": "RHBZ#1821311", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821311" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11112", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11112" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11112", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11112" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/2666", "url": "https://github.com/FasterXML/jackson-databind/issues/2666" } ], "release_date": "2020-03-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in org.apache.commons.proxy.provider.remoting.RmiProvider" }, { "cve": "CVE-2020-11113", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2020-03-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1821315" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11113" }, { "category": "external", "summary": "RHBZ#1821315", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821315" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11113", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11113" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11113", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11113" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/2670", "url": "https://github.com/FasterXML/jackson-databind/issues/2670" } ], "release_date": "2020-03-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime" }, { "cve": "CVE-2020-11612", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-03-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816216" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty in the way it handles the amount of data it compresses and decompresses. The Compression/Decompression codecs should enforce memory allocation size limits to avoid an Out of Memory Error (OOME) or exhaustion of the memory pool.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: compression/decompression codecs don\u0027t enforce limits on buffer allocation sizes", "title": "Vulnerability summary" }, { "category": "other", "text": "In OpenShift Container Platform end users don\u0027t have direct access to send requests to ElasticSearch. A user could need access to the ElasticSearch service on the internal cluster network in order to be able to send malicious requests to it.\n\n\nThird party scanners flagging Red Hat Satellite due to availability of the higher version packages in Red Hat AMQ Clients (through errata RHSA-2020:2605) compare to the qpid packages from Satellite Tools repository. qpid dependency fixed in errata RHSA-2020:2605 was for Red Hat AMQ Clients and it doesn\u0027t necessarily mean that packages from Satellite Tools are affected. These are two different products with different architecture and code-base. Updating the packages from any other repository than the Satellite-tools repository is not recommended for Satellite Customers. \n\nRed Hat Satellite 6.7 and earlier ship affected version of netty, however, there is no external connection being exposed and it is used by only Artemis to open an internal connection within the JVM. Since netty does not come into contact with untrusted data, vulnerability is not exposed in product code and there is no breach of Confidentiality, Integrity or Availability expected from this vulnerability. We may update the netty and its dependency in a future release.\n\nMore information regarding Satellite related packages can be found on KCS: https://access.redhat.com/solutions/5200591", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11612" }, { "category": "external", "summary": "RHBZ#1816216", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816216" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11612", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11612" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11612", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11612" } ], "release_date": "2020-01-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "netty: compression/decompression codecs don\u0027t enforce limits on buffer allocation sizes" }, { "cve": "CVE-2020-11619", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-04-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1826805" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.springframework:spring-aop", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11619" }, { "category": "external", "summary": "RHBZ#1826805", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1826805" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11619", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11619" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11619", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11619" } ], "release_date": "2020-04-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in org.springframework:spring-aop" }, { "cve": "CVE-2020-11620", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-04-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1826798" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in commons-jelly:commons-jelly", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11620" }, { "category": "external", "summary": "RHBZ#1826798", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1826798" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11620", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11620" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11620", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11620" } ], "release_date": "2020-04-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in commons-jelly:commons-jelly" }, { "cve": "CVE-2020-14060", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-06-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1848960" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.5. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: serialization in oadd.org.apache.xalan.lib.sql.JNDIConnectionPool", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 and Red Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.\n\nThe version of jackson-databind as shipped in Red Hat Software Collections rh-maven35 is used only while building maven, thus it does not deserialize data coming from untrusted sources, lowering the impact of the vulnerability for the Product.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14060" }, { "category": "external", "summary": "RHBZ#1848960", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848960" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14060", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14060" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14060", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14060" } ], "release_date": "2020-05-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* enableDefaultTyping()\n* @JsonTypeInfo using id.CLASS or id.MINIMAL_CLASS\n* oadd.org.apache.xalan.lib.sql.JNDIConnectionPool in classpath", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: serialization in oadd.org.apache.xalan.lib.sql.JNDIConnectionPool" }, { "cve": "CVE-2020-14061", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-06-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1848966" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.5. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: serialization in weblogic/oracle-aqjms", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 and Red Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.\n\nThe version of jackson-databind as shipped in Red Hat Software Collections rh-maven35 is used only while building maven, thus it does not deserialize data coming from untrusted sources, lowering the impact of the vulnerability for the Product.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14061" }, { "category": "external", "summary": "RHBZ#1848966", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848966" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14061", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14061" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14061", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14061" } ], "release_date": "2020-05-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* enableDefaultTyping()\n* @JsonTypeInfo using id.CLASS or id.MINIMAL_CLASS\n* oracle.jms.AQjms*ConnectionFactory in classpath", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: serialization in weblogic/oracle-aqjms" }, { "cve": "CVE-2020-14062", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-06-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1848962" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.5. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: serialization in com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 and Red Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.\n\nThe version of jackson-databind as shipped in Red Hat Software Collections rh-maven35 is used only while building maven, thus it does not deserialize data coming from untrusted sources, lowering the impact of the vulnerability for the Product.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14062" }, { "category": "external", "summary": "RHBZ#1848962", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848962" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14062", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14062" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14062", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14062" } ], "release_date": "2020-05-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* enableDefaultTyping()\n* @JsonTypeInfo using id.CLASS or id.MINIMAL_CLASS\n* com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool in classpath", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: serialization in com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool" } ] }
RHSA-2019:2796
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for skydive is now available for Red Hat OpenStack Platform 14.0 (Rocky).\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Skydive is an open source real-time network topology and protocols analyzer.\n\nSecurity Fix(es):\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:2796", "url": "https://access.redhat.com/errata/RHSA-2019:2796" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2796.json" } ], "title": "Red Hat Security Advisory: skydive security update", "tracking": { "current_release_date": "2025-03-15T19:44:06+00:00", "generator": { "date": "2025-03-15T19:44:06+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.1" } }, "id": "RHSA-2019:2796", "initial_release_date": "2019-09-19T02:32:15+00:00", "revision_history": [ { "date": "2019-09-19T02:32:15+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-09-19T02:32:15+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-03-15T19:44:06+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenStack Platform 14.0", "product": { "name": "Red Hat OpenStack Platform 14.0", "product_id": "7Server-RH7-RHOS-14.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:14::el7" } } } ], "category": "product_family", "name": "Red Hat OpenStack Platform" }, { "branches": [ { "category": "product_version", "name": "skydive-0:0.20.5-2.el7ost.ppc64le", "product": { "name": "skydive-0:0.20.5-2.el7ost.ppc64le", "product_id": "skydive-0:0.20.5-2.el7ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "skydive-agent-0:0.20.5-2.el7ost.ppc64le", "product": { "name": "skydive-agent-0:0.20.5-2.el7ost.ppc64le", "product_id": "skydive-agent-0:0.20.5-2.el7ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "skydive-analyzer-0:0.20.5-2.el7ost.ppc64le", "product": { "name": "skydive-analyzer-0:0.20.5-2.el7ost.ppc64le", "product_id": "skydive-analyzer-0:0.20.5-2.el7ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "skydive-ansible-0:0.20.5-2.el7ost.ppc64le", "product": { "name": "skydive-ansible-0:0.20.5-2.el7ost.ppc64le", "product_id": "skydive-ansible-0:0.20.5-2.el7ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "skydive-debuginfo-0:0.20.5-2.el7ost.ppc64le", "product": { "name": "skydive-debuginfo-0:0.20.5-2.el7ost.ppc64le", "product_id": "skydive-debuginfo-0:0.20.5-2.el7ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "skydive-0:0.20.5-2.el7ost.x86_64", "product": { "name": "skydive-0:0.20.5-2.el7ost.x86_64", "product_id": "skydive-0:0.20.5-2.el7ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "skydive-agent-0:0.20.5-2.el7ost.x86_64", "product": { "name": "skydive-agent-0:0.20.5-2.el7ost.x86_64", "product_id": "skydive-agent-0:0.20.5-2.el7ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "skydive-analyzer-0:0.20.5-2.el7ost.x86_64", "product": { "name": "skydive-analyzer-0:0.20.5-2.el7ost.x86_64", "product_id": "skydive-analyzer-0:0.20.5-2.el7ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "skydive-ansible-0:0.20.5-2.el7ost.x86_64", "product": { "name": "skydive-ansible-0:0.20.5-2.el7ost.x86_64", "product_id": "skydive-ansible-0:0.20.5-2.el7ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "skydive-debuginfo-0:0.20.5-2.el7ost.x86_64", "product": { "name": "skydive-debuginfo-0:0.20.5-2.el7ost.x86_64", "product_id": "skydive-debuginfo-0:0.20.5-2.el7ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "skydive-0:0.20.5-2.el7ost.src", "product": { "name": "skydive-0:0.20.5-2.el7ost.src", "product_id": "skydive-0:0.20.5-2.el7ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "skydive-selinux-0:0.20.5-2.el7ost.noarch", "product": { "name": "skydive-selinux-0:0.20.5-2.el7ost.noarch", "product_id": "skydive-selinux-0:0.20.5-2.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "skydive-0:0.20.5-2.el7ost.ppc64le as a component of Red Hat OpenStack Platform 14.0", "product_id": "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.ppc64le" }, "product_reference": "skydive-0:0.20.5-2.el7ost.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOS-14.0" }, { "category": "default_component_of", "full_product_name": { "name": "skydive-0:0.20.5-2.el7ost.src as a component of Red Hat OpenStack Platform 14.0", "product_id": "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.src" }, "product_reference": "skydive-0:0.20.5-2.el7ost.src", "relates_to_product_reference": "7Server-RH7-RHOS-14.0" }, { "category": "default_component_of", "full_product_name": { "name": "skydive-0:0.20.5-2.el7ost.x86_64 as a component of Red Hat OpenStack Platform 14.0", "product_id": "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.x86_64" }, "product_reference": "skydive-0:0.20.5-2.el7ost.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-14.0" }, { "category": "default_component_of", "full_product_name": { "name": "skydive-agent-0:0.20.5-2.el7ost.ppc64le as a component of Red Hat OpenStack Platform 14.0", "product_id": "7Server-RH7-RHOS-14.0:skydive-agent-0:0.20.5-2.el7ost.ppc64le" }, "product_reference": "skydive-agent-0:0.20.5-2.el7ost.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOS-14.0" }, { "category": "default_component_of", "full_product_name": { "name": "skydive-agent-0:0.20.5-2.el7ost.x86_64 as a component of Red Hat OpenStack Platform 14.0", "product_id": "7Server-RH7-RHOS-14.0:skydive-agent-0:0.20.5-2.el7ost.x86_64" }, "product_reference": "skydive-agent-0:0.20.5-2.el7ost.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-14.0" }, { "category": "default_component_of", "full_product_name": { "name": "skydive-analyzer-0:0.20.5-2.el7ost.ppc64le as a component of Red Hat OpenStack Platform 14.0", "product_id": "7Server-RH7-RHOS-14.0:skydive-analyzer-0:0.20.5-2.el7ost.ppc64le" }, "product_reference": "skydive-analyzer-0:0.20.5-2.el7ost.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOS-14.0" }, { "category": "default_component_of", "full_product_name": { "name": "skydive-analyzer-0:0.20.5-2.el7ost.x86_64 as a component of Red Hat OpenStack Platform 14.0", "product_id": "7Server-RH7-RHOS-14.0:skydive-analyzer-0:0.20.5-2.el7ost.x86_64" }, "product_reference": "skydive-analyzer-0:0.20.5-2.el7ost.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-14.0" }, { "category": "default_component_of", "full_product_name": { "name": "skydive-ansible-0:0.20.5-2.el7ost.ppc64le as a component of Red Hat OpenStack Platform 14.0", "product_id": "7Server-RH7-RHOS-14.0:skydive-ansible-0:0.20.5-2.el7ost.ppc64le" }, "product_reference": "skydive-ansible-0:0.20.5-2.el7ost.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOS-14.0" }, { "category": "default_component_of", "full_product_name": { "name": "skydive-ansible-0:0.20.5-2.el7ost.x86_64 as a component of Red Hat OpenStack Platform 14.0", "product_id": "7Server-RH7-RHOS-14.0:skydive-ansible-0:0.20.5-2.el7ost.x86_64" }, "product_reference": "skydive-ansible-0:0.20.5-2.el7ost.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-14.0" }, { "category": "default_component_of", "full_product_name": { "name": "skydive-debuginfo-0:0.20.5-2.el7ost.ppc64le as a component of Red Hat OpenStack Platform 14.0", "product_id": "7Server-RH7-RHOS-14.0:skydive-debuginfo-0:0.20.5-2.el7ost.ppc64le" }, "product_reference": "skydive-debuginfo-0:0.20.5-2.el7ost.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOS-14.0" }, { "category": "default_component_of", "full_product_name": { "name": "skydive-debuginfo-0:0.20.5-2.el7ost.x86_64 as a component of Red Hat OpenStack Platform 14.0", "product_id": "7Server-RH7-RHOS-14.0:skydive-debuginfo-0:0.20.5-2.el7ost.x86_64" }, "product_reference": "skydive-debuginfo-0:0.20.5-2.el7ost.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-14.0" }, { "category": "default_component_of", "full_product_name": { "name": "skydive-selinux-0:0.20.5-2.el7ost.noarch as a component of Red Hat OpenStack Platform 14.0", "product_id": "7Server-RH7-RHOS-14.0:skydive-selinux-0:0.20.5-2.el7ost.noarch" }, "product_reference": "skydive-selinux-0:0.20.5-2.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-14.0" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.src", "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-agent-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-agent-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-analyzer-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-analyzer-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-ansible-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-ansible-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-debuginfo-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-debuginfo-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-selinux-0:0.20.5-2.el7ost.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-19T02:32:15+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.src", "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-agent-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-agent-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-analyzer-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-analyzer-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-ansible-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-ansible-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-debuginfo-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-debuginfo-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-selinux-0:0.20.5-2.el7ost.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2796" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.src", "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-agent-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-agent-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-analyzer-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-analyzer-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-ansible-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-ansible-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-debuginfo-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-debuginfo-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-selinux-0:0.20.5-2.el7ost.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.src", "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-agent-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-agent-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-analyzer-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-analyzer-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-ansible-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-ansible-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-debuginfo-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-debuginfo-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-selinux-0:0.20.5-2.el7ost.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-19T02:32:15+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.src", "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-agent-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-agent-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-analyzer-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-analyzer-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-ansible-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-ansible-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-debuginfo-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-debuginfo-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-selinux-0:0.20.5-2.el7ost.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2796" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.src", "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-agent-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-agent-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-analyzer-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-analyzer-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-ansible-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-ansible-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-debuginfo-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-debuginfo-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-selinux-0:0.20.5-2.el7ost.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.src", "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-agent-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-agent-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-analyzer-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-analyzer-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-ansible-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-ansible-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-debuginfo-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-debuginfo-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-selinux-0:0.20.5-2.el7ost.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-19T02:32:15+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.src", "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-agent-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-agent-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-analyzer-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-analyzer-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-ansible-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-ansible-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-debuginfo-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-debuginfo-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-selinux-0:0.20.5-2.el7ost.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2796" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.src", "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-agent-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-agent-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-analyzer-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-analyzer-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-ansible-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-ansible-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-debuginfo-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-debuginfo-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-selinux-0:0.20.5-2.el7ost.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" } ] }
RHSA-2019:2925
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the nodejs:10 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.\n\nThe following packages have been upgraded to a later upstream version: nodejs (10.16.3).\n\nSecurity Fix(es):\n\n* HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511)\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using PRIORITY frames results in excessive resource consumption (CVE-2019-9513)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* HTTP/2: 0-length headers lead to denial of service (CVE-2019-9516)\n\n* HTTP/2: request for large response leads to denial of service (CVE-2019-9517)\n\n* HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:2925", "url": "https://access.redhat.com/errata/RHSA-2019:2925" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735741" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2925.json" } ], "title": "Red Hat Security Advisory: nodejs:10 security update", "tracking": { "current_release_date": "2025-03-17T01:37:06+00:00", "generator": { "date": "2025-03-17T01:37:06+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.1" } }, "id": "RHSA-2019:2925", "initial_release_date": "2019-09-30T15:15:54+00:00", "revision_history": [ { "date": "2019-09-30T15:15:54+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-09-30T15:15:54+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-03-17T01:37:06+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "nodejs:10:8000020190911085529:f8e95b4e", "product": { "name": "nodejs:10:8000020190911085529:f8e95b4e", "product_id": "nodejs:10:8000020190911085529:f8e95b4e", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/nodejs@10:8000020190911085529:f8e95b4e" } } }, { "category": "product_version", "name": "nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "product": { "name": "nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "product_id": "nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.0%2B4214%2B49953fda?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "product": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "product_id": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8%2B2632%2B6c5111ed?arch=noarch" } } }, { "category": "product_version", "name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "product": { "name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "product_id": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8%2B2873%2Baa7dfd9a?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "product": { "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "product_id": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.0%2B4214%2B49953fda?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "product": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "product_id": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8%2B2632%2B6c5111ed?arch=src" } } }, { "category": "product_version", "name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "product": { "name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "product_id": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8%2B2873%2Baa7dfd9a?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product": { "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product_id": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.0%2B4214%2B49953fda?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product": { "name": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product_id": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.0%2B4214%2B49953fda?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product": { "name": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product_id": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.0%2B4214%2B49953fda?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product": { "name": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product_id": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.0%2B4214%2B49953fda?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product": { "name": "nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product_id": "nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.0%2B4214%2B49953fda?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64", "product": { "name": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64", "product_id": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.0%2B4214%2B49953fda?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "product": { "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "product_id": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.0%2B4214%2B49953fda?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "product": { "name": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "product_id": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.0%2B4214%2B49953fda?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "product": { "name": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "product_id": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.0%2B4214%2B49953fda?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "product": { "name": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "product_id": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.0%2B4214%2B49953fda?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "product": { "name": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "product_id": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.0%2B4214%2B49953fda?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "product": { "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "product_id": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.0%2B4214%2B49953fda?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "product": { "name": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "product_id": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.0%2B4214%2B49953fda?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "product": { "name": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "product_id": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.0%2B4214%2B49953fda?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "product": { "name": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "product_id": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.0%2B4214%2B49953fda?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "product": { "name": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "product_id": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.0%2B4214%2B49953fda?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "product": { "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "product_id": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.0%2B4214%2B49953fda?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "product": { "name": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "product_id": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.0%2B4214%2B49953fda?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "product": { "name": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "product_id": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.0%2B4214%2B49953fda?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "product": { "name": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "product_id": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.0%2B4214%2B49953fda?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "product": { "name": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "product_id": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.0%2B4214%2B49953fda?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, "product_reference": "nodejs:10:8000020190911085529:f8e95b4e", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64 as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64" }, "product_reference": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le" }, "product_reference": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x" }, "product_reference": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src" }, "product_reference": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64 as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64" }, "product_reference": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64 as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64" }, "product_reference": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le" }, "product_reference": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x" }, "product_reference": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64 as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64" }, "product_reference": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64 as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64" }, "product_reference": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le" }, "product_reference": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x" }, "product_reference": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64 as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64" }, "product_reference": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64 as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64" }, "product_reference": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le" }, "product_reference": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x" }, "product_reference": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64 as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64" }, "product_reference": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64 as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64" }, "product_reference": "nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch" }, "product_reference": "nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch" }, "product_reference": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src" }, "product_reference": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch" }, "product_reference": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src" }, "product_reference": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64 as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64" }, "product_reference": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le" }, "product_reference": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x" }, "product_reference": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64 as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" }, "product_reference": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-5737", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-03-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1690808" } ], "notes": [ { "category": "description", "text": "It was found that the original fix for Slowloris, CVE-2018-12122, was insufficient. It is possible to bypass the server\u0027s headersTimeout by sending two specially crafted HTTP requests in the same connection. An attacker could use this flaw to bypass Slowloris protection, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Insufficient Slowloris fix causing DoS via server.headersTimeout bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-5737" }, { "category": "external", "summary": "RHBZ#1690808", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1690808" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-5737", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5737" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5737", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5737" }, { "category": "external", "summary": "https://nodejs.org/ja/blog/vulnerability/february-2019-security-releases/", "url": "https://nodejs.org/ja/blog/vulnerability/february-2019-security-releases/" } ], "release_date": "2019-02-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-30T15:15:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2925" }, { "category": "workaround", "details": "The use of a Load Balancer or a Reverse Proxy will increase the difficulty of the attack.", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs: Insufficient Slowloris fix causing DoS via server.headersTimeout bypass" }, { "cve": "CVE-2019-9511", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741860" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker can request a large amount of data by manipulating window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this queue can consume excess CPU, memory, or both, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: large amount of data requests leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "There are no mitigations available for nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "RHBZ#1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9511", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-30T15:15:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2925" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: large amount of data requests leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-30T15:15:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2925" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9513", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735741" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker, using PRIORITY frames to flood the system, could cause excessive CPU usage and starvation of other clients. The largest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PRIORITY frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for packages nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9513" }, { "category": "external", "summary": "RHBZ#1735741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735741" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9513", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9513" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9513", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9513" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nghttp2.org/blog/2019/08/19/nghttp2-v1-39-2/", "url": "https://nghttp2.org/blog/2019/08/19/nghttp2-v1-39-2/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-30T15:15:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2925" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PRIORITY frames results in excessive resource consumption" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-30T15:15:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2925" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-30T15:15:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2925" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "cve": "CVE-2019-9516", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741864" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker, sending a stream of header with a 0-length header name and a 0-length header value, could cause some implementations to allocate memory for these headers and keep the allocations alive until the session dies. The can consume excess memory, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: 0-length headers lead to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9516" }, { "category": "external", "summary": "RHBZ#1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9516", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9516" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://github.com/nghttp2/nghttp2/issues/1382#", "url": "https://github.com/nghttp2/nghttp2/issues/1382#" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-30T15:15:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2925" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: 0-length headers lead to denial of service" }, { "cve": "CVE-2019-9517", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741868" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in HTTP/2. An attacker can open a HTTP/2 window so the peer can send without constraint. The TCP window remains closed so the peer cannot write the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the server\u0027s queue is setup, the responses can consume excess memory, CPU, or both, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: request for large response leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "The package httpd versions as shipped with Red Hat Enterprise Linux 5, 6 and 7 are not affected by this issue as HTTP/2 support is not provided.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9517" }, { "category": "external", "summary": "RHBZ#1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9517", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9517" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-30T15:15:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2925" }, { "category": "workaround", "details": "The httpd version shipped with Red Hat Enterprise Linux 8 provides HTTP/2 support through mod_http2 package. While mod_http2 package is not updated, users can disable HTTP/2 support as mitigation action by executing the following steps:\n\n1. Stop httpd service:\n$ systemctl stop httpd\n\n2. Remove http/2 protocol support from configuration files:\n$ sed -i \u0027s/\\(h2\\)\\|\\(h2c\\)//g\u0027 \u003chttpd_config_file\u003e\n\n3. Validate configuration files to make sure all syntax is valid:\n$ apachectl configtest\n\n4. Restart httpd service:\n$ systemctl start httpd", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: request for large response leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9518", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735749" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using frames with an empty payload, a flood could occur that results in excessive CPU usage and starvation of other clients. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using empty frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9518" }, { "category": "external", "summary": "RHBZ#1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9518", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-30T15:15:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2925" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using empty frames results in excessive resource consumption" } ] }
rhsa-2019_3131
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat OpenShift Container Platform 4.1.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the cri-o, cri-tools, faq, ignition, openshift-external-storage and pivot RPM packages, which have been rebuilt with an updated version of golang for Red Hat OpenShift Container Platform 4.1.20.\n\nSecurity Fix(es):\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:3131", "url": "https://access.redhat.com/errata/RHSA-2019:3131" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3131.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 4.1.20 golang security update", "tracking": { "current_release_date": "2024-11-13T22:09:46+00:00", "generator": { "date": "2024-11-13T22:09:46+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2019:3131", "initial_release_date": "2019-10-16T15:36:43+00:00", "revision_history": [ { "date": "2019-10-16T15:36:43+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-10-16T15:36:43+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-13T22:09:46+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.1", "product": { "name": "Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.1::el8" } } }, { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.1", "product": { "name": "Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.1::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "product": { "name": "cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "product_id": "cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debugsource-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "product": { "name": "cri-o-debugsource-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "product_id": "cri-o-debugsource-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "product": { "name": "cri-o-debuginfo-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "product_id": "cri-o-debuginfo-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.x86_64", "product": { "name": "cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.x86_64", "product_id": "cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "ignition-0:0.32.0-2.git5941fc0.el8.x86_64", "product": { "name": "ignition-0:0.32.0-2.git5941fc0.el8.x86_64", "product_id": "ignition-0:0.32.0-2.git5941fc0.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "ignition-validate-0:0.32.0-2.git5941fc0.el8.x86_64", "product": { "name": "ignition-validate-0:0.32.0-2.git5941fc0.el8.x86_64", "product_id": "ignition-validate-0:0.32.0-2.git5941fc0.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "ignition-debugsource-0:0.32.0-2.git5941fc0.el8.x86_64", "product": { "name": "ignition-debugsource-0:0.32.0-2.git5941fc0.el8.x86_64", "product_id": "ignition-debugsource-0:0.32.0-2.git5941fc0.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "ignition-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64", "product": { "name": "ignition-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64", "product_id": "ignition-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "ignition-validate-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64", "product": { "name": "ignition-validate-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64", "product_id": "ignition-validate-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "pivot-0:0.0.5-2.el8.x86_64", "product": { "name": "pivot-0:0.0.5-2.el8.x86_64", "product_id": "pivot-0:0.0.5-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64", "product": { "name": "cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64", "product_id": "cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64", "product": { "name": "cri-o-debuginfo-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64", "product_id": "cri-o-debuginfo-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64", "product": { "name": "cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64", "product_id": "cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "cri-tools-debuginfo-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64", "product": { "name": "cri-tools-debuginfo-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64", "product_id": "cri-tools-debuginfo-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "faq-0:0.0.6-4.el7.x86_64", "product": { "name": "faq-0:0.0.6-4.el7.x86_64", "product_id": "faq-0:0.0.6-4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "faq-debuginfo-0:0.0.6-4.el7.x86_64", "product": { "name": "faq-debuginfo-0:0.0.6-4.el7.x86_64", "product_id": "faq-debuginfo-0:0.0.6-4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-external-storage-cephfs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product": { "name": "openshift-external-storage-cephfs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product_id": "openshift-external-storage-cephfs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-cephfs-provisioner@0.0.2-7.gitd3c94f0.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-external-storage-efs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product": { "name": "openshift-external-storage-efs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product_id": "openshift-external-storage-efs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-efs-provisioner@0.0.2-7.gitd3c94f0.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-external-storage-local-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product": { "name": "openshift-external-storage-local-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product_id": "openshift-external-storage-local-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-local-provisioner@0.0.2-7.gitd3c94f0.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-external-storage-manila-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product": { "name": "openshift-external-storage-manila-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product_id": "openshift-external-storage-manila-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-manila-provisioner@0.0.2-7.gitd3c94f0.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-external-storage-snapshot-controller-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product": { "name": "openshift-external-storage-snapshot-controller-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product_id": "openshift-external-storage-snapshot-controller-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-snapshot-controller@0.0.2-7.gitd3c94f0.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-external-storage-snapshot-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product": { "name": "openshift-external-storage-snapshot-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product_id": "openshift-external-storage-snapshot-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-snapshot-provisioner@0.0.2-7.gitd3c94f0.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-external-storage-debuginfo-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product": { "name": "openshift-external-storage-debuginfo-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product_id": "openshift-external-storage-debuginfo-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.src", "product": { "name": "cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.src", "product_id": "cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.src", "product": { "name": "cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.src", "product_id": "cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "ignition-0:0.32.0-2.git5941fc0.el8.src", "product": { "name": "ignition-0:0.32.0-2.git5941fc0.el8.src", "product_id": "ignition-0:0.32.0-2.git5941fc0.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "pivot-0:0.0.5-2.el8.src", "product": { "name": "pivot-0:0.0.5-2.el8.src", "product_id": "pivot-0:0.0.5-2.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.src", "product": { "name": "cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.src", "product_id": "cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.src", "product": { "name": "cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.src", "product_id": "cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "faq-0:0.0.6-4.el7.src", "product": { "name": "faq-0:0.0.6-4.el7.src", "product_id": "faq-0:0.0.6-4.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "openshift-external-storage-0:0.0.2-7.gitd3c94f0.el7.src", "product": { "name": "openshift-external-storage-0:0.0.2-7.gitd3c94f0.el7.src", "product_id": "openshift-external-storage-0:0.0.2-7.gitd3c94f0.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.src" }, "product_reference": "cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64" }, "product_reference": "cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:cri-o-debuginfo-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64" }, "product_reference": "cri-o-debuginfo-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.src" }, "product_reference": "cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64" }, "product_reference": "cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debuginfo-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:cri-tools-debuginfo-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64" }, "product_reference": "cri-tools-debuginfo-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "faq-0:0.0.6-4.el7.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:faq-0:0.0.6-4.el7.src" }, "product_reference": "faq-0:0.0.6-4.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "faq-0:0.0.6-4.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:faq-0:0.0.6-4.el7.x86_64" }, "product_reference": "faq-0:0.0.6-4.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "faq-debuginfo-0:0.0.6-4.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:faq-debuginfo-0:0.0.6-4.el7.x86_64" }, "product_reference": "faq-debuginfo-0:0.0.6-4.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-0:0.0.2-7.gitd3c94f0.el7.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-external-storage-0:0.0.2-7.gitd3c94f0.el7.src" }, "product_reference": "openshift-external-storage-0:0.0.2-7.gitd3c94f0.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-cephfs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-external-storage-cephfs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64" }, "product_reference": "openshift-external-storage-cephfs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-debuginfo-0:0.0.2-7.gitd3c94f0.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-external-storage-debuginfo-0:0.0.2-7.gitd3c94f0.el7.x86_64" }, "product_reference": "openshift-external-storage-debuginfo-0:0.0.2-7.gitd3c94f0.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-efs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-external-storage-efs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64" }, "product_reference": "openshift-external-storage-efs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-local-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-external-storage-local-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64" }, "product_reference": "openshift-external-storage-local-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-manila-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-external-storage-manila-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64" }, "product_reference": "openshift-external-storage-manila-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-snapshot-controller-0:0.0.2-7.gitd3c94f0.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-external-storage-snapshot-controller-0:0.0.2-7.gitd3c94f0.el7.x86_64" }, "product_reference": "openshift-external-storage-snapshot-controller-0:0.0.2-7.gitd3c94f0.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-snapshot-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-external-storage-snapshot-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64" }, "product_reference": "openshift-external-storage-snapshot-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.src" }, "product_reference": "cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64" }, "product_reference": "cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:cri-o-debuginfo-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64" }, "product_reference": "cri-o-debuginfo-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debugsource-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:cri-o-debugsource-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64" }, "product_reference": "cri-o-debugsource-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.src" }, "product_reference": "cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.x86_64" }, "product_reference": "cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-0:0.32.0-2.git5941fc0.el8.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:ignition-0:0.32.0-2.git5941fc0.el8.src" }, "product_reference": "ignition-0:0.32.0-2.git5941fc0.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-0:0.32.0-2.git5941fc0.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:ignition-0:0.32.0-2.git5941fc0.el8.x86_64" }, "product_reference": "ignition-0:0.32.0-2.git5941fc0.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:ignition-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64" }, "product_reference": "ignition-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-debugsource-0:0.32.0-2.git5941fc0.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:ignition-debugsource-0:0.32.0-2.git5941fc0.el8.x86_64" }, "product_reference": "ignition-debugsource-0:0.32.0-2.git5941fc0.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-validate-0:0.32.0-2.git5941fc0.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:ignition-validate-0:0.32.0-2.git5941fc0.el8.x86_64" }, "product_reference": "ignition-validate-0:0.32.0-2.git5941fc0.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-validate-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:ignition-validate-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64" }, "product_reference": "ignition-validate-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "pivot-0:0.0.5-2.el8.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:pivot-0:0.0.5-2.el8.src" }, "product_reference": "pivot-0:0.0.5-2.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "pivot-0:0.0.5-2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:pivot-0:0.0.5-2.el8.x86_64" }, "product_reference": "pivot-0:0.0.5-2.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.1:cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.src", "7Server-RH7-RHOSE-4.1:cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64", "7Server-RH7-RHOSE-4.1:cri-o-debuginfo-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64", "7Server-RH7-RHOSE-4.1:cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.src", "7Server-RH7-RHOSE-4.1:cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64", "7Server-RH7-RHOSE-4.1:cri-tools-debuginfo-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64", "7Server-RH7-RHOSE-4.1:faq-0:0.0.6-4.el7.src", "7Server-RH7-RHOSE-4.1:faq-0:0.0.6-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:faq-debuginfo-0:0.0.6-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-0:0.0.2-7.gitd3c94f0.el7.src", "7Server-RH7-RHOSE-4.1:openshift-external-storage-cephfs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-debuginfo-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-efs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-local-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-manila-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-snapshot-controller-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-snapshot-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "8Base-RHOSE-4.1:cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.src", "8Base-RHOSE-4.1:cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "8Base-RHOSE-4.1:cri-o-debuginfo-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "8Base-RHOSE-4.1:cri-o-debugsource-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "8Base-RHOSE-4.1:cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.src", "8Base-RHOSE-4.1:cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.x86_64", "8Base-RHOSE-4.1:ignition-0:0.32.0-2.git5941fc0.el8.src", "8Base-RHOSE-4.1:ignition-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-debugsource-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-validate-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-validate-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:pivot-0:0.0.5-2.el8.src", "8Base-RHOSE-4.1:pivot-0:0.0.5-2.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-16T15:36:43+00:00", "details": "For OpenShift Container Platform 4.1 see the following documentation, which\nwill be updated shortly for release 4.1.20, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-release-notes.html", "product_ids": [ "7Server-RH7-RHOSE-4.1:cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.src", "7Server-RH7-RHOSE-4.1:cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64", "7Server-RH7-RHOSE-4.1:cri-o-debuginfo-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64", "7Server-RH7-RHOSE-4.1:cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.src", "7Server-RH7-RHOSE-4.1:cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64", "7Server-RH7-RHOSE-4.1:cri-tools-debuginfo-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64", "7Server-RH7-RHOSE-4.1:faq-0:0.0.6-4.el7.src", "7Server-RH7-RHOSE-4.1:faq-0:0.0.6-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:faq-debuginfo-0:0.0.6-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-0:0.0.2-7.gitd3c94f0.el7.src", "7Server-RH7-RHOSE-4.1:openshift-external-storage-cephfs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-debuginfo-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-efs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-local-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-manila-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-snapshot-controller-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-snapshot-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "8Base-RHOSE-4.1:cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.src", "8Base-RHOSE-4.1:cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "8Base-RHOSE-4.1:cri-o-debuginfo-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "8Base-RHOSE-4.1:cri-o-debugsource-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "8Base-RHOSE-4.1:cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.src", "8Base-RHOSE-4.1:cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.x86_64", "8Base-RHOSE-4.1:ignition-0:0.32.0-2.git5941fc0.el8.src", "8Base-RHOSE-4.1:ignition-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-debugsource-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-validate-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-validate-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:pivot-0:0.0.5-2.el8.src", "8Base-RHOSE-4.1:pivot-0:0.0.5-2.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3131" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-4.1:cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.src", "7Server-RH7-RHOSE-4.1:cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64", "7Server-RH7-RHOSE-4.1:cri-o-debuginfo-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64", "7Server-RH7-RHOSE-4.1:cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.src", "7Server-RH7-RHOSE-4.1:cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64", "7Server-RH7-RHOSE-4.1:cri-tools-debuginfo-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64", "7Server-RH7-RHOSE-4.1:faq-0:0.0.6-4.el7.src", "7Server-RH7-RHOSE-4.1:faq-0:0.0.6-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:faq-debuginfo-0:0.0.6-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-0:0.0.2-7.gitd3c94f0.el7.src", "7Server-RH7-RHOSE-4.1:openshift-external-storage-cephfs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-debuginfo-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-efs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-local-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-manila-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-snapshot-controller-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-snapshot-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "8Base-RHOSE-4.1:cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.src", "8Base-RHOSE-4.1:cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "8Base-RHOSE-4.1:cri-o-debuginfo-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "8Base-RHOSE-4.1:cri-o-debugsource-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "8Base-RHOSE-4.1:cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.src", "8Base-RHOSE-4.1:cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.x86_64", "8Base-RHOSE-4.1:ignition-0:0.32.0-2.git5941fc0.el8.src", "8Base-RHOSE-4.1:ignition-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-debugsource-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-validate-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-validate-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:pivot-0:0.0.5-2.el8.src", "8Base-RHOSE-4.1:pivot-0:0.0.5-2.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.1:cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.src", "7Server-RH7-RHOSE-4.1:cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64", "7Server-RH7-RHOSE-4.1:cri-o-debuginfo-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64", "7Server-RH7-RHOSE-4.1:cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.src", "7Server-RH7-RHOSE-4.1:cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64", "7Server-RH7-RHOSE-4.1:cri-tools-debuginfo-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64", "7Server-RH7-RHOSE-4.1:faq-0:0.0.6-4.el7.src", "7Server-RH7-RHOSE-4.1:faq-0:0.0.6-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:faq-debuginfo-0:0.0.6-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-0:0.0.2-7.gitd3c94f0.el7.src", "7Server-RH7-RHOSE-4.1:openshift-external-storage-cephfs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-debuginfo-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-efs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-local-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-manila-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-snapshot-controller-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-snapshot-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "8Base-RHOSE-4.1:cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.src", "8Base-RHOSE-4.1:cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "8Base-RHOSE-4.1:cri-o-debuginfo-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "8Base-RHOSE-4.1:cri-o-debugsource-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "8Base-RHOSE-4.1:cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.src", "8Base-RHOSE-4.1:cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.x86_64", "8Base-RHOSE-4.1:ignition-0:0.32.0-2.git5941fc0.el8.src", "8Base-RHOSE-4.1:ignition-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-debugsource-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-validate-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-validate-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:pivot-0:0.0.5-2.el8.src", "8Base-RHOSE-4.1:pivot-0:0.0.5-2.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-16T15:36:43+00:00", "details": "For OpenShift Container Platform 4.1 see the following documentation, which\nwill be updated shortly for release 4.1.20, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-release-notes.html", "product_ids": [ "7Server-RH7-RHOSE-4.1:cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.src", "7Server-RH7-RHOSE-4.1:cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64", "7Server-RH7-RHOSE-4.1:cri-o-debuginfo-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64", "7Server-RH7-RHOSE-4.1:cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.src", "7Server-RH7-RHOSE-4.1:cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64", "7Server-RH7-RHOSE-4.1:cri-tools-debuginfo-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64", "7Server-RH7-RHOSE-4.1:faq-0:0.0.6-4.el7.src", "7Server-RH7-RHOSE-4.1:faq-0:0.0.6-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:faq-debuginfo-0:0.0.6-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-0:0.0.2-7.gitd3c94f0.el7.src", "7Server-RH7-RHOSE-4.1:openshift-external-storage-cephfs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-debuginfo-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-efs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-local-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-manila-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-snapshot-controller-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-snapshot-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "8Base-RHOSE-4.1:cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.src", "8Base-RHOSE-4.1:cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "8Base-RHOSE-4.1:cri-o-debuginfo-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "8Base-RHOSE-4.1:cri-o-debugsource-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "8Base-RHOSE-4.1:cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.src", "8Base-RHOSE-4.1:cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.x86_64", "8Base-RHOSE-4.1:ignition-0:0.32.0-2.git5941fc0.el8.src", "8Base-RHOSE-4.1:ignition-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-debugsource-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-validate-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-validate-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:pivot-0:0.0.5-2.el8.src", "8Base-RHOSE-4.1:pivot-0:0.0.5-2.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3131" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-4.1:cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.src", "7Server-RH7-RHOSE-4.1:cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64", "7Server-RH7-RHOSE-4.1:cri-o-debuginfo-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64", "7Server-RH7-RHOSE-4.1:cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.src", "7Server-RH7-RHOSE-4.1:cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64", "7Server-RH7-RHOSE-4.1:cri-tools-debuginfo-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64", "7Server-RH7-RHOSE-4.1:faq-0:0.0.6-4.el7.src", "7Server-RH7-RHOSE-4.1:faq-0:0.0.6-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:faq-debuginfo-0:0.0.6-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-0:0.0.2-7.gitd3c94f0.el7.src", "7Server-RH7-RHOSE-4.1:openshift-external-storage-cephfs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-debuginfo-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-efs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-local-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-manila-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-snapshot-controller-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-snapshot-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "8Base-RHOSE-4.1:cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.src", "8Base-RHOSE-4.1:cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "8Base-RHOSE-4.1:cri-o-debuginfo-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "8Base-RHOSE-4.1:cri-o-debugsource-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "8Base-RHOSE-4.1:cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.src", "8Base-RHOSE-4.1:cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.x86_64", "8Base-RHOSE-4.1:ignition-0:0.32.0-2.git5941fc0.el8.src", "8Base-RHOSE-4.1:ignition-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-debugsource-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-validate-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-validate-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:pivot-0:0.0.5-2.el8.src", "8Base-RHOSE-4.1:pivot-0:0.0.5-2.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" } ] }
RHSA-2019:2682
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for go-toolset-1.11 and go-toolset-1.11-golang is now available for Red Hat Developer Tools.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.\n\nSecurity Fix(es):\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:2682", "url": "https://access.redhat.com/errata/RHSA-2019:2682" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2682.json" } ], "title": "Red Hat Security Advisory: go-toolset-1.11 and go-toolset-1.11-golang security update", "tracking": { "current_release_date": "2025-03-15T19:44:08+00:00", "generator": { "date": "2025-03-15T19:44:08+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.1" } }, "id": "RHSA-2019:2682", "initial_release_date": "2019-09-10T17:47:41+00:00", "revision_history": [ { "date": "2019-09-10T17:47:41+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-09-10T17:47:41+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-03-15T19:44:08+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:devtools:2019" } } }, { "category": "product_name", "name": "Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:devtools:2019" } } }, { "category": "product_name", "name": "Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:devtools:2019" } } } ], "category": "product_family", "name": "Red Hat Developer Tools" }, { "branches": [ { "category": "product_version", "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "product": { "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "product_id": "go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "product": { "name": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "product_id": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "product": { "name": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "product_id": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "product": { "name": "go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "product_id": "go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "product": { "name": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "product_id": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "product": { "name": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "product_id": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-1.11-0:1.11.13-1.el7.x86_64", "product": { "name": "go-toolset-1.11-0:1.11.13-1.el7.x86_64", "product_id": "go-toolset-1.11-0:1.11.13-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "product": { "name": "go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "product_id": "go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "product": { "name": "go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "product_id": "go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64", "product": { "name": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64", "product_id": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.src", "product": { "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.src", "product_id": "go-toolset-1.11-golang-0:1.11.13-2.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "go-toolset-1.11-0:1.11.13-1.el7.src", "product": { "name": "go-toolset-1.11-0:1.11.13-1.el7.src", "product_id": "go-toolset-1.11-0:1.11.13-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "product": { "name": "go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "product_id": "go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "product": { "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "product_id": "go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "product": { "name": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "product_id": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "product": { "name": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "product_id": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "product": { "name": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "product_id": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "product": { "name": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "product_id": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "product": { "name": "go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "product_id": "go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "product": { "name": "go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "product_id": "go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "product": { "name": "go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "product_id": "go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "product": { "name": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "product_id": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "product": { "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "product_id": "go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=s390x" } } }, { "category": "product_version", "name": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "product": { "name": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "product_id": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=s390x" } } }, { "category": "product_version", "name": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "product": { "name": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "product_id": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=s390x" } } }, { "category": "product_version", "name": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "product": { "name": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "product_id": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=s390x" } } }, { "category": "product_version", "name": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "product": { "name": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "product_id": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=s390x" } } }, { "category": "product_version", "name": "go-toolset-1.11-0:1.11.13-1.el7.s390x", "product": { "name": "go-toolset-1.11-0:1.11.13-1.el7.s390x", "product_id": "go-toolset-1.11-0:1.11.13-1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=s390x" } } }, { "category": "product_version", "name": "go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "product": { "name": "go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "product_id": "go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=s390x" } } }, { "category": "product_version", "name": "go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "product": { "name": "go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "product_id": "go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=s390x" } } }, { "category": "product_version", "name": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "product": { "name": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "product_id": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "product": { "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "product_id": "go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=aarch64" } } }, { "category": "product_version", "name": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "product": { "name": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "product_id": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=aarch64" } } }, { "category": "product_version", "name": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "product": { "name": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "product_id": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=aarch64" } } }, { "category": "product_version", "name": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "product": { "name": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "product_id": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=aarch64" } } }, { "category": "product_version", "name": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "product": { "name": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "product_id": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=aarch64" } } }, { "category": "product_version", "name": "go-toolset-1.11-0:1.11.13-1.el7.aarch64", "product": { "name": "go-toolset-1.11-0:1.11.13-1.el7.aarch64", "product_id": "go-toolset-1.11-0:1.11.13-1.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=aarch64" } } }, { "category": "product_version", "name": "go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "product": { "name": "go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "product_id": "go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=aarch64" } } }, { "category": "product_version", "name": "go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "product": { "name": "go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "product_id": "go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=aarch64" } } }, { "category": "product_version", "name": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "product": { "name": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "product_id": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-0:1.11.13-1.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64" }, "product_reference": "go-toolset-1.11-0:1.11.13-1.el7.aarch64", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-0:1.11.13-1.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le" }, "product_reference": "go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-0:1.11.13-1.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x" }, "product_reference": "go-toolset-1.11-0:1.11.13-1.el7.s390x", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-0:1.11.13-1.el7.src as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src" }, "product_reference": "go-toolset-1.11-0:1.11.13-1.el7.src", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-0:1.11.13-1.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64" }, "product_reference": "go-toolset-1.11-0:1.11.13-1.el7.x86_64", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-build-0:1.11.13-1.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64" }, "product_reference": "go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le" }, "product_reference": "go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-build-0:1.11.13-1.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x" }, "product_reference": "go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-build-0:1.11.13-1.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64" }, "product_reference": "go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64" }, "product_reference": "go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le" }, "product_reference": "go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x" }, "product_reference": "go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.src as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src" }, "product_reference": "go-toolset-1.11-golang-0:1.11.13-2.el7.src", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64" }, "product_reference": "go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64" }, "product_reference": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le" }, "product_reference": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x" }, "product_reference": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64" }, "product_reference": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch" }, "product_reference": "go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64" }, "product_reference": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le" }, "product_reference": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x" }, "product_reference": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64" }, "product_reference": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64" }, "product_reference": "go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64" }, "product_reference": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le" }, "product_reference": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x" }, "product_reference": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64" }, "product_reference": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64" }, "product_reference": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le" }, "product_reference": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x" }, "product_reference": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64" }, "product_reference": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64" }, "product_reference": "go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le" }, "product_reference": "go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x" }, "product_reference": "go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64" }, "product_reference": "go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64" }, "product_reference": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le" }, "product_reference": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x" }, "product_reference": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64" }, "product_reference": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-0:1.11.13-1.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64" }, "product_reference": "go-toolset-1.11-0:1.11.13-1.el7.aarch64", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-0:1.11.13-1.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le" }, "product_reference": "go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-0:1.11.13-1.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x" }, "product_reference": "go-toolset-1.11-0:1.11.13-1.el7.s390x", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-0:1.11.13-1.el7.src as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src" }, "product_reference": "go-toolset-1.11-0:1.11.13-1.el7.src", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-0:1.11.13-1.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64" }, "product_reference": "go-toolset-1.11-0:1.11.13-1.el7.x86_64", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-build-0:1.11.13-1.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64" }, "product_reference": "go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le" }, "product_reference": "go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-build-0:1.11.13-1.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x" }, "product_reference": "go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-build-0:1.11.13-1.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64" }, "product_reference": "go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64" }, "product_reference": "go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le" }, "product_reference": "go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x" }, "product_reference": "go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.src as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src" }, "product_reference": "go-toolset-1.11-golang-0:1.11.13-2.el7.src", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64" }, "product_reference": "go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64" }, "product_reference": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le" }, "product_reference": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x" }, "product_reference": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64" }, "product_reference": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch" }, "product_reference": "go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64" }, "product_reference": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le" }, "product_reference": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x" }, "product_reference": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64" }, "product_reference": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64" }, "product_reference": "go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64" }, "product_reference": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le" }, "product_reference": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x" }, "product_reference": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64" }, "product_reference": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64" }, "product_reference": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le" }, "product_reference": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x" }, "product_reference": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64" }, "product_reference": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64" }, "product_reference": "go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le" }, "product_reference": "go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x" }, "product_reference": "go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64" }, "product_reference": "go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64" }, "product_reference": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le" }, "product_reference": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x" }, "product_reference": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64" }, "product_reference": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-0:1.11.13-1.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64" }, "product_reference": "go-toolset-1.11-0:1.11.13-1.el7.aarch64", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-0:1.11.13-1.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le" }, "product_reference": "go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-0:1.11.13-1.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x" }, "product_reference": "go-toolset-1.11-0:1.11.13-1.el7.s390x", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-0:1.11.13-1.el7.src as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src" }, "product_reference": "go-toolset-1.11-0:1.11.13-1.el7.src", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-0:1.11.13-1.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64" }, "product_reference": "go-toolset-1.11-0:1.11.13-1.el7.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-build-0:1.11.13-1.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64" }, "product_reference": "go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le" }, "product_reference": "go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-build-0:1.11.13-1.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x" }, "product_reference": "go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-build-0:1.11.13-1.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64" }, "product_reference": "go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64" }, "product_reference": "go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le" }, "product_reference": "go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x" }, "product_reference": "go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.src as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src" }, "product_reference": "go-toolset-1.11-golang-0:1.11.13-2.el7.src", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64" }, "product_reference": "go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64" }, "product_reference": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le" }, "product_reference": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x" }, "product_reference": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64" }, "product_reference": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch" }, "product_reference": "go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64" }, "product_reference": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le" }, "product_reference": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x" }, "product_reference": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64" }, "product_reference": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64" }, "product_reference": "go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64" }, "product_reference": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le" }, "product_reference": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x" }, "product_reference": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64" }, "product_reference": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64" }, "product_reference": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le" }, "product_reference": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x" }, "product_reference": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64" }, "product_reference": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64" }, "product_reference": "go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le" }, "product_reference": "go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x" }, "product_reference": "go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64" }, "product_reference": "go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64" }, "product_reference": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le" }, "product_reference": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x" }, "product_reference": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64" }, "product_reference": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2019.3" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-10T17:47:41+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2682" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-10T17:47:41+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2682" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" } ] }
rhsa-2019_2769
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An security update is now available for Red Hat OpenShift Container Platform 3.9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private cloud deployments.\n\nThis advisory contains RPM packages for Red Hat OpenShift Container\nPlatform 3.9, which have been rebuilt with an updated version of golang.\n\nSecurity Fix(es):\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* kubernetes: API server allows access to cluster-scoped custom resources as if resources were namespaced (CVE-2019-11247)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:2769", "url": "https://access.redhat.com/errata/RHSA-2019:2769" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1732192", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1732192" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2769.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 3.9 security update", "tracking": { "current_release_date": "2024-11-22T13:35:47+00:00", "generator": { "date": "2024-11-22T13:35:47+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2019:2769", "initial_release_date": "2019-10-24T21:31:32+00:00", "revision_history": [ { "date": "2019-10-24T21:31:32+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-10-24T21:31:32+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T13:35:47+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 3.9", "product": { "name": "Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:3.9::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "cri-o-0:1.9.16-3.git858756d.el7.x86_64", "product": { "name": "cri-o-0:1.9.16-3.git858756d.el7.x86_64", "product_id": "cri-o-0:1.9.16-3.git858756d.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.9.16-3.git858756d.el7.x86_64", "product": { "name": "cri-o-debuginfo-0:1.9.16-3.git858756d.el7.x86_64", "product_id": "cri-o-debuginfo-0:1.9.16-3.git858756d.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.x86_64", "product": { "name": "golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.x86_64", "product_id": "golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-external-storage-efs-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "product": { "name": "openshift-external-storage-efs-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "product_id": "openshift-external-storage-efs-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-efs-provisioner@0.0.1-9.git78d6339.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-external-storage-local-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "product": { "name": "openshift-external-storage-local-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "product_id": "openshift-external-storage-local-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-local-provisioner@0.0.1-9.git78d6339.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-external-storage-snapshot-controller-0:0.0.1-9.git78d6339.el7.x86_64", "product": { "name": "openshift-external-storage-snapshot-controller-0:0.0.1-9.git78d6339.el7.x86_64", "product_id": "openshift-external-storage-snapshot-controller-0:0.0.1-9.git78d6339.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-snapshot-controller@0.0.1-9.git78d6339.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-external-storage-snapshot-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "product": { "name": "openshift-external-storage-snapshot-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "product_id": "openshift-external-storage-snapshot-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-snapshot-provisioner@0.0.1-9.git78d6339.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-external-storage-debuginfo-0:0.0.1-9.git78d6339.el7.x86_64", "product": { "name": "openshift-external-storage-debuginfo-0:0.0.1-9.git78d6339.el7.x86_64", "product_id": "openshift-external-storage-debuginfo-0:0.0.1-9.git78d6339.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-0:3.9.101-1.git.0.150f595.el7.x86_64", "product": { "name": "atomic-openshift-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_id": "atomic-openshift-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-clients-0:3.9.101-1.git.0.150f595.el7.x86_64", "product": { "name": "atomic-openshift-clients-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_id": "atomic-openshift-clients-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-clients-redistributable-0:3.9.101-1.git.0.150f595.el7.x86_64", "product": { "name": "atomic-openshift-clients-redistributable-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_id": "atomic-openshift-clients-redistributable-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-clients-redistributable@3.9.101-1.git.0.150f595.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-cluster-capacity-0:3.9.101-1.git.0.150f595.el7.x86_64", "product": { "name": "atomic-openshift-cluster-capacity-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_id": "atomic-openshift-cluster-capacity-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-federation-services-0:3.9.101-1.git.0.150f595.el7.x86_64", "product": { "name": "atomic-openshift-federation-services-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_id": "atomic-openshift-federation-services-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-master-0:3.9.101-1.git.0.150f595.el7.x86_64", "product": { "name": "atomic-openshift-master-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_id": "atomic-openshift-master-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-node-0:3.9.101-1.git.0.150f595.el7.x86_64", "product": { "name": "atomic-openshift-node-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_id": "atomic-openshift-node-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-pod-0:3.9.101-1.git.0.150f595.el7.x86_64", "product": { "name": "atomic-openshift-pod-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_id": "atomic-openshift-pod-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-sdn-ovs-0:3.9.101-1.git.0.150f595.el7.x86_64", "product": { "name": "atomic-openshift-sdn-ovs-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_id": "atomic-openshift-sdn-ovs-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-service-catalog-0:3.9.101-1.git.0.150f595.el7.x86_64", "product": { "name": "atomic-openshift-service-catalog-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_id": "atomic-openshift-service-catalog-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-template-service-broker-0:3.9.101-1.git.0.150f595.el7.x86_64", "product": { "name": "atomic-openshift-template-service-broker-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_id": "atomic-openshift-template-service-broker-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-template-service-broker@3.9.101-1.git.0.150f595.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-tests-0:3.9.101-1.git.0.150f595.el7.x86_64", "product": { "name": "atomic-openshift-tests-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_id": "atomic-openshift-tests-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.x86_64", "product": { "name": "atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.x86_64", "product_id": "atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-dockerregistry-0:3.9.101-1.git.1.13625cf.el7.x86_64", "product": { "name": "atomic-openshift-dockerregistry-0:3.9.101-1.git.1.13625cf.el7.x86_64", "product_id": "atomic-openshift-dockerregistry-0:3.9.101-1.git.1.13625cf.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "prometheus-node-exporter-0:3.9.101-1.git.1.8295224.el7.x86_64", "product": { "name": "prometheus-node-exporter-0:3.9.101-1.git.1.8295224.el7.x86_64", "product_id": "prometheus-node-exporter-0:3.9.101-1.git.1.8295224.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "product": { "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "product_id": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-openshift-prometheus-alert-buffer@0-3.gitceca8c1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "ansible-service-broker-0:1.1.20-2.el7.x86_64", "product": { "name": "ansible-service-broker-0:1.1.20-2.el7.x86_64", "product_id": "ansible-service-broker-0:1.1.20-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "heapster-0:1.3.0-4.el7.x86_64", "product": { "name": "heapster-0:1.3.0-4.el7.x86_64", "product_id": "heapster-0:1.3.0-4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "product": { "name": "hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "product_id": "hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-eventrouter-0:0.1-3.git5bd9251.el7.x86_64", "product": { "name": "openshift-eventrouter-0:0.1-3.git5bd9251.el7.x86_64", "product_id": "openshift-eventrouter-0:0.1-3.git5bd9251.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-eventrouter-debuginfo-0:0.1-3.git5bd9251.el7.x86_64", "product": { "name": "openshift-eventrouter-debuginfo-0:0.1-3.git5bd9251.el7.x86_64", "product_id": "openshift-eventrouter-debuginfo-0:0.1-3.git5bd9251.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "product": { "name": "cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "product_id": "cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "cri-tools-debuginfo-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "product": { "name": "cri-tools-debuginfo-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "product_id": "cri-tools-debuginfo-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.5.2-6.el7.x86_64", "product": { "name": "containernetworking-plugins-0:0.5.2-6.el7.x86_64", "product_id": "containernetworking-plugins-0:0.5.2-6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.5.2-6.el7.x86_64", "product": { "name": "containernetworking-plugins-debuginfo-0:0.5.2-6.el7.x86_64", "product_id": "containernetworking-plugins-debuginfo-0:0.5.2-6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "product": { "name": "golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "product_id": "golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "product": { "name": "prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "product_id": "prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "image-inspector-0:2.1.3-2.el7.x86_64", "product": { "name": "image-inspector-0:2.1.3-2.el7.x86_64", "product_id": "image-inspector-0:2.1.3-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "openvswitch-ovn-kubernetes-0:0.1.0-3.el7.x86_64", "product": { "name": "openvswitch-ovn-kubernetes-0:0.1.0-3.el7.x86_64", "product_id": "openvswitch-ovn-kubernetes-0:0.1.0-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.x86_64", "product": { "name": "openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.x86_64", "product_id": "openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.x86_64", "product": { "name": "atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.x86_64", "product_id": "atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.x86_64", "product": { "name": "atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.x86_64", "product_id": "atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-node-problem-detector@3.9.13-2.git.167.5d6b0d4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.x86_64", "product": { "name": "prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.x86_64", "product_id": "prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "prometheus-0:2.2.1-2.gitbc6058c.el7.x86_64", "product": { "name": "prometheus-0:2.2.1-2.gitbc6058c.el7.x86_64", "product_id": "prometheus-0:2.2.1-2.gitbc6058c.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "product": { "name": "cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "product_id": "cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "product": { "name": "cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "product_id": "cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "cri-o-0:1.9.16-3.git858756d.el7.src", "product": { "name": "cri-o-0:1.9.16-3.git858756d.el7.src", "product_id": "cri-o-0:1.9.16-3.git858756d.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.src", "product": { "name": "golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.src", "product_id": "golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "openshift-external-storage-0:0.0.1-9.git78d6339.el7.src", "product": { "name": "openshift-external-storage-0:0.0.1-9.git78d6339.el7.src", "product_id": "openshift-external-storage-0:0.0.1-9.git78d6339.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-0:3.9.101-1.git.0.150f595.el7.src", "product": { "name": "atomic-openshift-0:3.9.101-1.git.0.150f595.el7.src", "product_id": "atomic-openshift-0:3.9.101-1.git.0.150f595.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.src", "product": { "name": "atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.src", "product_id": "atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "golang-github-prometheus-node_exporter-0:3.9.101-1.git.1.8295224.el7.src", "product": { "name": "golang-github-prometheus-node_exporter-0:3.9.101-1.git.1.8295224.el7.src", "product_id": "golang-github-prometheus-node_exporter-0:3.9.101-1.git.1.8295224.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-prometheus-node_exporter@3.9.101-1.git.1.8295224.el7?arch=src" } } }, { "category": "product_version", "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "product": { "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "product_id": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-openshift-prometheus-alert-buffer@0-3.gitceca8c1.el7?arch=src" } } }, { "category": "product_version", "name": "ansible-service-broker-0:1.1.20-2.el7.src", "product": { "name": "ansible-service-broker-0:1.1.20-2.el7.src", "product_id": "ansible-service-broker-0:1.1.20-2.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "heapster-0:1.3.0-4.el7.src", "product": { "name": "heapster-0:1.3.0-4.el7.src", "product_id": "heapster-0:1.3.0-4.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "hawkular-openshift-agent-0:1.2.2-3.el7.src", "product": { "name": "hawkular-openshift-agent-0:1.2.2-3.el7.src", "product_id": "hawkular-openshift-agent-0:1.2.2-3.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "openshift-eventrouter-0:0.1-3.git5bd9251.el7.src", "product": { "name": "openshift-eventrouter-0:0.1-3.git5bd9251.el7.src", "product_id": "openshift-eventrouter-0:0.1-3.git5bd9251.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.src", "product": { "name": "cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.src", "product_id": "cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.5.2-6.el7.src", "product": { "name": "containernetworking-plugins-0:0.5.2-6.el7.src", "product_id": "containernetworking-plugins-0:0.5.2-6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "product": { "name": "golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "product_id": "golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "image-inspector-0:2.1.3-2.el7.src", "product": { "name": "image-inspector-0:2.1.3-2.el7.src", "product_id": "image-inspector-0:2.1.3-2.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "openvswitch-ovn-kubernetes-0:0.1.0-3.el7.src", "product": { "name": "openvswitch-ovn-kubernetes-0:0.1.0-3.el7.src", "product_id": "openvswitch-ovn-kubernetes-0:0.1.0-3.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.src", "product": { "name": "openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.src", "product_id": "openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.src", "product": { "name": "atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.src", "product_id": "atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.src", "product": { "name": "atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.src", "product_id": "atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-node-problem-detector@3.9.13-2.git.167.5d6b0d4.el7?arch=src" } } }, { "category": "product_version", "name": "golang-github-prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.src", "product": { "name": "golang-github-prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.src", "product_id": "golang-github-prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "golang-github-prometheus-prometheus-0:2.2.1-2.gitbc6058c.el7.src", "product": { "name": "golang-github-prometheus-prometheus-0:2.2.1-2.gitbc6058c.el7.src", "product_id": "golang-github-prometheus-prometheus-0:2.2.1-2.gitbc6058c.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "cockpit-0:195-2.rhaos.el7.src", "product": { "name": "cockpit-0:195-2.rhaos.el7.src", "product_id": "cockpit-0:195-2.rhaos.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "atomic-openshift-docker-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "product": { "name": "atomic-openshift-docker-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "product_id": "atomic-openshift-docker-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } }, { "category": "product_version", "name": "atomic-openshift-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "product": { "name": "atomic-openshift-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "product_id": "atomic-openshift-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } }, { "category": "product_version", "name": "ansible-service-broker-container-scripts-0:1.1.20-2.el7.noarch", "product": { "name": "ansible-service-broker-container-scripts-0:1.1.20-2.el7.noarch", "product_id": "ansible-service-broker-container-scripts-0:1.1.20-2.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } }, { "category": "product_version", "name": "ansible-service-broker-selinux-0:1.1.20-2.el7.noarch", "product": { "name": "ansible-service-broker-selinux-0:1.1.20-2.el7.noarch", "product_id": "ansible-service-broker-selinux-0:1.1.20-2.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ansible-service-broker-0:1.1.20-2.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-2.el7.src" }, "product_reference": "ansible-service-broker-0:1.1.20-2.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-service-broker-0:1.1.20-2.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-2.el7.x86_64" }, "product_reference": "ansible-service-broker-0:1.1.20-2.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-service-broker-container-scripts-0:1.1.20-2.el7.noarch as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:ansible-service-broker-container-scripts-0:1.1.20-2.el7.noarch" }, "product_reference": "ansible-service-broker-container-scripts-0:1.1.20-2.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-service-broker-selinux-0:1.1.20-2.el7.noarch as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:ansible-service-broker-selinux-0:1.1.20-2.el7.noarch" }, "product_reference": "ansible-service-broker-selinux-0:1.1.20-2.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-0:3.9.101-1.git.0.150f595.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.101-1.git.0.150f595.el7.src" }, "product_reference": "atomic-openshift-0:3.9.101-1.git.0.150f595.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-0:3.9.101-1.git.0.150f595.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.101-1.git.0.150f595.el7.x86_64" }, "product_reference": "atomic-openshift-0:3.9.101-1.git.0.150f595.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-clients-0:3.9.101-1.git.0.150f595.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-0:3.9.101-1.git.0.150f595.el7.x86_64" }, "product_reference": "atomic-openshift-clients-0:3.9.101-1.git.0.150f595.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-clients-redistributable-0:3.9.101-1.git.0.150f595.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-redistributable-0:3.9.101-1.git.0.150f595.el7.x86_64" }, "product_reference": "atomic-openshift-clients-redistributable-0:3.9.101-1.git.0.150f595.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-cluster-capacity-0:3.9.101-1.git.0.150f595.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-cluster-capacity-0:3.9.101-1.git.0.150f595.el7.x86_64" }, "product_reference": "atomic-openshift-cluster-capacity-0:3.9.101-1.git.0.150f595.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.src" }, "product_reference": "atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.x86_64" }, "product_reference": "atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-docker-excluder-0:3.9.101-1.git.0.150f595.el7.noarch as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-docker-excluder-0:3.9.101-1.git.0.150f595.el7.noarch" }, "product_reference": "atomic-openshift-docker-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-dockerregistry-0:3.9.101-1.git.1.13625cf.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-dockerregistry-0:3.9.101-1.git.1.13625cf.el7.x86_64" }, "product_reference": "atomic-openshift-dockerregistry-0:3.9.101-1.git.1.13625cf.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-excluder-0:3.9.101-1.git.0.150f595.el7.noarch as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-excluder-0:3.9.101-1.git.0.150f595.el7.noarch" }, "product_reference": "atomic-openshift-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-federation-services-0:3.9.101-1.git.0.150f595.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-federation-services-0:3.9.101-1.git.0.150f595.el7.x86_64" }, "product_reference": "atomic-openshift-federation-services-0:3.9.101-1.git.0.150f595.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-master-0:3.9.101-1.git.0.150f595.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-master-0:3.9.101-1.git.0.150f595.el7.x86_64" }, "product_reference": "atomic-openshift-master-0:3.9.101-1.git.0.150f595.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-node-0:3.9.101-1.git.0.150f595.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-node-0:3.9.101-1.git.0.150f595.el7.x86_64" }, "product_reference": "atomic-openshift-node-0:3.9.101-1.git.0.150f595.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.src" }, "product_reference": "atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.x86_64" }, "product_reference": "atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-pod-0:3.9.101-1.git.0.150f595.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-pod-0:3.9.101-1.git.0.150f595.el7.x86_64" }, "product_reference": "atomic-openshift-pod-0:3.9.101-1.git.0.150f595.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-sdn-ovs-0:3.9.101-1.git.0.150f595.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-sdn-ovs-0:3.9.101-1.git.0.150f595.el7.x86_64" }, "product_reference": "atomic-openshift-sdn-ovs-0:3.9.101-1.git.0.150f595.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-catalog-0:3.9.101-1.git.0.150f595.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-service-catalog-0:3.9.101-1.git.0.150f595.el7.x86_64" }, "product_reference": "atomic-openshift-service-catalog-0:3.9.101-1.git.0.150f595.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-template-service-broker-0:3.9.101-1.git.0.150f595.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-template-service-broker-0:3.9.101-1.git.0.150f595.el7.x86_64" }, "product_reference": "atomic-openshift-template-service-broker-0:3.9.101-1.git.0.150f595.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-tests-0:3.9.101-1.git.0.150f595.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-tests-0:3.9.101-1.git.0.150f595.el7.x86_64" }, "product_reference": "atomic-openshift-tests-0:3.9.101-1.git.0.150f595.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.src" }, "product_reference": "atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.x86_64" }, "product_reference": "atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "cockpit-0:195-2.rhaos.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:cockpit-0:195-2.rhaos.el7.src" }, "product_reference": "cockpit-0:195-2.rhaos.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "cockpit-debuginfo-0:195-2.rhaos.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:cockpit-debuginfo-0:195-2.rhaos.el7.x86_64" }, "product_reference": "cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "cockpit-kubernetes-0:195-2.rhaos.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:cockpit-kubernetes-0:195-2.rhaos.el7.x86_64" }, "product_reference": "cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.5.2-6.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:containernetworking-plugins-0:0.5.2-6.el7.src" }, "product_reference": "containernetworking-plugins-0:0.5.2-6.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.5.2-6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:containernetworking-plugins-0:0.5.2-6.el7.x86_64" }, "product_reference": "containernetworking-plugins-0:0.5.2-6.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.5.2-6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:containernetworking-plugins-debuginfo-0:0.5.2-6.el7.x86_64" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.5.2-6.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.9.16-3.git858756d.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-3.git858756d.el7.src" }, "product_reference": "cri-o-0:1.9.16-3.git858756d.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.9.16-3.git858756d.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-3.git858756d.el7.x86_64" }, "product_reference": "cri-o-0:1.9.16-3.git858756d.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.9.16-3.git858756d.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:cri-o-debuginfo-0:1.9.16-3.git858756d.el7.x86_64" }, "product_reference": "cri-o-debuginfo-0:1.9.16-3.git858756d.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.src" }, "product_reference": "cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64" }, "product_reference": "cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debuginfo-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:cri-tools-debuginfo-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64" }, "product_reference": "cri-tools-debuginfo-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.src" }, "product_reference": "golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.x86_64" }, "product_reference": "golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src" }, "product_reference": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64" }, "product_reference": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:golang-github-prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.src" }, "product_reference": "golang-github-prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-node_exporter-0:3.9.101-1.git.1.8295224.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:golang-github-prometheus-node_exporter-0:3.9.101-1.git.1.8295224.el7.src" }, "product_reference": "golang-github-prometheus-node_exporter-0:3.9.101-1.git.1.8295224.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-prometheus-0:2.2.1-2.gitbc6058c.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:golang-github-prometheus-prometheus-0:2.2.1-2.gitbc6058c.el7.src" }, "product_reference": "golang-github-prometheus-prometheus-0:2.2.1-2.gitbc6058c.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src" }, "product_reference": "golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64" }, "product_reference": "golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "hawkular-openshift-agent-0:1.2.2-3.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:hawkular-openshift-agent-0:1.2.2-3.el7.src" }, "product_reference": "hawkular-openshift-agent-0:1.2.2-3.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "hawkular-openshift-agent-0:1.2.2-3.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:hawkular-openshift-agent-0:1.2.2-3.el7.x86_64" }, "product_reference": "hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "heapster-0:1.3.0-4.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:heapster-0:1.3.0-4.el7.src" }, "product_reference": "heapster-0:1.3.0-4.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "heapster-0:1.3.0-4.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:heapster-0:1.3.0-4.el7.x86_64" }, "product_reference": "heapster-0:1.3.0-4.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "image-inspector-0:2.1.3-2.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:image-inspector-0:2.1.3-2.el7.src" }, "product_reference": "image-inspector-0:2.1.3-2.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "image-inspector-0:2.1.3-2.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:image-inspector-0:2.1.3-2.el7.x86_64" }, "product_reference": "image-inspector-0:2.1.3-2.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.src" }, "product_reference": "openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.x86_64" }, "product_reference": "openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-eventrouter-0:0.1-3.git5bd9251.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:openshift-eventrouter-0:0.1-3.git5bd9251.el7.src" }, "product_reference": "openshift-eventrouter-0:0.1-3.git5bd9251.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-eventrouter-0:0.1-3.git5bd9251.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:openshift-eventrouter-0:0.1-3.git5bd9251.el7.x86_64" }, "product_reference": "openshift-eventrouter-0:0.1-3.git5bd9251.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-eventrouter-debuginfo-0:0.1-3.git5bd9251.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:openshift-eventrouter-debuginfo-0:0.1-3.git5bd9251.el7.x86_64" }, "product_reference": "openshift-eventrouter-debuginfo-0:0.1-3.git5bd9251.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-0:0.0.1-9.git78d6339.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:openshift-external-storage-0:0.0.1-9.git78d6339.el7.src" }, "product_reference": "openshift-external-storage-0:0.0.1-9.git78d6339.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-debuginfo-0:0.0.1-9.git78d6339.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:openshift-external-storage-debuginfo-0:0.0.1-9.git78d6339.el7.x86_64" }, "product_reference": "openshift-external-storage-debuginfo-0:0.0.1-9.git78d6339.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-efs-provisioner-0:0.0.1-9.git78d6339.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:openshift-external-storage-efs-provisioner-0:0.0.1-9.git78d6339.el7.x86_64" }, "product_reference": "openshift-external-storage-efs-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-local-provisioner-0:0.0.1-9.git78d6339.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:openshift-external-storage-local-provisioner-0:0.0.1-9.git78d6339.el7.x86_64" }, "product_reference": "openshift-external-storage-local-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-snapshot-controller-0:0.0.1-9.git78d6339.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:openshift-external-storage-snapshot-controller-0:0.0.1-9.git78d6339.el7.x86_64" }, "product_reference": "openshift-external-storage-snapshot-controller-0:0.0.1-9.git78d6339.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-snapshot-provisioner-0:0.0.1-9.git78d6339.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:openshift-external-storage-snapshot-provisioner-0:0.0.1-9.git78d6339.el7.x86_64" }, "product_reference": "openshift-external-storage-snapshot-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-kubernetes-0:0.1.0-3.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:openvswitch-ovn-kubernetes-0:0.1.0-3.el7.src" }, "product_reference": "openvswitch-ovn-kubernetes-0:0.1.0-3.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-kubernetes-0:0.1.0-3.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:openvswitch-ovn-kubernetes-0:0.1.0-3.el7.x86_64" }, "product_reference": "openvswitch-ovn-kubernetes-0:0.1.0-3.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-0:2.2.1-2.gitbc6058c.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:prometheus-0:2.2.1-2.gitbc6058c.el7.x86_64" }, "product_reference": "prometheus-0:2.2.1-2.gitbc6058c.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.x86_64" }, "product_reference": "prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-node-exporter-0:3.9.101-1.git.1.8295224.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:prometheus-node-exporter-0:3.9.101-1.git.1.8295224.el7.x86_64" }, "product_reference": "prometheus-node-exporter-0:3.9.101-1.git.1.8295224.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-promu-0:0-5.git85ceabc.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:prometheus-promu-0:0-5.git85ceabc.el7.x86_64" }, "product_reference": "prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-2.el7.src", "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-2.el7.x86_64", "7Server-RH7-RHOSE-3.9:ansible-service-broker-container-scripts-0:1.1.20-2.el7.noarch", "7Server-RH7-RHOSE-3.9:ansible-service-broker-selinux-0:1.1.20-2.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.101-1.git.0.150f595.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-redistributable-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-cluster-capacity-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-docker-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-dockerregistry-0:3.9.101-1.git.1.13625cf.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-federation-services-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-master-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-pod-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-sdn-ovs-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-service-catalog-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-template-service-broker-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-tests-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.x86_64", "7Server-RH7-RHOSE-3.9:cockpit-0:195-2.rhaos.el7.src", "7Server-RH7-RHOSE-3.9:cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.9:cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-0:0.5.2-6.el7.src", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-0:0.5.2-6.el7.x86_64", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-debuginfo-0:0.5.2-6.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-3.git858756d.el7.src", "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-3.git858756d.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-o-debuginfo-0:1.9.16-3.git858756d.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.src", "7Server-RH7-RHOSE-3.9:cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-tools-debuginfo-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-node_exporter-0:3.9.101-1.git.1.8295224.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-prometheus-0:2.2.1-2.gitbc6058c.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "7Server-RH7-RHOSE-3.9:hawkular-openshift-agent-0:1.2.2-3.el7.src", "7Server-RH7-RHOSE-3.9:hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "7Server-RH7-RHOSE-3.9:heapster-0:1.3.0-4.el7.src", "7Server-RH7-RHOSE-3.9:heapster-0:1.3.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.9:image-inspector-0:2.1.3-2.el7.src", "7Server-RH7-RHOSE-3.9:image-inspector-0:2.1.3-2.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.src", "7Server-RH7-RHOSE-3.9:openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-0:0.1-3.git5bd9251.el7.src", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-0:0.1-3.git5bd9251.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-debuginfo-0:0.1-3.git5bd9251.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-0:0.0.1-9.git78d6339.el7.src", "7Server-RH7-RHOSE-3.9:openshift-external-storage-debuginfo-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-efs-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-local-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-snapshot-controller-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-snapshot-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openvswitch-ovn-kubernetes-0:0.1.0-3.el7.src", "7Server-RH7-RHOSE-3.9:openvswitch-ovn-kubernetes-0:0.1.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-0:2.2.1-2.gitbc6058c.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-node-exporter-0:3.9.101-1.git.1.8295224.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-promu-0:0-5.git85ceabc.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-24T21:31:32+00:00", "details": "For OpenShift Container Platform 3.9 see the following documentation, which\nwill be updated shortly for release 3.9.100, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/3.9/release_notes/ocp_3_9_release_notes.html", "product_ids": [ "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-2.el7.src", "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-2.el7.x86_64", "7Server-RH7-RHOSE-3.9:ansible-service-broker-container-scripts-0:1.1.20-2.el7.noarch", "7Server-RH7-RHOSE-3.9:ansible-service-broker-selinux-0:1.1.20-2.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.101-1.git.0.150f595.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-redistributable-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-cluster-capacity-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-docker-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-dockerregistry-0:3.9.101-1.git.1.13625cf.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-federation-services-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-master-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-pod-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-sdn-ovs-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-service-catalog-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-template-service-broker-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-tests-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.x86_64", "7Server-RH7-RHOSE-3.9:cockpit-0:195-2.rhaos.el7.src", "7Server-RH7-RHOSE-3.9:cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.9:cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-0:0.5.2-6.el7.src", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-0:0.5.2-6.el7.x86_64", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-debuginfo-0:0.5.2-6.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-3.git858756d.el7.src", "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-3.git858756d.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-o-debuginfo-0:1.9.16-3.git858756d.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.src", "7Server-RH7-RHOSE-3.9:cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-tools-debuginfo-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-node_exporter-0:3.9.101-1.git.1.8295224.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-prometheus-0:2.2.1-2.gitbc6058c.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "7Server-RH7-RHOSE-3.9:hawkular-openshift-agent-0:1.2.2-3.el7.src", "7Server-RH7-RHOSE-3.9:hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "7Server-RH7-RHOSE-3.9:heapster-0:1.3.0-4.el7.src", "7Server-RH7-RHOSE-3.9:heapster-0:1.3.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.9:image-inspector-0:2.1.3-2.el7.src", "7Server-RH7-RHOSE-3.9:image-inspector-0:2.1.3-2.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.src", "7Server-RH7-RHOSE-3.9:openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-0:0.1-3.git5bd9251.el7.src", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-0:0.1-3.git5bd9251.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-debuginfo-0:0.1-3.git5bd9251.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-0:0.0.1-9.git78d6339.el7.src", "7Server-RH7-RHOSE-3.9:openshift-external-storage-debuginfo-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-efs-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-local-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-snapshot-controller-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-snapshot-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openvswitch-ovn-kubernetes-0:0.1.0-3.el7.src", "7Server-RH7-RHOSE-3.9:openvswitch-ovn-kubernetes-0:0.1.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-0:2.2.1-2.gitbc6058c.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-node-exporter-0:3.9.101-1.git.1.8295224.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-promu-0:0-5.git85ceabc.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2769" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-2.el7.src", "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-2.el7.x86_64", "7Server-RH7-RHOSE-3.9:ansible-service-broker-container-scripts-0:1.1.20-2.el7.noarch", "7Server-RH7-RHOSE-3.9:ansible-service-broker-selinux-0:1.1.20-2.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.101-1.git.0.150f595.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-redistributable-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-cluster-capacity-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-docker-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-dockerregistry-0:3.9.101-1.git.1.13625cf.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-federation-services-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-master-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-pod-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-sdn-ovs-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-service-catalog-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-template-service-broker-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-tests-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.x86_64", "7Server-RH7-RHOSE-3.9:cockpit-0:195-2.rhaos.el7.src", "7Server-RH7-RHOSE-3.9:cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.9:cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-0:0.5.2-6.el7.src", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-0:0.5.2-6.el7.x86_64", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-debuginfo-0:0.5.2-6.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-3.git858756d.el7.src", "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-3.git858756d.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-o-debuginfo-0:1.9.16-3.git858756d.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.src", "7Server-RH7-RHOSE-3.9:cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-tools-debuginfo-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-node_exporter-0:3.9.101-1.git.1.8295224.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-prometheus-0:2.2.1-2.gitbc6058c.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "7Server-RH7-RHOSE-3.9:hawkular-openshift-agent-0:1.2.2-3.el7.src", "7Server-RH7-RHOSE-3.9:hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "7Server-RH7-RHOSE-3.9:heapster-0:1.3.0-4.el7.src", "7Server-RH7-RHOSE-3.9:heapster-0:1.3.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.9:image-inspector-0:2.1.3-2.el7.src", "7Server-RH7-RHOSE-3.9:image-inspector-0:2.1.3-2.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.src", "7Server-RH7-RHOSE-3.9:openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-0:0.1-3.git5bd9251.el7.src", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-0:0.1-3.git5bd9251.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-debuginfo-0:0.1-3.git5bd9251.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-0:0.0.1-9.git78d6339.el7.src", "7Server-RH7-RHOSE-3.9:openshift-external-storage-debuginfo-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-efs-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-local-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-snapshot-controller-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-snapshot-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openvswitch-ovn-kubernetes-0:0.1.0-3.el7.src", "7Server-RH7-RHOSE-3.9:openvswitch-ovn-kubernetes-0:0.1.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-0:2.2.1-2.gitbc6058c.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-node-exporter-0:3.9.101-1.git.1.8295224.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-promu-0:0-5.git85ceabc.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-2.el7.src", "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-2.el7.x86_64", "7Server-RH7-RHOSE-3.9:ansible-service-broker-container-scripts-0:1.1.20-2.el7.noarch", "7Server-RH7-RHOSE-3.9:ansible-service-broker-selinux-0:1.1.20-2.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.101-1.git.0.150f595.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-redistributable-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-cluster-capacity-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-docker-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-dockerregistry-0:3.9.101-1.git.1.13625cf.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-federation-services-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-master-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-pod-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-sdn-ovs-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-service-catalog-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-template-service-broker-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-tests-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.x86_64", "7Server-RH7-RHOSE-3.9:cockpit-0:195-2.rhaos.el7.src", "7Server-RH7-RHOSE-3.9:cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.9:cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-0:0.5.2-6.el7.src", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-0:0.5.2-6.el7.x86_64", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-debuginfo-0:0.5.2-6.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-3.git858756d.el7.src", "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-3.git858756d.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-o-debuginfo-0:1.9.16-3.git858756d.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.src", "7Server-RH7-RHOSE-3.9:cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-tools-debuginfo-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-node_exporter-0:3.9.101-1.git.1.8295224.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-prometheus-0:2.2.1-2.gitbc6058c.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "7Server-RH7-RHOSE-3.9:hawkular-openshift-agent-0:1.2.2-3.el7.src", "7Server-RH7-RHOSE-3.9:hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "7Server-RH7-RHOSE-3.9:heapster-0:1.3.0-4.el7.src", "7Server-RH7-RHOSE-3.9:heapster-0:1.3.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.9:image-inspector-0:2.1.3-2.el7.src", "7Server-RH7-RHOSE-3.9:image-inspector-0:2.1.3-2.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.src", "7Server-RH7-RHOSE-3.9:openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-0:0.1-3.git5bd9251.el7.src", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-0:0.1-3.git5bd9251.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-debuginfo-0:0.1-3.git5bd9251.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-0:0.0.1-9.git78d6339.el7.src", "7Server-RH7-RHOSE-3.9:openshift-external-storage-debuginfo-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-efs-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-local-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-snapshot-controller-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-snapshot-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openvswitch-ovn-kubernetes-0:0.1.0-3.el7.src", "7Server-RH7-RHOSE-3.9:openvswitch-ovn-kubernetes-0:0.1.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-0:2.2.1-2.gitbc6058c.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-node-exporter-0:3.9.101-1.git.1.8295224.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-promu-0:0-5.git85ceabc.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-24T21:31:32+00:00", "details": "For OpenShift Container Platform 3.9 see the following documentation, which\nwill be updated shortly for release 3.9.100, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/3.9/release_notes/ocp_3_9_release_notes.html", "product_ids": [ "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-2.el7.src", "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-2.el7.x86_64", "7Server-RH7-RHOSE-3.9:ansible-service-broker-container-scripts-0:1.1.20-2.el7.noarch", "7Server-RH7-RHOSE-3.9:ansible-service-broker-selinux-0:1.1.20-2.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.101-1.git.0.150f595.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-redistributable-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-cluster-capacity-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-docker-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-dockerregistry-0:3.9.101-1.git.1.13625cf.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-federation-services-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-master-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-pod-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-sdn-ovs-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-service-catalog-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-template-service-broker-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-tests-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.x86_64", "7Server-RH7-RHOSE-3.9:cockpit-0:195-2.rhaos.el7.src", "7Server-RH7-RHOSE-3.9:cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.9:cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-0:0.5.2-6.el7.src", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-0:0.5.2-6.el7.x86_64", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-debuginfo-0:0.5.2-6.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-3.git858756d.el7.src", "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-3.git858756d.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-o-debuginfo-0:1.9.16-3.git858756d.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.src", "7Server-RH7-RHOSE-3.9:cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-tools-debuginfo-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-node_exporter-0:3.9.101-1.git.1.8295224.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-prometheus-0:2.2.1-2.gitbc6058c.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "7Server-RH7-RHOSE-3.9:hawkular-openshift-agent-0:1.2.2-3.el7.src", "7Server-RH7-RHOSE-3.9:hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "7Server-RH7-RHOSE-3.9:heapster-0:1.3.0-4.el7.src", "7Server-RH7-RHOSE-3.9:heapster-0:1.3.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.9:image-inspector-0:2.1.3-2.el7.src", "7Server-RH7-RHOSE-3.9:image-inspector-0:2.1.3-2.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.src", "7Server-RH7-RHOSE-3.9:openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-0:0.1-3.git5bd9251.el7.src", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-0:0.1-3.git5bd9251.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-debuginfo-0:0.1-3.git5bd9251.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-0:0.0.1-9.git78d6339.el7.src", "7Server-RH7-RHOSE-3.9:openshift-external-storage-debuginfo-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-efs-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-local-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-snapshot-controller-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-snapshot-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openvswitch-ovn-kubernetes-0:0.1.0-3.el7.src", "7Server-RH7-RHOSE-3.9:openvswitch-ovn-kubernetes-0:0.1.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-0:2.2.1-2.gitbc6058c.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-node-exporter-0:3.9.101-1.git.1.8295224.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-promu-0:0-5.git85ceabc.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2769" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-2.el7.src", "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-2.el7.x86_64", "7Server-RH7-RHOSE-3.9:ansible-service-broker-container-scripts-0:1.1.20-2.el7.noarch", "7Server-RH7-RHOSE-3.9:ansible-service-broker-selinux-0:1.1.20-2.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.101-1.git.0.150f595.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-redistributable-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-cluster-capacity-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-docker-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-dockerregistry-0:3.9.101-1.git.1.13625cf.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-federation-services-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-master-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-pod-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-sdn-ovs-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-service-catalog-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-template-service-broker-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-tests-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.x86_64", "7Server-RH7-RHOSE-3.9:cockpit-0:195-2.rhaos.el7.src", "7Server-RH7-RHOSE-3.9:cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.9:cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-0:0.5.2-6.el7.src", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-0:0.5.2-6.el7.x86_64", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-debuginfo-0:0.5.2-6.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-3.git858756d.el7.src", "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-3.git858756d.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-o-debuginfo-0:1.9.16-3.git858756d.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.src", "7Server-RH7-RHOSE-3.9:cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-tools-debuginfo-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-node_exporter-0:3.9.101-1.git.1.8295224.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-prometheus-0:2.2.1-2.gitbc6058c.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "7Server-RH7-RHOSE-3.9:hawkular-openshift-agent-0:1.2.2-3.el7.src", "7Server-RH7-RHOSE-3.9:hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "7Server-RH7-RHOSE-3.9:heapster-0:1.3.0-4.el7.src", "7Server-RH7-RHOSE-3.9:heapster-0:1.3.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.9:image-inspector-0:2.1.3-2.el7.src", "7Server-RH7-RHOSE-3.9:image-inspector-0:2.1.3-2.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.src", "7Server-RH7-RHOSE-3.9:openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-0:0.1-3.git5bd9251.el7.src", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-0:0.1-3.git5bd9251.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-debuginfo-0:0.1-3.git5bd9251.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-0:0.0.1-9.git78d6339.el7.src", "7Server-RH7-RHOSE-3.9:openshift-external-storage-debuginfo-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-efs-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-local-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-snapshot-controller-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-snapshot-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openvswitch-ovn-kubernetes-0:0.1.0-3.el7.src", "7Server-RH7-RHOSE-3.9:openvswitch-ovn-kubernetes-0:0.1.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-0:2.2.1-2.gitbc6058c.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-node-exporter-0:3.9.101-1.git.1.8295224.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-promu-0:0-5.git85ceabc.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Kubernetes Product Security Committee" ] } ], "cve": "CVE-2019-11247", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2019-07-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1732192" } ], "notes": [ { "category": "description", "text": "The Kubernetes kube-apiserver mistakenly allows access to a cluster-scoped custom resource if the request is made as if the resource were namespaced. Authorizations for the resource accessed in this manner are enforced using roles and role bindings within the namespace, meaning that a user with access only to a resource in one namespace could create, view update or delete the cluster-scoped resource (according to their namespace role privileges). Kubernetes affected versions include versions prior to 1.13.9, versions prior to 1.14.5, versions prior to 1.15.2, and versions 1.7, 1.8, 1.9, 1.10, 1.11, 1.12.", "title": "Vulnerability description" }, { "category": "summary", "text": "kubernetes: API server allows access to cluster-scoped custom resources as if resources were namespaced", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-2.el7.src", "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-2.el7.x86_64", "7Server-RH7-RHOSE-3.9:ansible-service-broker-container-scripts-0:1.1.20-2.el7.noarch", "7Server-RH7-RHOSE-3.9:ansible-service-broker-selinux-0:1.1.20-2.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.101-1.git.0.150f595.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-redistributable-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-cluster-capacity-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-docker-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-dockerregistry-0:3.9.101-1.git.1.13625cf.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-federation-services-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-master-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-pod-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-sdn-ovs-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-service-catalog-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-template-service-broker-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-tests-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.x86_64", "7Server-RH7-RHOSE-3.9:cockpit-0:195-2.rhaos.el7.src", "7Server-RH7-RHOSE-3.9:cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.9:cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-0:0.5.2-6.el7.src", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-0:0.5.2-6.el7.x86_64", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-debuginfo-0:0.5.2-6.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-3.git858756d.el7.src", "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-3.git858756d.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-o-debuginfo-0:1.9.16-3.git858756d.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.src", "7Server-RH7-RHOSE-3.9:cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-tools-debuginfo-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-node_exporter-0:3.9.101-1.git.1.8295224.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-prometheus-0:2.2.1-2.gitbc6058c.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "7Server-RH7-RHOSE-3.9:hawkular-openshift-agent-0:1.2.2-3.el7.src", "7Server-RH7-RHOSE-3.9:hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "7Server-RH7-RHOSE-3.9:heapster-0:1.3.0-4.el7.src", "7Server-RH7-RHOSE-3.9:heapster-0:1.3.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.9:image-inspector-0:2.1.3-2.el7.src", "7Server-RH7-RHOSE-3.9:image-inspector-0:2.1.3-2.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.src", "7Server-RH7-RHOSE-3.9:openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-0:0.1-3.git5bd9251.el7.src", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-0:0.1-3.git5bd9251.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-debuginfo-0:0.1-3.git5bd9251.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-0:0.0.1-9.git78d6339.el7.src", "7Server-RH7-RHOSE-3.9:openshift-external-storage-debuginfo-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-efs-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-local-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-snapshot-controller-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-snapshot-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openvswitch-ovn-kubernetes-0:0.1.0-3.el7.src", "7Server-RH7-RHOSE-3.9:openvswitch-ovn-kubernetes-0:0.1.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-0:2.2.1-2.gitbc6058c.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-node-exporter-0:3.9.101-1.git.1.8295224.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-promu-0:0-5.git85ceabc.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-11247" }, { "category": "external", "summary": "RHBZ#1732192", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1732192" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-11247", "url": "https://www.cve.org/CVERecord?id=CVE-2019-11247" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11247", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11247" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-discuss/Vf31dXp0EJc", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-discuss/Vf31dXp0EJc" } ], "release_date": "2019-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-24T21:31:32+00:00", "details": "For OpenShift Container Platform 3.9 see the following documentation, which\nwill be updated shortly for release 3.9.100, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/3.9/release_notes/ocp_3_9_release_notes.html", "product_ids": [ "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-2.el7.src", "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-2.el7.x86_64", "7Server-RH7-RHOSE-3.9:ansible-service-broker-container-scripts-0:1.1.20-2.el7.noarch", "7Server-RH7-RHOSE-3.9:ansible-service-broker-selinux-0:1.1.20-2.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.101-1.git.0.150f595.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-redistributable-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-cluster-capacity-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-docker-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-dockerregistry-0:3.9.101-1.git.1.13625cf.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-federation-services-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-master-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-pod-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-sdn-ovs-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-service-catalog-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-template-service-broker-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-tests-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.x86_64", "7Server-RH7-RHOSE-3.9:cockpit-0:195-2.rhaos.el7.src", "7Server-RH7-RHOSE-3.9:cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.9:cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-0:0.5.2-6.el7.src", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-0:0.5.2-6.el7.x86_64", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-debuginfo-0:0.5.2-6.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-3.git858756d.el7.src", "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-3.git858756d.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-o-debuginfo-0:1.9.16-3.git858756d.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.src", "7Server-RH7-RHOSE-3.9:cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-tools-debuginfo-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-node_exporter-0:3.9.101-1.git.1.8295224.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-prometheus-0:2.2.1-2.gitbc6058c.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "7Server-RH7-RHOSE-3.9:hawkular-openshift-agent-0:1.2.2-3.el7.src", "7Server-RH7-RHOSE-3.9:hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "7Server-RH7-RHOSE-3.9:heapster-0:1.3.0-4.el7.src", "7Server-RH7-RHOSE-3.9:heapster-0:1.3.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.9:image-inspector-0:2.1.3-2.el7.src", "7Server-RH7-RHOSE-3.9:image-inspector-0:2.1.3-2.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.src", "7Server-RH7-RHOSE-3.9:openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-0:0.1-3.git5bd9251.el7.src", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-0:0.1-3.git5bd9251.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-debuginfo-0:0.1-3.git5bd9251.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-0:0.0.1-9.git78d6339.el7.src", "7Server-RH7-RHOSE-3.9:openshift-external-storage-debuginfo-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-efs-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-local-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-snapshot-controller-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-snapshot-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openvswitch-ovn-kubernetes-0:0.1.0-3.el7.src", "7Server-RH7-RHOSE-3.9:openvswitch-ovn-kubernetes-0:0.1.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-0:2.2.1-2.gitbc6058c.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-node-exporter-0:3.9.101-1.git.1.8295224.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-promu-0:0-5.git85ceabc.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2769" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-2.el7.src", "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-2.el7.x86_64", "7Server-RH7-RHOSE-3.9:ansible-service-broker-container-scripts-0:1.1.20-2.el7.noarch", "7Server-RH7-RHOSE-3.9:ansible-service-broker-selinux-0:1.1.20-2.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.101-1.git.0.150f595.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-redistributable-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-cluster-capacity-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-docker-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-dockerregistry-0:3.9.101-1.git.1.13625cf.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-federation-services-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-master-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-pod-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-sdn-ovs-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-service-catalog-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-template-service-broker-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-tests-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.x86_64", "7Server-RH7-RHOSE-3.9:cockpit-0:195-2.rhaos.el7.src", "7Server-RH7-RHOSE-3.9:cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.9:cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-0:0.5.2-6.el7.src", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-0:0.5.2-6.el7.x86_64", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-debuginfo-0:0.5.2-6.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-3.git858756d.el7.src", "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-3.git858756d.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-o-debuginfo-0:1.9.16-3.git858756d.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.src", "7Server-RH7-RHOSE-3.9:cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-tools-debuginfo-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-node_exporter-0:3.9.101-1.git.1.8295224.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-prometheus-0:2.2.1-2.gitbc6058c.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "7Server-RH7-RHOSE-3.9:hawkular-openshift-agent-0:1.2.2-3.el7.src", "7Server-RH7-RHOSE-3.9:hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "7Server-RH7-RHOSE-3.9:heapster-0:1.3.0-4.el7.src", "7Server-RH7-RHOSE-3.9:heapster-0:1.3.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.9:image-inspector-0:2.1.3-2.el7.src", "7Server-RH7-RHOSE-3.9:image-inspector-0:2.1.3-2.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.src", "7Server-RH7-RHOSE-3.9:openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-0:0.1-3.git5bd9251.el7.src", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-0:0.1-3.git5bd9251.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-debuginfo-0:0.1-3.git5bd9251.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-0:0.0.1-9.git78d6339.el7.src", "7Server-RH7-RHOSE-3.9:openshift-external-storage-debuginfo-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-efs-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-local-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-snapshot-controller-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-snapshot-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openvswitch-ovn-kubernetes-0:0.1.0-3.el7.src", "7Server-RH7-RHOSE-3.9:openvswitch-ovn-kubernetes-0:0.1.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-0:2.2.1-2.gitbc6058c.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-node-exporter-0:3.9.101-1.git.1.8295224.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-promu-0:0-5.git85ceabc.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kubernetes: API server allows access to cluster-scoped custom resources as if resources were namespaced" } ] }
RHSA-2020:3197
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat Process Automation Manager.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Process Automation Manager is an open source business process management suite that combines process management and decision service management and enables business and IT users to create, manage, validate, and deploy process applications and decision services.\n\nThis release of Red Hat Process Automation Manager 7.8.0 serves as an update to Red Hat Process Automation Manager 7.7.1, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* commons-beanutils: apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default (CVE-2019-10086)\n\n* netty: HTTP request smuggling (CVE-2019-20444)\n\n* netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers (CVE-2019-16869)\n\n* netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling (CVE-2020-7238)\n\n* netty: HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)\n\n* netty: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* netty: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* netty: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header (CVE-2019-20445)\n\n* cxf-core: cxf: does not restrict the number of message attachments (CVE-2019-12406)\n\n* cxf-core: cxf: OpenId Connect token service does not properly validate the clientId (CVE-2019-12423)\n\n* cxf-core: cxf: reflected XSS in the services listing page (CVE-2019-17573)\n\n* jackson-databind: lacks certain net.sf.ehcache blocking (CVE-2019-20330)\n\n* jackson-databind: Lacks certain xbean-reflect/JNDI blocking (CVE-2020-8840)\n\n* jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution (CVE-2020-10672)\n\n* jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution (CVE-2020-10673)\n\n* jackson-databind: Serialization gadgets in anteros-core (CVE-2020-9548)\n\n* jackson-databind: Serialization gadgets in commons-jelly:commons-jelly (CVE-2020-11620)\n\n* jackson-databind: Serialization gadgets in ibatis-sqlmap (CVE-2020-9547)\n\n* jackson-databind: Serialization gadgets in javax.swing.JEditorPane (CVE-2020-10969)\n\n* jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider (CVE-2020-10968)\n\n* jackson-databind: Serialization gadgets in org.apache.activemq.jms.pool.XaPooledConnectionFactory (CVE-2020-11111)\n\n* jackson-databind: Serialization gadgets in org.apache.commons.proxy.provider.remoting.RmiProvider (CVE-2020-11112)\n\n* jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime (CVE-2020-11113)\n\n* jackson-databind: Serialization gadgets in org.springframework:spring-aop (CVE-2020-11619)\n\n* jackson-databind: Serialization gadgets in shaded-hikari-config (CVE-2020-9546)\n\n* jackson-databind: serialization in com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool (CVE-2020-14062)\n\n* jackson-databind: serialization in weblogic/oracle-aqjms (CVE-2020-14061)\n\n* jackson-databind: serialization in oadd.org.apache.xalan.lib.sql.JNDIConnectionPool (CVE-2020-14060)\n\n* netty: compression/decompression codecs don\u0027t enforce limits on buffer allocation sizes (CVE-2020-11612)\n\n* quartz: libquartz: XXE attacks via job description (CVE-2019-13990)\n\n* keycloak: security issue on reset credential flow (CVE-2020-1718)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:3197", "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=rhpam\u0026version=7.8.0", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=rhpam\u0026version=7.8.0" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_process_automation_manager/7.8/html/release_notes_for_red_hat_process_automation_manager_7.8/index", "url": "https://access.redhat.com/documentation/en-us/red_hat_process_automation_manager/7.8/html/release_notes_for_red_hat_process_automation_manager_7.8/index" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "1758619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758619" }, { "category": "external", "summary": "1767483", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767483" }, { "category": "external", "summary": "1793154", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793154" }, { "category": "external", "summary": "1796225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796225" }, { "category": "external", "summary": "1796756", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796756" }, { "category": "external", "summary": "1797006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1797006" }, { "category": "external", "summary": "1797011", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1797011" }, { "category": "external", "summary": "1798509", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798509" }, { "category": "external", "summary": "1798524", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798524" }, { "category": "external", "summary": "1801149", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1801149" }, { "category": "external", "summary": "1815470", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1815470" }, { "category": "external", "summary": "1815495", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1815495" }, { "category": "external", "summary": "1816170", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816170" }, { "category": "external", "summary": "1816216", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816216" }, { "category": "external", "summary": "1816330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816330" }, { "category": "external", "summary": "1816332", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816332" }, { "category": "external", "summary": "1816337", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816337" }, { "category": "external", "summary": "1816340", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816340" }, { "category": "external", "summary": "1819208", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819208" }, { "category": "external", "summary": "1819212", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819212" }, { "category": "external", "summary": "1821304", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821304" }, { "category": "external", "summary": "1821311", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821311" }, { "category": "external", "summary": "1821315", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821315" }, { "category": "external", "summary": "1826798", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1826798" }, { "category": "external", "summary": "1826805", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1826805" }, { "category": "external", "summary": "1848960", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848960" }, { "category": "external", "summary": "1848962", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848962" }, { "category": "external", "summary": "1848966", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848966" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_3197.json" } ], "title": "Red Hat Security Advisory: Red Hat Process Automation Manager 7.8.0 Security Update", "tracking": { "current_release_date": "2025-04-09T17:54:09+00:00", "generator": { "date": "2025-04-09T17:54:09+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.2" } }, "id": "RHSA-2020:3197", "initial_release_date": "2020-07-29T06:21:49+00:00", "revision_history": [ { "date": "2020-07-29T06:21:49+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-07-29T06:21:49+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-04-09T17:54:09+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Process Automation 7", "product": { "name": "Red Hat Process Automation 7", "product_id": "Red Hat Process Automation 7", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_bpms_platform:7.8" } } } ], "category": "product_family", "name": "Red Hat Process Automation Manager" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9518", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735749" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using frames with an empty payload, a flood could occur that results in excessive CPU usage and starvation of other clients. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using empty frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9518" }, { "category": "external", "summary": "RHBZ#1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9518", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using empty frames results in excessive resource consumption" }, { "cve": "CVE-2019-10086", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-10-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1767483" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Apache Commons BeanUtils, where the class property in PropertyUtilsBean is not suppressed by default. This flaw allows an attacker to access the classloader.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10086" }, { "category": "external", "summary": "RHBZ#1767483", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767483" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10086", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10086" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10086", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10086" }, { "category": "external", "summary": "https://commons.apache.org/proper/commons-beanutils/javadocs/v1.9.4/RELEASE-NOTES.txt", "url": "https://commons.apache.org/proper/commons-beanutils/javadocs/v1.9.4/RELEASE-NOTES.txt" } ], "release_date": "2019-08-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "There is no currently known mitigation for this flaw.", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default" }, { "cve": "CVE-2019-12406", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-03-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816170" } ], "notes": [ { "category": "description", "text": "Apache CXF before 3.3.4 and 3.2.11 does not restrict the number of message attachments present in a given message. This leaves open the possibility of a denial of service type attack, where a malicious user crafts a message containing a very large number of message attachments. From the 3.3.4 and 3.2.11 releases, a default limit of 50 message attachments is enforced. This is configurable via the message property \"attachment-max-count\".", "title": "Vulnerability description" }, { "category": "summary", "text": "cxf: does not restrict the number of message attachments", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-12406" }, { "category": "external", "summary": "RHBZ#1816170", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816170" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-12406", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12406" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-12406", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12406" } ], "release_date": "2019-11-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "cxf: does not restrict the number of message attachments" }, { "cve": "CVE-2019-12423", "cwe": { "id": "CWE-522", "name": "Insufficiently Protected Credentials" }, "discovery_date": "2020-01-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1797006" } ], "notes": [ { "category": "description", "text": "Apache CXF ships with a OpenId Connect JWK Keys service, which allows a client to obtain the public keys in JWK format, which can then be used to verify the signature of tokens issued by the service. Typically, the service obtains the public key from a local keystore (JKS/PKCS12) by specifing the path of the keystore and the alias of the keystore entry. This case is not vulnerable. However it is also possible to obtain the keys from a JWK keystore file, by setting the configuration parameter \"rs.security.keystore.type\" to \"jwk\". For this case all keys are returned in this file \"as is\", including all private key and secret key credentials. This is an obvious security risk if the user has configured the signature keystore file with private or secret key credentials. From CXF 3.3.5 and 3.2.12, it is mandatory to specify an alias corresponding to the id of the key in the JWK file, and only this key is returned. In addition, any private key information is omitted by default. \"oct\" keys, which contain secret keys, are not returned at all.", "title": "Vulnerability description" }, { "category": "summary", "text": "cxf: OpenId Connect token service does not properly validate the clientId", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-12423" }, { "category": "external", "summary": "RHBZ#1797006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1797006" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-12423", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12423" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-12423", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12423" } ], "release_date": "2020-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "cxf: OpenId Connect token service does not properly validate the clientId" }, { "cve": "CVE-2019-13990", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "discovery_date": "2019-07-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1801149" } ], "notes": [ { "category": "description", "text": "The Terracotta Quartz Scheduler is susceptible to an XML external entity attack (XXE) through a job description. This issue stems from inadequate handling of XML external entity (XXE) declarations in the initDocumentParser function within xml/XMLSchedulingDataProcessor.java. By enticing a victim to access a maliciously crafted job description (containing XML content), a remote attacker could exploit this vulnerability to execute an XXE attack on the targeted system.", "title": "Vulnerability description" }, { "category": "summary", "text": "libquartz: XXE attacks via job description", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 uses a vulnerable version of libquartz as a dependency for Candlepin. However, the \u003cjob\u003e\u003cdescrition\u003e entry is not used, and the vulnerability can not be triggered. An update may fix the code in the future.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-13990" }, { "category": "external", "summary": "RHBZ#1801149", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1801149" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-13990", "url": "https://www.cve.org/CVERecord?id=CVE-2019-13990" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-13990", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-13990" } ], "release_date": "2019-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libquartz: XXE attacks via job description" }, { "cve": "CVE-2019-16869", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2019-09-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1758619" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty, where whitespace before the colon in HTTP headers is mishandled. This flaw allows an attacker to cause HTTP request smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that this vulnerability does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships vulnerable netty version embedded in Candlepin, however, is not directly vulnerable since HTTP requests are handled by Tomcat and not netty.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-16869" }, { "category": "external", "summary": "RHBZ#1758619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758619" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16869", "url": "https://www.cve.org/CVERecord?id=CVE-2019-16869" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16869", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16869" } ], "release_date": "2019-09-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers" }, { "cve": "CVE-2019-17573", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2020-01-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1797011" } ], "notes": [ { "category": "description", "text": "By default, Apache CXF creates a /services page containing a listing of the available endpoint names and addresses. This webpage is vulnerable to a reflected Cross-Site Scripting (XSS) attack, which allows a malicious actor to inject javascript into the web page. Please note that the attack exploits a feature which is not typically not present in modern browsers, who remove dot segments before sending the request. However, Mobile applications may be vulnerable.", "title": "Vulnerability description" }, { "category": "summary", "text": "cxf: reflected XSS in the services listing page", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-17573" }, { "category": "external", "summary": "RHBZ#1797011", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1797011" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-17573", "url": "https://www.cve.org/CVERecord?id=CVE-2019-17573" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-17573", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17573" } ], "release_date": "2020-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "Mitigate this flaw by disabling the service listing altogether; via setting the \"hide-service-list-page\" servlet parameter to \"true\".", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "cxf: reflected XSS in the services listing page" }, { "cve": "CVE-2019-20330", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-01-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1793154" } ], "notes": [ { "category": "description", "text": "FasterXML jackson-databind 2.x before 2.9.10.2 lacks certain net.sf.ehcache blocking.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: lacks certain net.sf.ehcache blocking", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20330" }, { "category": "external", "summary": "RHBZ#1793154", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793154" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20330", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20330" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20330", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20330" } ], "release_date": "2020-01-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: lacks certain net.sf.ehcache blocking" }, { "cve": "CVE-2019-20444", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1798524" } ], "notes": [ { "category": "description", "text": "A HTTP smuggling flaw was found in HttpObjectDecoder.java in Netty in versions prior to version 4.1.44. HTTP headers with an invalid fold, in this case CRLF (carriage return, line feed) without being followed by SP (space) or HTAB (horizontal tab), result in situations where headers can be misread. Data integrity is the highest threat with this vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP request smuggling", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that the previous vulnerability, CVE-2019-16869, does not pose a substantial practical threat to ElasticSearch 6. We agree that these issues would be difficult to exploit on OpenShift Container Platform so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships a vulnerable version of netty embedded in Candlepin. However, the flaw can not be triggered in that context, because HTTP requests are handled by Tomcat, not by netty. A future release may fix this.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20444" }, { "category": "external", "summary": "RHBZ#1798524", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798524" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20444", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20444" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20444", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20444" }, { "category": "external", "summary": "https://github.com/elastic/elasticsearch/issues/49396", "url": "https://github.com/elastic/elasticsearch/issues/49396" } ], "release_date": "2020-01-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP request smuggling" }, { "cve": "CVE-2019-20445", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1798509" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty before version 4.1.44, where it accepted multiple Content-Length headers and also accepted both Transfer-Encoding, as well as Content-Length headers where it should reject the message under such circumstances. In circumstances where Netty is used in the context of a server, it could result in a viable HTTP smuggling vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that the previous vulnerability, CVE-2019-16869, does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit both these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships a vulnerable version of netty embedded in Candlepin. However, the flaw can not be triggered in that context, because HTTP requests are handled by Tomcat, not by netty. A future release may fix this.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20445" }, { "category": "external", "summary": "RHBZ#1798509", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798509" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20445", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20445" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20445", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20445" } ], "release_date": "2020-01-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header" }, { "cve": "CVE-2020-1718", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2020-01-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1796756" } ], "notes": [ { "category": "description", "text": "A flaw was found in the reset credential flow in Keycloak. This flaw allows an attacker to gain unauthorized access to the application.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak: security issue on reset credential flow", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-1718" }, { "category": "external", "summary": "RHBZ#1796756", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796756" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-1718", "url": "https://www.cve.org/CVERecord?id=CVE-2020-1718" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1718", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1718" } ], "release_date": "2020-05-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "Disable reset credential flow.", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "keycloak: security issue on reset credential flow" }, { "cve": "CVE-2020-7238", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1796225" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty, where it mishandles Transfer-Encoding whitespace. This flaw allows HTTP Request Smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that the previous vulnerability, CVE-2019-16869, does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit both these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships vulnerable netty version embedded in Candlepin, however, is not directly vulnerable since HTTP requests are handled by Tomcat and not netty.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-7238" }, { "category": "external", "summary": "RHBZ#1796225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796225" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-7238", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7238" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7238", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7238" }, { "category": "external", "summary": "https://netty.io/news/2019/12/18/4-1-44-Final.html", "url": "https://netty.io/news/2019/12/18/4-1-44-Final.html" } ], "release_date": "2020-01-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling" }, { "cve": "CVE-2020-8840", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816330" } ], "notes": [ { "category": "description", "text": "A flaw was found in FasterXML jackson-databind in versions 2.0.0 through 2.9.10.2. A \"gadget\" exploit is possible due to a lack of a Java object being blocking from being deserialized. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Lacks certain xbean-reflect/JNDI blocking", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8840" }, { "category": "external", "summary": "RHBZ#1816330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816330" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8840", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8840" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8840", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8840" } ], "release_date": "2020-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Lacks certain xbean-reflect/JNDI blocking" }, { "cve": "CVE-2020-9546", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816332" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in shaded-hikari-config", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9546" }, { "category": "external", "summary": "RHBZ#1816332", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816332" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9546", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9546" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9546", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9546" } ], "release_date": "2020-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in shaded-hikari-config" }, { "cve": "CVE-2020-9547", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816337" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in ibatis-sqlmap", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9547" }, { "category": "external", "summary": "RHBZ#1816337", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816337" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9547", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9547" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9547", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9547" } ], "release_date": "2020-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in ibatis-sqlmap" }, { "cve": "CVE-2020-9548", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816340" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in anteros-core", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9548" }, { "category": "external", "summary": "RHBZ#1816340", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816340" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9548", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9548" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9548", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9548" } ], "release_date": "2020-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in anteros-core" }, { "cve": "CVE-2020-10672", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2020-03-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1815495" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10672" }, { "category": "external", "summary": "RHBZ#1815495", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1815495" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10672", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10672" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10672", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10672" } ], "release_date": "2020-03-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution" }, { "cve": "CVE-2020-10673", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2020-03-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1815470" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time. Additionally, the gadget is not available within Red Hat Openstack Platform\u0027s OpenDaylight.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10673" }, { "category": "external", "summary": "RHBZ#1815470", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1815470" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10673", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10673" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10673", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10673" } ], "release_date": "2020-03-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution" }, { "cve": "CVE-2020-10968", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1819208" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x prior to version 2.9.10.4. The interaction between serialization gadgets and typing is mishandled in the bus-proxy. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10968" }, { "category": "external", "summary": "RHBZ#1819208", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819208" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10968", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10968" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10968", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10968" } ], "release_date": "2020-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider" }, { "cve": "CVE-2020-10969", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1819212" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in javax.swing.JEditorPane", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10969" }, { "category": "external", "summary": "RHBZ#1819212", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819212" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10969", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10969" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10969", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10969" } ], "release_date": "2020-03-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in javax.swing.JEditorPane" }, { "cve": "CVE-2020-11111", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2020-03-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1821304" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.apache.activemq.jms.pool.XaPooledConnectionFactory", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11111" }, { "category": "external", "summary": "RHBZ#1821304", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821304" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11111", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11111" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11111", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11111" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/2664", "url": "https://github.com/FasterXML/jackson-databind/issues/2664" } ], "release_date": "2020-03-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in org.apache.activemq.jms.pool.XaPooledConnectionFactory" }, { "cve": "CVE-2020-11112", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2020-03-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1821311" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.apache.commons.proxy.provider.remoting.RmiProvider", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11112" }, { "category": "external", "summary": "RHBZ#1821311", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821311" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11112", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11112" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11112", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11112" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/2666", "url": "https://github.com/FasterXML/jackson-databind/issues/2666" } ], "release_date": "2020-03-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in org.apache.commons.proxy.provider.remoting.RmiProvider" }, { "cve": "CVE-2020-11113", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2020-03-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1821315" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11113" }, { "category": "external", "summary": "RHBZ#1821315", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821315" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11113", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11113" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11113", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11113" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/2670", "url": "https://github.com/FasterXML/jackson-databind/issues/2670" } ], "release_date": "2020-03-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime" }, { "cve": "CVE-2020-11612", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-03-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816216" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty in the way it handles the amount of data it compresses and decompresses. The Compression/Decompression codecs should enforce memory allocation size limits to avoid an Out of Memory Error (OOME) or exhaustion of the memory pool.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: compression/decompression codecs don\u0027t enforce limits on buffer allocation sizes", "title": "Vulnerability summary" }, { "category": "other", "text": "In OpenShift Container Platform end users don\u0027t have direct access to send requests to ElasticSearch. A user could need access to the ElasticSearch service on the internal cluster network in order to be able to send malicious requests to it.\n\n\nThird party scanners flagging Red Hat Satellite due to availability of the higher version packages in Red Hat AMQ Clients (through errata RHSA-2020:2605) compare to the qpid packages from Satellite Tools repository. qpid dependency fixed in errata RHSA-2020:2605 was for Red Hat AMQ Clients and it doesn\u0027t necessarily mean that packages from Satellite Tools are affected. These are two different products with different architecture and code-base. Updating the packages from any other repository than the Satellite-tools repository is not recommended for Satellite Customers. \n\nRed Hat Satellite 6.7 and earlier ship affected version of netty, however, there is no external connection being exposed and it is used by only Artemis to open an internal connection within the JVM. Since netty does not come into contact with untrusted data, vulnerability is not exposed in product code and there is no breach of Confidentiality, Integrity or Availability expected from this vulnerability. We may update the netty and its dependency in a future release.\n\nMore information regarding Satellite related packages can be found on KCS: https://access.redhat.com/solutions/5200591", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11612" }, { "category": "external", "summary": "RHBZ#1816216", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816216" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11612", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11612" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11612", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11612" } ], "release_date": "2020-01-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "netty: compression/decompression codecs don\u0027t enforce limits on buffer allocation sizes" }, { "cve": "CVE-2020-11619", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-04-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1826805" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.springframework:spring-aop", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11619" }, { "category": "external", "summary": "RHBZ#1826805", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1826805" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11619", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11619" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11619", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11619" } ], "release_date": "2020-04-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in org.springframework:spring-aop" }, { "cve": "CVE-2020-11620", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-04-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1826798" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in commons-jelly:commons-jelly", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11620" }, { "category": "external", "summary": "RHBZ#1826798", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1826798" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11620", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11620" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11620", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11620" } ], "release_date": "2020-04-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in commons-jelly:commons-jelly" }, { "cve": "CVE-2020-14060", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-06-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1848960" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.5. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: serialization in oadd.org.apache.xalan.lib.sql.JNDIConnectionPool", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 and Red Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.\n\nThe version of jackson-databind as shipped in Red Hat Software Collections rh-maven35 is used only while building maven, thus it does not deserialize data coming from untrusted sources, lowering the impact of the vulnerability for the Product.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14060" }, { "category": "external", "summary": "RHBZ#1848960", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848960" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14060", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14060" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14060", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14060" } ], "release_date": "2020-05-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* enableDefaultTyping()\n* @JsonTypeInfo using id.CLASS or id.MINIMAL_CLASS\n* oadd.org.apache.xalan.lib.sql.JNDIConnectionPool in classpath", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: serialization in oadd.org.apache.xalan.lib.sql.JNDIConnectionPool" }, { "cve": "CVE-2020-14061", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-06-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1848966" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.5. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: serialization in weblogic/oracle-aqjms", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 and Red Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.\n\nThe version of jackson-databind as shipped in Red Hat Software Collections rh-maven35 is used only while building maven, thus it does not deserialize data coming from untrusted sources, lowering the impact of the vulnerability for the Product.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14061" }, { "category": "external", "summary": "RHBZ#1848966", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848966" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14061", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14061" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14061", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14061" } ], "release_date": "2020-05-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* enableDefaultTyping()\n* @JsonTypeInfo using id.CLASS or id.MINIMAL_CLASS\n* oracle.jms.AQjms*ConnectionFactory in classpath", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: serialization in weblogic/oracle-aqjms" }, { "cve": "CVE-2020-14062", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-06-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1848962" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.5. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: serialization in com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 and Red Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.\n\nThe version of jackson-databind as shipped in Red Hat Software Collections rh-maven35 is used only while building maven, thus it does not deserialize data coming from untrusted sources, lowering the impact of the vulnerability for the Product.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14062" }, { "category": "external", "summary": "RHBZ#1848962", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848962" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14062", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14062" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14062", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14062" } ], "release_date": "2020-05-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* enableDefaultTyping()\n* @JsonTypeInfo using id.CLASS or id.MINIMAL_CLASS\n* com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool in classpath", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: serialization in com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool" } ] }
RHSA-2019:2726
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the go-toolset:rhel8 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.\n\nSecurity Fix(es):\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Failure trying to conntect to image registry using TLS when buildah is compiled with FIPS mode (BZ#1743169)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:2726", "url": "https://access.redhat.com/errata/RHSA-2019:2726" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1743169", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1743169" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2726.json" } ], "title": "Red Hat Security Advisory: go-toolset:rhel8 security and bug fix update", "tracking": { "current_release_date": "2025-03-15T19:43:57+00:00", "generator": { "date": "2025-03-15T19:43:57+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.1" } }, "id": "RHSA-2019:2726", "initial_release_date": "2019-09-12T12:29:22+00:00", "revision_history": [ { "date": "2019-09-12T12:29:22+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-09-12T12:29:22+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-03-15T19:43:57+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "go-toolset:rhel8:8000120190828225436:14bc675c", "product": { "name": "go-toolset:rhel8:8000120190828225436:14bc675c", "product_id": "go-toolset:rhel8:8000120190828225436:14bc675c", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/go-toolset@rhel8:8000120190828225436:14bc675c" } } }, { "category": "product_version", "name": "golang-docs-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "product": { "name": "golang-docs-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "product_id": "golang-docs-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.1%2B4087%2Bd8180914?arch=noarch" } } }, { "category": "product_version", "name": "golang-misc-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "product": { "name": "golang-misc-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "product_id": "golang-misc-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.1%2B4087%2Bd8180914?arch=noarch" } } }, { "category": "product_version", "name": "golang-src-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "product": { "name": "golang-src-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "product_id": "golang-src-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.1%2B4087%2Bd8180914?arch=noarch" } } }, { "category": "product_version", "name": "golang-tests-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "product": { "name": "golang-tests-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "product_id": "golang-tests-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.1%2B4087%2Bd8180914?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.src", "product": { "name": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.src", "product_id": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.1%2B4087%2Bd8180914?arch=src" } } }, { "category": "product_version", "name": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.src", "product": { "name": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.src", "product_id": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.1%2B4087%2Bd8180914?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.x86_64", "product": { "name": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.x86_64", "product_id": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.1%2B4087%2Bd8180914?arch=x86_64" } } }, { "category": "product_version", "name": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "product": { "name": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "product_id": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.1%2B4087%2Bd8180914?arch=x86_64" } } }, { "category": "product_version", "name": "golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "product": { "name": "golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "product_id": "golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.1%2B4087%2Bd8180914?arch=x86_64" } } }, { "category": "product_version", "name": "golang-race-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "product": { "name": "golang-race-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "product_id": "golang-race-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.1%2B4087%2Bd8180914?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.s390x", "product": { "name": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.s390x", "product_id": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.1%2B4087%2Bd8180914?arch=s390x" } } }, { "category": "product_version", "name": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x", "product": { "name": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x", "product_id": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.1%2B4087%2Bd8180914?arch=s390x" } } }, { "category": "product_version", "name": "golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x", "product": { "name": "golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x", "product_id": "golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.1%2B4087%2Bd8180914?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.ppc64le", "product": { "name": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.ppc64le", "product_id": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.1%2B4087%2Bd8180914?arch=ppc64le" } } }, { "category": "product_version", "name": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le", "product": { "name": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le", "product_id": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.1%2B4087%2Bd8180914?arch=ppc64le" } } }, { "category": "product_version", "name": "golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le", "product": { "name": "golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le", "product_id": "golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.1%2B4087%2Bd8180914?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.aarch64", "product": { "name": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.aarch64", "product_id": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.1%2B4087%2Bd8180914?arch=aarch64" } } }, { "category": "product_version", "name": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64", "product": { "name": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64", "product_id": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.1%2B4087%2Bd8180914?arch=aarch64" } } }, { "category": "product_version", "name": "golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64", "product": { "name": "golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64", "product_id": "golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.1%2B4087%2Bd8180914?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "go-toolset:rhel8:8000120190828225436:14bc675c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c" }, "product_reference": "go-toolset:rhel8:8000120190828225436:14bc675c", "relates_to_product_reference": "AppStream-8.0.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.aarch64 as a component of go-toolset:rhel8:8000120190828225436:14bc675c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.aarch64" }, "product_reference": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.aarch64", "relates_to_product_reference": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.ppc64le as a component of go-toolset:rhel8:8000120190828225436:14bc675c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.ppc64le" }, "product_reference": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.ppc64le", "relates_to_product_reference": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.s390x as a component of go-toolset:rhel8:8000120190828225436:14bc675c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.s390x" }, "product_reference": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.s390x", "relates_to_product_reference": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.src as a component of go-toolset:rhel8:8000120190828225436:14bc675c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.src" }, "product_reference": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.src", "relates_to_product_reference": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.x86_64 as a component of go-toolset:rhel8:8000120190828225436:14bc675c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.x86_64" }, "product_reference": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.x86_64", "relates_to_product_reference": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64 as a component of go-toolset:rhel8:8000120190828225436:14bc675c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64" }, "product_reference": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64", "relates_to_product_reference": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le as a component of go-toolset:rhel8:8000120190828225436:14bc675c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le" }, "product_reference": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le", "relates_to_product_reference": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x as a component of go-toolset:rhel8:8000120190828225436:14bc675c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x" }, "product_reference": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x", "relates_to_product_reference": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.src as a component of go-toolset:rhel8:8000120190828225436:14bc675c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.src" }, "product_reference": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.src", "relates_to_product_reference": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64 as a component of go-toolset:rhel8:8000120190828225436:14bc675c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64" }, "product_reference": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "relates_to_product_reference": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64 as a component of go-toolset:rhel8:8000120190828225436:14bc675c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64" }, "product_reference": "golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64", "relates_to_product_reference": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le as a component of go-toolset:rhel8:8000120190828225436:14bc675c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le" }, "product_reference": "golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le", "relates_to_product_reference": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x as a component of go-toolset:rhel8:8000120190828225436:14bc675c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x" }, "product_reference": "golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x", "relates_to_product_reference": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64 as a component of go-toolset:rhel8:8000120190828225436:14bc675c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64" }, "product_reference": "golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "relates_to_product_reference": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c" }, { "category": "default_component_of", "full_product_name": { "name": "golang-docs-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch as a component of go-toolset:rhel8:8000120190828225436:14bc675c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-docs-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch" }, "product_reference": "golang-docs-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "relates_to_product_reference": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c" }, { "category": "default_component_of", "full_product_name": { "name": "golang-misc-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch as a component of go-toolset:rhel8:8000120190828225436:14bc675c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-misc-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch" }, "product_reference": "golang-misc-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "relates_to_product_reference": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c" }, { "category": "default_component_of", "full_product_name": { "name": "golang-race-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64 as a component of go-toolset:rhel8:8000120190828225436:14bc675c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-race-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64" }, "product_reference": "golang-race-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "relates_to_product_reference": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c" }, { "category": "default_component_of", "full_product_name": { "name": "golang-src-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch as a component of go-toolset:rhel8:8000120190828225436:14bc675c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-src-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch" }, "product_reference": "golang-src-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "relates_to_product_reference": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c" }, { "category": "default_component_of", "full_product_name": { "name": "golang-tests-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch as a component of go-toolset:rhel8:8000120190828225436:14bc675c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-tests-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch" }, "product_reference": "golang-tests-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "relates_to_product_reference": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.aarch64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.ppc64le", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.s390x", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.src", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.src", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-docs-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-misc-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-race-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-src-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-tests-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-12T12:29:22+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.aarch64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.ppc64le", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.s390x", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.src", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.src", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-docs-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-misc-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-race-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-src-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-tests-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2726" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.aarch64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.ppc64le", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.s390x", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.src", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.src", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-docs-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-misc-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-race-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-src-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-tests-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.aarch64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.ppc64le", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.s390x", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.src", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.src", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-docs-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-misc-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-race-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-src-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-tests-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-12T12:29:22+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.aarch64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.ppc64le", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.s390x", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.src", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.src", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-docs-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-misc-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-race-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-src-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-tests-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2726" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.aarch64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.ppc64le", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.s390x", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.src", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.src", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-docs-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-misc-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-race-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-src-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-tests-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" } ] }
rhsa-2019:2661
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the openshift and atomic-enterprise-service-catalog packages is now available for Red Hat OpenShift Container Platform 4.1.\n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Both the openshift and atomic-enterprise-service-catalog packages have been rebuilt with updates versions of golang. The golang packages provide the Go programming language compiler.\n\nSecurity Fix(es):\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:2661", "url": "https://access.redhat.com/errata/RHSA-2019:2661" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2661.json" } ], "title": "Red Hat Security Advisory: Red Hat OpenShift Container Platform 4.1 openshift RPM security update", "tracking": { "current_release_date": "2025-03-15T19:44:13+00:00", "generator": { "date": "2025-03-15T19:44:13+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.1" } }, "id": "RHSA-2019:2661", "initial_release_date": "2019-09-11T05:53:28+00:00", "revision_history": [ { "date": "2019-09-11T05:53:28+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-09-11T05:53:28+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-03-15T19:44:13+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.1", "product": { "name": "Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.1::el7" } } }, { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.1", "product": { "name": "Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.1::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64", "product": { "name": "atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64", "product_id": "atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.1.14-201908290858.git.1.28cc9ff.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "atomic-enterprise-service-catalog-svcat-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64", "product": { "name": "atomic-enterprise-service-catalog-svcat-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64", "product_id": "atomic-enterprise-service-catalog-svcat-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog-svcat@4.1.14-201908290858.git.1.28cc9ff.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "product": { "name": "openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "product_id": "openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "product": { "name": "openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "product_id": "openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.1.14-201908290858.git.0.3bd3467.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "product": { "name": "openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "product_id": "openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "product": { "name": "openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "product_id": "openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "product": { "name": "openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "product_id": "openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.1.14-201908290858.git.0.3bd3467.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "product": { "name": "openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "product_id": "openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.src", "product": { "name": "atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.src", "product_id": "atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.1.14-201908290858.git.1.28cc9ff.el7?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "openshift-0:4.1.14-201908290858.git.0.3bd3467.el7.src", "product": { "name": "openshift-0:4.1.14-201908290858.git.0.3bd3467.el7.src", "product_id": "openshift-0:4.1.14-201908290858.git.0.3bd3467.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "openshift-0:4.1.14-201908290858.git.0.3bd3467.el8.src", "product": { "name": "openshift-0:4.1.14-201908290858.git.0.3bd3467.el8.src", "product_id": "openshift-0:4.1.14-201908290858.git.0.3bd3467.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.src" }, "product_reference": "atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64" }, "product_reference": "atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-svcat-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-svcat-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64" }, "product_reference": "atomic-enterprise-service-catalog-svcat-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-0:4.1.14-201908290858.git.0.3bd3467.el7.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-0:4.1.14-201908290858.git.0.3bd3467.el7.src" }, "product_reference": "openshift-0:4.1.14-201908290858.git.0.3bd3467.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64" }, "product_reference": "openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64" }, "product_reference": "openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64" }, "product_reference": "openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-0:4.1.14-201908290858.git.0.3bd3467.el8.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:openshift-0:4.1.14-201908290858.git.0.3bd3467.el8.src" }, "product_reference": "openshift-0:4.1.14-201908290858.git.0.3bd3467.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64" }, "product_reference": "openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64" }, "product_reference": "openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64" }, "product_reference": "openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.src", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-svcat-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-0:4.1.14-201908290858.git.0.3bd3467.el7.src", "7Server-RH7-RHOSE-4.1:openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "8Base-RHOSE-4.1:openshift-0:4.1.14-201908290858.git.0.3bd3467.el8.src", "8Base-RHOSE-4.1:openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "8Base-RHOSE-4.1:openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "8Base-RHOSE-4.1:openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-11T05:53:28+00:00", "details": "For OpenShift Container Platform 4.1 see the following documentation, which\nwill be updated shortly for release 4.1.14, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.1/updating/updating-cluster-cli.html.", "product_ids": [ "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.src", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-svcat-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-0:4.1.14-201908290858.git.0.3bd3467.el7.src", "7Server-RH7-RHOSE-4.1:openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "8Base-RHOSE-4.1:openshift-0:4.1.14-201908290858.git.0.3bd3467.el8.src", "8Base-RHOSE-4.1:openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "8Base-RHOSE-4.1:openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "8Base-RHOSE-4.1:openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2661" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.src", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-svcat-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-0:4.1.14-201908290858.git.0.3bd3467.el7.src", "7Server-RH7-RHOSE-4.1:openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "8Base-RHOSE-4.1:openshift-0:4.1.14-201908290858.git.0.3bd3467.el8.src", "8Base-RHOSE-4.1:openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "8Base-RHOSE-4.1:openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "8Base-RHOSE-4.1:openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.src", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-svcat-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-0:4.1.14-201908290858.git.0.3bd3467.el7.src", "7Server-RH7-RHOSE-4.1:openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "8Base-RHOSE-4.1:openshift-0:4.1.14-201908290858.git.0.3bd3467.el8.src", "8Base-RHOSE-4.1:openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "8Base-RHOSE-4.1:openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "8Base-RHOSE-4.1:openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-11T05:53:28+00:00", "details": "For OpenShift Container Platform 4.1 see the following documentation, which\nwill be updated shortly for release 4.1.14, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.1/updating/updating-cluster-cli.html.", "product_ids": [ "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.src", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-svcat-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-0:4.1.14-201908290858.git.0.3bd3467.el7.src", "7Server-RH7-RHOSE-4.1:openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "8Base-RHOSE-4.1:openshift-0:4.1.14-201908290858.git.0.3bd3467.el8.src", "8Base-RHOSE-4.1:openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "8Base-RHOSE-4.1:openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "8Base-RHOSE-4.1:openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2661" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.src", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-svcat-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-0:4.1.14-201908290858.git.0.3bd3467.el7.src", "7Server-RH7-RHOSE-4.1:openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "8Base-RHOSE-4.1:openshift-0:4.1.14-201908290858.git.0.3bd3467.el8.src", "8Base-RHOSE-4.1:openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "8Base-RHOSE-4.1:openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "8Base-RHOSE-4.1:openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" } ] }
rhsa-2019:2925
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the nodejs:10 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.\n\nThe following packages have been upgraded to a later upstream version: nodejs (10.16.3).\n\nSecurity Fix(es):\n\n* HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511)\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using PRIORITY frames results in excessive resource consumption (CVE-2019-9513)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* HTTP/2: 0-length headers lead to denial of service (CVE-2019-9516)\n\n* HTTP/2: request for large response leads to denial of service (CVE-2019-9517)\n\n* HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:2925", "url": "https://access.redhat.com/errata/RHSA-2019:2925" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735741" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2925.json" } ], "title": "Red Hat Security Advisory: nodejs:10 security update", "tracking": { "current_release_date": "2025-03-17T01:37:06+00:00", "generator": { "date": "2025-03-17T01:37:06+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.1" } }, "id": "RHSA-2019:2925", "initial_release_date": "2019-09-30T15:15:54+00:00", "revision_history": [ { "date": "2019-09-30T15:15:54+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-09-30T15:15:54+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-03-17T01:37:06+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "nodejs:10:8000020190911085529:f8e95b4e", "product": { "name": "nodejs:10:8000020190911085529:f8e95b4e", "product_id": "nodejs:10:8000020190911085529:f8e95b4e", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/nodejs@10:8000020190911085529:f8e95b4e" } } }, { "category": "product_version", "name": "nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "product": { "name": "nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "product_id": "nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.0%2B4214%2B49953fda?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "product": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "product_id": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8%2B2632%2B6c5111ed?arch=noarch" } } }, { "category": "product_version", "name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "product": { "name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "product_id": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8%2B2873%2Baa7dfd9a?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "product": { "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "product_id": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.0%2B4214%2B49953fda?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "product": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "product_id": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8%2B2632%2B6c5111ed?arch=src" } } }, { "category": "product_version", "name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "product": { "name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "product_id": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8%2B2873%2Baa7dfd9a?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product": { "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product_id": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.0%2B4214%2B49953fda?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product": { "name": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product_id": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.0%2B4214%2B49953fda?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product": { "name": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product_id": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.0%2B4214%2B49953fda?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product": { "name": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product_id": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.0%2B4214%2B49953fda?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product": { "name": "nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product_id": "nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.0%2B4214%2B49953fda?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64", "product": { "name": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64", "product_id": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.0%2B4214%2B49953fda?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "product": { "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "product_id": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.0%2B4214%2B49953fda?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "product": { "name": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "product_id": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.0%2B4214%2B49953fda?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "product": { "name": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "product_id": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.0%2B4214%2B49953fda?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "product": { "name": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "product_id": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.0%2B4214%2B49953fda?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "product": { "name": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "product_id": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.0%2B4214%2B49953fda?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "product": { "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "product_id": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.0%2B4214%2B49953fda?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "product": { "name": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "product_id": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.0%2B4214%2B49953fda?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "product": { "name": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "product_id": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.0%2B4214%2B49953fda?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "product": { "name": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "product_id": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.0%2B4214%2B49953fda?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "product": { "name": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "product_id": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.0%2B4214%2B49953fda?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "product": { "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "product_id": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.0%2B4214%2B49953fda?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "product": { "name": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "product_id": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.0%2B4214%2B49953fda?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "product": { "name": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "product_id": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.0%2B4214%2B49953fda?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "product": { "name": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "product_id": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.0%2B4214%2B49953fda?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "product": { "name": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "product_id": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.0.0%2B4214%2B49953fda?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, "product_reference": "nodejs:10:8000020190911085529:f8e95b4e", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64 as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64" }, "product_reference": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le" }, "product_reference": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x" }, "product_reference": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src" }, "product_reference": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64 as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64" }, "product_reference": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64 as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64" }, "product_reference": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le" }, "product_reference": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x" }, "product_reference": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64 as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64" }, "product_reference": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64 as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64" }, "product_reference": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le" }, "product_reference": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x" }, "product_reference": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64 as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64" }, "product_reference": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64 as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64" }, "product_reference": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le" }, "product_reference": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x" }, "product_reference": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64 as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64" }, "product_reference": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64 as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64" }, "product_reference": "nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch" }, "product_reference": "nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch" }, "product_reference": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src" }, "product_reference": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch" }, "product_reference": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src" }, "product_reference": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64 as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64" }, "product_reference": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le" }, "product_reference": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x" }, "product_reference": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64 as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" }, "product_reference": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-5737", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-03-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1690808" } ], "notes": [ { "category": "description", "text": "It was found that the original fix for Slowloris, CVE-2018-12122, was insufficient. It is possible to bypass the server\u0027s headersTimeout by sending two specially crafted HTTP requests in the same connection. An attacker could use this flaw to bypass Slowloris protection, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Insufficient Slowloris fix causing DoS via server.headersTimeout bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-5737" }, { "category": "external", "summary": "RHBZ#1690808", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1690808" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-5737", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5737" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5737", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5737" }, { "category": "external", "summary": "https://nodejs.org/ja/blog/vulnerability/february-2019-security-releases/", "url": "https://nodejs.org/ja/blog/vulnerability/february-2019-security-releases/" } ], "release_date": "2019-02-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-30T15:15:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2925" }, { "category": "workaround", "details": "The use of a Load Balancer or a Reverse Proxy will increase the difficulty of the attack.", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs: Insufficient Slowloris fix causing DoS via server.headersTimeout bypass" }, { "cve": "CVE-2019-9511", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741860" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker can request a large amount of data by manipulating window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this queue can consume excess CPU, memory, or both, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: large amount of data requests leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "There are no mitigations available for nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "RHBZ#1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9511", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-30T15:15:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2925" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: large amount of data requests leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-30T15:15:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2925" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9513", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735741" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker, using PRIORITY frames to flood the system, could cause excessive CPU usage and starvation of other clients. The largest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PRIORITY frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for packages nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9513" }, { "category": "external", "summary": "RHBZ#1735741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735741" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9513", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9513" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9513", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9513" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nghttp2.org/blog/2019/08/19/nghttp2-v1-39-2/", "url": "https://nghttp2.org/blog/2019/08/19/nghttp2-v1-39-2/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-30T15:15:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2925" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PRIORITY frames results in excessive resource consumption" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-30T15:15:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2925" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-30T15:15:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2925" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "cve": "CVE-2019-9516", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741864" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker, sending a stream of header with a 0-length header name and a 0-length header value, could cause some implementations to allocate memory for these headers and keep the allocations alive until the session dies. The can consume excess memory, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: 0-length headers lead to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9516" }, { "category": "external", "summary": "RHBZ#1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9516", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9516" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://github.com/nghttp2/nghttp2/issues/1382#", "url": "https://github.com/nghttp2/nghttp2/issues/1382#" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-30T15:15:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2925" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: 0-length headers lead to denial of service" }, { "cve": "CVE-2019-9517", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741868" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in HTTP/2. An attacker can open a HTTP/2 window so the peer can send without constraint. The TCP window remains closed so the peer cannot write the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the server\u0027s queue is setup, the responses can consume excess memory, CPU, or both, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: request for large response leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "The package httpd versions as shipped with Red Hat Enterprise Linux 5, 6 and 7 are not affected by this issue as HTTP/2 support is not provided.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9517" }, { "category": "external", "summary": "RHBZ#1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9517", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9517" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-30T15:15:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2925" }, { "category": "workaround", "details": "The httpd version shipped with Red Hat Enterprise Linux 8 provides HTTP/2 support through mod_http2 package. While mod_http2 package is not updated, users can disable HTTP/2 support as mitigation action by executing the following steps:\n\n1. Stop httpd service:\n$ systemctl stop httpd\n\n2. Remove http/2 protocol support from configuration files:\n$ sed -i \u0027s/\\(h2\\)\\|\\(h2c\\)//g\u0027 \u003chttpd_config_file\u003e\n\n3. Validate configuration files to make sure all syntax is valid:\n$ apachectl configtest\n\n4. Restart httpd service:\n$ systemctl start httpd", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: request for large response leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9518", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735749" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using frames with an empty payload, a flood could occur that results in excessive CPU usage and starvation of other clients. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using empty frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9518" }, { "category": "external", "summary": "RHBZ#1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9518", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-30T15:15:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2925" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using empty frames results in excessive resource consumption" } ] }
rhsa-2019:2796
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for skydive is now available for Red Hat OpenStack Platform 14.0 (Rocky).\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Skydive is an open source real-time network topology and protocols analyzer.\n\nSecurity Fix(es):\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:2796", "url": "https://access.redhat.com/errata/RHSA-2019:2796" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2796.json" } ], "title": "Red Hat Security Advisory: skydive security update", "tracking": { "current_release_date": "2025-03-15T19:44:06+00:00", "generator": { "date": "2025-03-15T19:44:06+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.1" } }, "id": "RHSA-2019:2796", "initial_release_date": "2019-09-19T02:32:15+00:00", "revision_history": [ { "date": "2019-09-19T02:32:15+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-09-19T02:32:15+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-03-15T19:44:06+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenStack Platform 14.0", "product": { "name": "Red Hat OpenStack Platform 14.0", "product_id": "7Server-RH7-RHOS-14.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:14::el7" } } } ], "category": "product_family", "name": "Red Hat OpenStack Platform" }, { "branches": [ { "category": "product_version", "name": "skydive-0:0.20.5-2.el7ost.ppc64le", "product": { "name": "skydive-0:0.20.5-2.el7ost.ppc64le", "product_id": "skydive-0:0.20.5-2.el7ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "skydive-agent-0:0.20.5-2.el7ost.ppc64le", "product": { "name": "skydive-agent-0:0.20.5-2.el7ost.ppc64le", "product_id": "skydive-agent-0:0.20.5-2.el7ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "skydive-analyzer-0:0.20.5-2.el7ost.ppc64le", "product": { "name": "skydive-analyzer-0:0.20.5-2.el7ost.ppc64le", "product_id": "skydive-analyzer-0:0.20.5-2.el7ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "skydive-ansible-0:0.20.5-2.el7ost.ppc64le", "product": { "name": "skydive-ansible-0:0.20.5-2.el7ost.ppc64le", "product_id": "skydive-ansible-0:0.20.5-2.el7ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "skydive-debuginfo-0:0.20.5-2.el7ost.ppc64le", "product": { "name": "skydive-debuginfo-0:0.20.5-2.el7ost.ppc64le", "product_id": "skydive-debuginfo-0:0.20.5-2.el7ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "skydive-0:0.20.5-2.el7ost.x86_64", "product": { "name": "skydive-0:0.20.5-2.el7ost.x86_64", "product_id": "skydive-0:0.20.5-2.el7ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "skydive-agent-0:0.20.5-2.el7ost.x86_64", "product": { "name": "skydive-agent-0:0.20.5-2.el7ost.x86_64", "product_id": "skydive-agent-0:0.20.5-2.el7ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "skydive-analyzer-0:0.20.5-2.el7ost.x86_64", "product": { "name": "skydive-analyzer-0:0.20.5-2.el7ost.x86_64", "product_id": "skydive-analyzer-0:0.20.5-2.el7ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "skydive-ansible-0:0.20.5-2.el7ost.x86_64", "product": { "name": "skydive-ansible-0:0.20.5-2.el7ost.x86_64", "product_id": "skydive-ansible-0:0.20.5-2.el7ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "skydive-debuginfo-0:0.20.5-2.el7ost.x86_64", "product": { "name": "skydive-debuginfo-0:0.20.5-2.el7ost.x86_64", "product_id": "skydive-debuginfo-0:0.20.5-2.el7ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "skydive-0:0.20.5-2.el7ost.src", "product": { "name": "skydive-0:0.20.5-2.el7ost.src", "product_id": "skydive-0:0.20.5-2.el7ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "skydive-selinux-0:0.20.5-2.el7ost.noarch", "product": { "name": "skydive-selinux-0:0.20.5-2.el7ost.noarch", "product_id": "skydive-selinux-0:0.20.5-2.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "skydive-0:0.20.5-2.el7ost.ppc64le as a component of Red Hat OpenStack Platform 14.0", "product_id": "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.ppc64le" }, "product_reference": "skydive-0:0.20.5-2.el7ost.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOS-14.0" }, { "category": "default_component_of", "full_product_name": { "name": "skydive-0:0.20.5-2.el7ost.src as a component of Red Hat OpenStack Platform 14.0", "product_id": "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.src" }, "product_reference": "skydive-0:0.20.5-2.el7ost.src", "relates_to_product_reference": "7Server-RH7-RHOS-14.0" }, { "category": "default_component_of", "full_product_name": { "name": "skydive-0:0.20.5-2.el7ost.x86_64 as a component of Red Hat OpenStack Platform 14.0", "product_id": "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.x86_64" }, "product_reference": "skydive-0:0.20.5-2.el7ost.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-14.0" }, { "category": "default_component_of", "full_product_name": { "name": "skydive-agent-0:0.20.5-2.el7ost.ppc64le as a component of Red Hat OpenStack Platform 14.0", "product_id": "7Server-RH7-RHOS-14.0:skydive-agent-0:0.20.5-2.el7ost.ppc64le" }, "product_reference": "skydive-agent-0:0.20.5-2.el7ost.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOS-14.0" }, { "category": "default_component_of", "full_product_name": { "name": "skydive-agent-0:0.20.5-2.el7ost.x86_64 as a component of Red Hat OpenStack Platform 14.0", "product_id": "7Server-RH7-RHOS-14.0:skydive-agent-0:0.20.5-2.el7ost.x86_64" }, "product_reference": "skydive-agent-0:0.20.5-2.el7ost.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-14.0" }, { "category": "default_component_of", "full_product_name": { "name": "skydive-analyzer-0:0.20.5-2.el7ost.ppc64le as a component of Red Hat OpenStack Platform 14.0", "product_id": "7Server-RH7-RHOS-14.0:skydive-analyzer-0:0.20.5-2.el7ost.ppc64le" }, "product_reference": "skydive-analyzer-0:0.20.5-2.el7ost.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOS-14.0" }, { "category": "default_component_of", "full_product_name": { "name": "skydive-analyzer-0:0.20.5-2.el7ost.x86_64 as a component of Red Hat OpenStack Platform 14.0", "product_id": "7Server-RH7-RHOS-14.0:skydive-analyzer-0:0.20.5-2.el7ost.x86_64" }, "product_reference": "skydive-analyzer-0:0.20.5-2.el7ost.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-14.0" }, { "category": "default_component_of", "full_product_name": { "name": "skydive-ansible-0:0.20.5-2.el7ost.ppc64le as a component of Red Hat OpenStack Platform 14.0", "product_id": "7Server-RH7-RHOS-14.0:skydive-ansible-0:0.20.5-2.el7ost.ppc64le" }, "product_reference": "skydive-ansible-0:0.20.5-2.el7ost.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOS-14.0" }, { "category": "default_component_of", "full_product_name": { "name": "skydive-ansible-0:0.20.5-2.el7ost.x86_64 as a component of Red Hat OpenStack Platform 14.0", "product_id": "7Server-RH7-RHOS-14.0:skydive-ansible-0:0.20.5-2.el7ost.x86_64" }, "product_reference": "skydive-ansible-0:0.20.5-2.el7ost.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-14.0" }, { "category": "default_component_of", "full_product_name": { "name": "skydive-debuginfo-0:0.20.5-2.el7ost.ppc64le as a component of Red Hat OpenStack Platform 14.0", "product_id": "7Server-RH7-RHOS-14.0:skydive-debuginfo-0:0.20.5-2.el7ost.ppc64le" }, "product_reference": "skydive-debuginfo-0:0.20.5-2.el7ost.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOS-14.0" }, { "category": "default_component_of", "full_product_name": { "name": "skydive-debuginfo-0:0.20.5-2.el7ost.x86_64 as a component of Red Hat OpenStack Platform 14.0", "product_id": "7Server-RH7-RHOS-14.0:skydive-debuginfo-0:0.20.5-2.el7ost.x86_64" }, "product_reference": "skydive-debuginfo-0:0.20.5-2.el7ost.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-14.0" }, { "category": "default_component_of", "full_product_name": { "name": "skydive-selinux-0:0.20.5-2.el7ost.noarch as a component of Red Hat OpenStack Platform 14.0", "product_id": "7Server-RH7-RHOS-14.0:skydive-selinux-0:0.20.5-2.el7ost.noarch" }, "product_reference": "skydive-selinux-0:0.20.5-2.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-14.0" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.src", "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-agent-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-agent-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-analyzer-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-analyzer-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-ansible-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-ansible-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-debuginfo-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-debuginfo-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-selinux-0:0.20.5-2.el7ost.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-19T02:32:15+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.src", "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-agent-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-agent-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-analyzer-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-analyzer-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-ansible-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-ansible-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-debuginfo-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-debuginfo-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-selinux-0:0.20.5-2.el7ost.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2796" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.src", "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-agent-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-agent-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-analyzer-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-analyzer-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-ansible-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-ansible-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-debuginfo-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-debuginfo-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-selinux-0:0.20.5-2.el7ost.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.src", "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-agent-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-agent-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-analyzer-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-analyzer-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-ansible-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-ansible-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-debuginfo-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-debuginfo-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-selinux-0:0.20.5-2.el7ost.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-19T02:32:15+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.src", "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-agent-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-agent-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-analyzer-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-analyzer-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-ansible-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-ansible-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-debuginfo-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-debuginfo-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-selinux-0:0.20.5-2.el7ost.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2796" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.src", "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-agent-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-agent-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-analyzer-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-analyzer-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-ansible-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-ansible-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-debuginfo-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-debuginfo-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-selinux-0:0.20.5-2.el7ost.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.src", "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-agent-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-agent-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-analyzer-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-analyzer-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-ansible-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-ansible-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-debuginfo-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-debuginfo-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-selinux-0:0.20.5-2.el7ost.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-19T02:32:15+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.src", "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-agent-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-agent-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-analyzer-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-analyzer-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-ansible-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-ansible-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-debuginfo-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-debuginfo-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-selinux-0:0.20.5-2.el7ost.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2796" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.src", "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-agent-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-agent-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-analyzer-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-analyzer-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-ansible-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-ansible-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-debuginfo-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-debuginfo-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-selinux-0:0.20.5-2.el7ost.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" } ] }
rhsa-2019_4042
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "New Red Hat Single Sign-On 7.3.5 packages are now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Single Sign-On 7.3 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications.\n\nThis release of Red Hat Single Sign-On 7.3.5 on RHEL 8 serves as a replacement for Red Hat Single Sign-On 7.3.4, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* keycloak: Service accounts reset password flow not using placeholder.org domain anymore (CVE-2019-14837)\n\n* undertow: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* undertow: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* undertow: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default (CVE-2019-14838)\n\n* wildfly: wildfly-security-manager: security manager authorization bypass (CVE-2019-14843)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:4042", "url": "https://access.redhat.com/errata/RHSA-2019:4042" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.3/", "url": "https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.3/" }, { "category": "external", "summary": "1730227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1730227" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1751227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751227" }, { "category": "external", "summary": "1752980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752980" }, { "category": "external", "summary": "KEYCLOAK-11817", "url": "https://issues.redhat.com/browse/KEYCLOAK-11817" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_4042.json" } ], "title": "Red Hat Security Advisory: Red Hat Single Sign-On 7.3.5 security update on RHEL 8", "tracking": { "current_release_date": "2024-11-15T04:13:49+00:00", "generator": { "date": "2024-11-15T04:13:49+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2019:4042", "initial_release_date": "2019-12-02T17:04:50+00:00", "revision_history": [ { "date": "2019-12-02T17:04:50+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-12-02T17:04:50+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T04:13:49+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Single Sign-On 7.3 for RHEL 8", "product": { "name": "Red Hat Single Sign-On 7.3 for RHEL 8", "product_id": "8Base-RHSSO-7.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:red_hat_single_sign_on:7::el8" } } } ], "category": "product_family", "name": "Red Hat Single Sign-On" }, { "branches": [ { "category": "product_version", "name": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "product": { "name": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "product_id": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8sso?arch=noarch" } } }, { "category": "product_version", "name": "rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "product": { "name": "rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "product_id": "rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8sso?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "product": { "name": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "product_id": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8sso?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch as a component of Red Hat Single Sign-On 7.3 for RHEL 8", "product_id": "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" }, "product_reference": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "relates_to_product_reference": "8Base-RHSSO-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src as a component of Red Hat Single Sign-On 7.3 for RHEL 8", "product_id": "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src" }, "product_reference": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "relates_to_product_reference": "8Base-RHSSO-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch as a component of Red Hat Single Sign-On 7.3 for RHEL 8", "product_id": "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" }, "product_reference": "rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "relates_to_product_reference": "8Base-RHSSO-7.3" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:04:50+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4042" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:04:50+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4042" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:04:50+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4042" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "Vadim Ashikhman" ] } ], "cve": "CVE-2019-14837", "cwe": { "id": "CWE-547", "name": "Use of Hard-coded, Security-relevant Constants" }, "discovery_date": "2019-07-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1730227" } ], "notes": [ { "category": "description", "text": "A flaw was found in Keycloak. The use of an open hard-coded domain can allow an unauthorized login by setting up a mail server and resetting the user credentials, enabling information disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak: keycloak uses hardcoded open dummy domain for new accounts enabling information disclosure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14837" }, { "category": "external", "summary": "RHBZ#1730227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1730227" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14837", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14837" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14837", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14837" } ], "release_date": "2019-12-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:04:50+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4042" }, { "category": "workaround", "details": "It is not a very straight forward workaround but it is possible to mitigate this by manually editing the default Email ID ([email protected]) to some valid email ID ([email protected]) in the USER_ENTITY table in the RHSSO database used.", "product_ids": [ "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "keycloak: keycloak uses hardcoded open dummy domain for new accounts enabling information disclosure" }, { "acknowledgments": [ { "names": [ "F\u00e1bio Magalh\u00e3es de Andrade" ], "organization": "Sonda Ativas" }, { "names": [ "Juliano de Castro Santos", "Leonard Lunardi" ], "organization": "UnimedBH" } ], "cve": "CVE-2019-14838", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2019-08-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1751227" } ], "notes": [ { "category": "description", "text": "It was found that Wildfly users had default user permissions set incorrectly. A malicious user could use this flaw to access unauthorized controls for the application server.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14838" }, { "category": "external", "summary": "RHBZ#1751227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751227" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14838", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14838" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14838", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14838" }, { "category": "external", "summary": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14838", "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14838" } ], "release_date": "2019-10-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:04:50+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4042" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default" }, { "cve": "CVE-2019-14843", "cwe": { "id": "CWE-592", "name": "CWE-592" }, "discovery_date": "2019-09-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1752980" } ], "notes": [ { "category": "description", "text": "A flaw was found in Wildfly Security Manager, running under JDK 11 or 8, that authorized requests for any requester. This flaw could be used by a malicious app deployed on the app server to access unauthorized information and possibly conduct further attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-security-manager: security manager authorization bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14843" }, { "category": "external", "summary": "RHBZ#1752980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752980" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14843", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14843" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14843", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14843" } ], "release_date": "2019-09-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:04:50+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4042" }, { "category": "workaround", "details": "This flaw only affects the Security Manager running under JDK 11 or 8. To mitigate exposure to this flaw, do not run under those JDK versions.", "product_ids": [ "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "wildfly-security-manager: security manager authorization bypass" } ] }
RHSA-2019:4018
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat JBoss Enterprise Application Platform 7.2 for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime.\n\nThis release of Red Hat JBoss Enterprise Application Platform 7.2.5 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.2.4, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.2.5 Release Notes for information about the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* undertow: HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511)\n\n* undertow: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* undertow: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* undertow: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default (CVE-2019-14838)\n\n* wildfly: wildfly-security-manager: security manager authorization bypass (CVE-2019-14843)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:4018", "url": "https://access.redhat.com/errata/RHSA-2019:4018" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/", "url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/html-single/installation_guide/", "url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/html-single/installation_guide/" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "1751227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751227" }, { "category": "external", "summary": "1752980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752980" }, { "category": "external", "summary": "JBEAP-17075", "url": "https://issues.redhat.com/browse/JBEAP-17075" }, { "category": "external", "summary": "JBEAP-17220", "url": "https://issues.redhat.com/browse/JBEAP-17220" }, { "category": "external", "summary": "JBEAP-17365", "url": "https://issues.redhat.com/browse/JBEAP-17365" }, { "category": "external", "summary": "JBEAP-17476", "url": "https://issues.redhat.com/browse/JBEAP-17476" }, { "category": "external", "summary": "JBEAP-17478", "url": "https://issues.redhat.com/browse/JBEAP-17478" }, { "category": "external", "summary": "JBEAP-17483", "url": "https://issues.redhat.com/browse/JBEAP-17483" }, { "category": "external", "summary": "JBEAP-17495", "url": "https://issues.redhat.com/browse/JBEAP-17495" }, { "category": "external", "summary": "JBEAP-17496", "url": "https://issues.redhat.com/browse/JBEAP-17496" }, { "category": "external", "summary": "JBEAP-17513", "url": "https://issues.redhat.com/browse/JBEAP-17513" }, { "category": "external", "summary": "JBEAP-17521", "url": "https://issues.redhat.com/browse/JBEAP-17521" }, { "category": "external", "summary": "JBEAP-17523", "url": "https://issues.redhat.com/browse/JBEAP-17523" }, { "category": "external", "summary": "JBEAP-17547", "url": "https://issues.redhat.com/browse/JBEAP-17547" }, { "category": "external", "summary": "JBEAP-17548", "url": "https://issues.redhat.com/browse/JBEAP-17548" }, { "category": "external", "summary": "JBEAP-17560", "url": "https://issues.redhat.com/browse/JBEAP-17560" }, { "category": "external", "summary": "JBEAP-17579", "url": "https://issues.redhat.com/browse/JBEAP-17579" }, { "category": "external", "summary": "JBEAP-17582", "url": "https://issues.redhat.com/browse/JBEAP-17582" }, { "category": "external", "summary": "JBEAP-17603", "url": "https://issues.redhat.com/browse/JBEAP-17603" }, { "category": "external", "summary": "JBEAP-17631", "url": "https://issues.redhat.com/browse/JBEAP-17631" }, { "category": "external", "summary": "JBEAP-17647", "url": "https://issues.redhat.com/browse/JBEAP-17647" }, { "category": "external", "summary": "JBEAP-17665", "url": "https://issues.redhat.com/browse/JBEAP-17665" }, { "category": "external", "summary": "JBEAP-17722", "url": "https://issues.redhat.com/browse/JBEAP-17722" }, { "category": "external", "summary": "JBEAP-17874", "url": "https://issues.redhat.com/browse/JBEAP-17874" }, { "category": "external", "summary": "JBEAP-17880", "url": "https://issues.redhat.com/browse/JBEAP-17880" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_4018.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 6 security update", "tracking": { "current_release_date": "2025-03-19T15:00:39+00:00", "generator": { "date": "2025-03-19T15:00:39+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.1" } }, "id": "RHSA-2019:4018", "initial_release_date": "2019-11-26T19:57:07+00:00", "revision_history": [ { "date": "2019-11-26T19:57:07+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-11-26T19:57:07+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-03-19T15:00:39+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product": { "name": "Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el6" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" }, { "branches": [ { "category": "product_version", "name": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "product_id": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "product_id": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "product_id": "eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "product_id": "eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "product_id": "eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "product": { "name": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "product_id": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00003.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "product": { "name": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "product_id": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00002.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "product": { "name": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "product_id": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00005.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "product": { "name": "eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "product_id": "eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00005.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product": { "name": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product_id": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product": { "name": "eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product_id": "eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product": { "name": "eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product_id": "eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product": { "name": "eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product_id": "eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product": { "name": "eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product_id": "eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product": { "name": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product_id": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product": { "name": "eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product_id": "eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product": { "name": "eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product_id": "eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product": { "name": "eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product_id": "eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product": { "name": "eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product_id": "eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "product_id": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "product_id": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "product": { "name": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "product_id": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00002.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "product": { "name": "eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "product_id": "eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00002.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "product": { "name": "eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "product_id": "eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00002.1.el6eap?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "product": { "name": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "product_id": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "product": { "name": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "product_id": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00001.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "product": { "name": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "product_id": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00003.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "product": { "name": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "product_id": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00002.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "product": { "name": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "product_id": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "product": { "name": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "product_id": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "product": { "name": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "product_id": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "product": { "name": "eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "product_id": "eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "product": { "name": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "product_id": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "product": { "name": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "product_id": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "product": { "name": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "product_id": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "product": { "name": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "product_id": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00005.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "product": { "name": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "product_id": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "product": { "name": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "product_id": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "product": { "name": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "product_id": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "product": { "name": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "product_id": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "product": { "name": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "product_id": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "product": { "name": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "product_id": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src", "product": { "name": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src", "product_id": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00001.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "product": { "name": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "product_id": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "product": { "name": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "product_id": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "product": { "name": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "product_id": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00002.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "product": { "name": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "product_id": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "product": { "name": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "product_id": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=x86_64" } } }, { "category": "product_version", "name": "eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "product": { "name": "eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "product_id": "eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6eap?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src" }, "product_reference": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch" }, "product_reference": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src" }, "product_reference": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch" }, "product_reference": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src" }, "product_reference": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src" }, "product_reference": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src" }, "product_reference": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src" }, "product_reference": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src" }, "product_reference": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src" }, "product_reference": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src" }, "product_reference": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src" }, "product_reference": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src" }, "product_reference": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch" }, "product_reference": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src" }, "product_reference": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch" }, "product_reference": "eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch" }, "product_reference": "eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch" }, "product_reference": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src" }, "product_reference": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch" }, "product_reference": "eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch" }, "product_reference": "eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch" }, "product_reference": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src" }, "product_reference": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch" }, "product_reference": "eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch" }, "product_reference": "eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch" }, "product_reference": "eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch" }, "product_reference": "eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch" }, "product_reference": "eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src" }, "product_reference": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src" }, "product_reference": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch" }, "product_reference": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src" }, "product_reference": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src" }, "product_reference": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src" }, "product_reference": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src" }, "product_reference": "eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch" }, "product_reference": "eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch" }, "product_reference": "eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src" }, "product_reference": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src" }, "product_reference": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64 as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64" }, "product_reference": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64 as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64" }, "product_reference": "eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" }, "product_reference": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-9511", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741860" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker can request a large amount of data by manipulating window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this queue can consume excess CPU, memory, or both, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: large amount of data requests leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "There are no mitigations available for nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "RHBZ#1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9511", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T19:57:07+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details about how to apply this update, which includes the changes described in this advisory, see:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4018" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: large amount of data requests leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T19:57:07+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details about how to apply this update, which includes the changes described in this advisory, see:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4018" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T19:57:07+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details about how to apply this update, which includes the changes described in this advisory, see:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4018" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T19:57:07+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details about how to apply this update, which includes the changes described in this advisory, see:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4018" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "F\u00e1bio Magalh\u00e3es de Andrade" ], "organization": "Sonda Ativas" }, { "names": [ "Juliano de Castro Santos", "Leonard Lunardi" ], "organization": "UnimedBH" } ], "cve": "CVE-2019-14838", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2019-08-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1751227" } ], "notes": [ { "category": "description", "text": "It was found that Wildfly users had default user permissions set incorrectly. A malicious user could use this flaw to access unauthorized controls for the application server.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14838" }, { "category": "external", "summary": "RHBZ#1751227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751227" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14838", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14838" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14838", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14838" }, { "category": "external", "summary": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14838", "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14838" } ], "release_date": "2019-10-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T19:57:07+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details about how to apply this update, which includes the changes described in this advisory, see:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4018" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default" }, { "cve": "CVE-2019-14843", "cwe": { "id": "CWE-592", "name": "CWE-592" }, "discovery_date": "2019-09-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1752980" } ], "notes": [ { "category": "description", "text": "A flaw was found in Wildfly Security Manager, running under JDK 11 or 8, that authorized requests for any requester. This flaw could be used by a malicious app deployed on the app server to access unauthorized information and possibly conduct further attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-security-manager: security manager authorization bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14843" }, { "category": "external", "summary": "RHBZ#1752980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752980" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14843", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14843" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14843", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14843" } ], "release_date": "2019-09-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T19:57:07+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details about how to apply this update, which includes the changes described in this advisory, see:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4018" }, { "category": "workaround", "details": "This flaw only affects the Security Manager running under JDK 11 or 8. To mitigate exposure to this flaw, do not run under those JDK versions.", "product_ids": [ "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "wildfly-security-manager: security manager authorization bypass" } ] }
rhsa-2019:4021
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat JBoss Enterprise Application Platform 7.2.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime.\n\nThis release of Red Hat JBoss Enterprise Application Platform 7.2.5 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.2.4, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.2.5 Release Notes for information about the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* undertow: HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511)\n\n* undertow: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* undertow: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* undertow: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default (CVE-2019-14838)\n\n* wildfly: wildfly-security-manager: security manager authorization bypass (CVE-2019-14843)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:4021", "url": "https://access.redhat.com/errata/RHSA-2019:4021" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform\u0026downloadType=securityPatches\u0026version=7.2", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform\u0026downloadType=securityPatches\u0026version=7.2" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/", "url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/html-single/installation_guide/", "url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/html-single/installation_guide/" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "1751227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751227" }, { "category": "external", "summary": "1752980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752980" }, { "category": "external", "summary": "JBEAP-17075", "url": "https://issues.redhat.com/browse/JBEAP-17075" }, { "category": "external", "summary": "JBEAP-17220", "url": "https://issues.redhat.com/browse/JBEAP-17220" }, { "category": "external", "summary": "JBEAP-17365", "url": "https://issues.redhat.com/browse/JBEAP-17365" }, { "category": "external", "summary": "JBEAP-17476", "url": "https://issues.redhat.com/browse/JBEAP-17476" }, { "category": "external", "summary": "JBEAP-17478", "url": "https://issues.redhat.com/browse/JBEAP-17478" }, { "category": "external", "summary": "JBEAP-17483", "url": "https://issues.redhat.com/browse/JBEAP-17483" }, { "category": "external", "summary": "JBEAP-17495", "url": "https://issues.redhat.com/browse/JBEAP-17495" }, { "category": "external", "summary": "JBEAP-17496", "url": "https://issues.redhat.com/browse/JBEAP-17496" }, { "category": "external", "summary": "JBEAP-17513", "url": "https://issues.redhat.com/browse/JBEAP-17513" }, { "category": "external", "summary": "JBEAP-17521", "url": "https://issues.redhat.com/browse/JBEAP-17521" }, { "category": "external", "summary": "JBEAP-17523", "url": "https://issues.redhat.com/browse/JBEAP-17523" }, { "category": "external", "summary": "JBEAP-17547", "url": "https://issues.redhat.com/browse/JBEAP-17547" }, { "category": "external", "summary": "JBEAP-17548", "url": "https://issues.redhat.com/browse/JBEAP-17548" }, { "category": "external", "summary": "JBEAP-17560", "url": "https://issues.redhat.com/browse/JBEAP-17560" }, { "category": "external", "summary": "JBEAP-17579", "url": "https://issues.redhat.com/browse/JBEAP-17579" }, { "category": "external", "summary": "JBEAP-17582", "url": "https://issues.redhat.com/browse/JBEAP-17582" }, { "category": "external", "summary": "JBEAP-17631", "url": "https://issues.redhat.com/browse/JBEAP-17631" }, { "category": "external", "summary": "JBEAP-17647", "url": "https://issues.redhat.com/browse/JBEAP-17647" }, { "category": "external", "summary": "JBEAP-17665", "url": "https://issues.redhat.com/browse/JBEAP-17665" }, { "category": "external", "summary": "JBEAP-17722", "url": "https://issues.redhat.com/browse/JBEAP-17722" }, { "category": "external", "summary": "JBEAP-17874", "url": "https://issues.redhat.com/browse/JBEAP-17874" }, { "category": "external", "summary": "JBEAP-17880", "url": "https://issues.redhat.com/browse/JBEAP-17880" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_4021.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.5 security update", "tracking": { "current_release_date": "2025-03-15T19:44:34+00:00", "generator": { "date": "2025-03-15T19:44:34+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.1" } }, "id": "RHSA-2019:4021", "initial_release_date": "2019-11-26T19:58:39+00:00", "revision_history": [ { "date": "2019-11-26T19:58:39+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-11-26T19:58:39+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-03-15T19:44:34+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss EAP 7.2", "product": { "name": "Red Hat JBoss EAP 7.2", "product_id": "Red Hat JBoss EAP 7.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:7.2" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-9511", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741860" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker can request a large amount of data by manipulating window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this queue can consume excess CPU, memory, or both, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: large amount of data requests leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "There are no mitigations available for nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss EAP 7.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "RHBZ#1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9511", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T19:58:39+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).\n\nThe JBoss server process must be restarted for the update to take effect.", "product_ids": [ "Red Hat JBoss EAP 7.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4021" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "Red Hat JBoss EAP 7.2" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss EAP 7.2" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: large amount of data requests leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss EAP 7.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T19:58:39+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).\n\nThe JBoss server process must be restarted for the update to take effect.", "product_ids": [ "Red Hat JBoss EAP 7.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4021" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss EAP 7.2" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss EAP 7.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T19:58:39+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).\n\nThe JBoss server process must be restarted for the update to take effect.", "product_ids": [ "Red Hat JBoss EAP 7.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4021" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss EAP 7.2" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss EAP 7.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T19:58:39+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).\n\nThe JBoss server process must be restarted for the update to take effect.", "product_ids": [ "Red Hat JBoss EAP 7.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4021" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss EAP 7.2" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "F\u00e1bio Magalh\u00e3es de Andrade" ], "organization": "Sonda Ativas" }, { "names": [ "Juliano de Castro Santos", "Leonard Lunardi" ], "organization": "UnimedBH" } ], "cve": "CVE-2019-14838", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2019-08-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1751227" } ], "notes": [ { "category": "description", "text": "It was found that Wildfly users had default user permissions set incorrectly. A malicious user could use this flaw to access unauthorized controls for the application server.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss EAP 7.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14838" }, { "category": "external", "summary": "RHBZ#1751227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751227" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14838", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14838" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14838", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14838" }, { "category": "external", "summary": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14838", "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14838" } ], "release_date": "2019-10-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T19:58:39+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).\n\nThe JBoss server process must be restarted for the update to take effect.", "product_ids": [ "Red Hat JBoss EAP 7.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4021" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss EAP 7.2" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default" }, { "cve": "CVE-2019-14843", "cwe": { "id": "CWE-592", "name": "CWE-592" }, "discovery_date": "2019-09-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1752980" } ], "notes": [ { "category": "description", "text": "A flaw was found in Wildfly Security Manager, running under JDK 11 or 8, that authorized requests for any requester. This flaw could be used by a malicious app deployed on the app server to access unauthorized information and possibly conduct further attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-security-manager: security manager authorization bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss EAP 7.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14843" }, { "category": "external", "summary": "RHBZ#1752980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752980" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14843", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14843" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14843", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14843" } ], "release_date": "2019-09-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T19:58:39+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).\n\nThe JBoss server process must be restarted for the update to take effect.", "product_ids": [ "Red Hat JBoss EAP 7.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4021" }, { "category": "workaround", "details": "This flaw only affects the Security Manager running under JDK 11 or 8. To mitigate exposure to this flaw, do not run under those JDK versions.", "product_ids": [ "Red Hat JBoss EAP 7.2" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss EAP 7.2" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "wildfly-security-manager: security manager authorization bypass" } ] }
rhsa-2020_0983
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "A minor version update (from 7.5 to 7.6) is now available for Red Hat Fuse. The purpose of this text-only errata is to inform you about the security issues fixed in this release.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.\n\n[2020-04-17 update: descriptions for mutiple components fixed for the same CVE added; also added golang CVE descriptions that were unintentionally ommitted from the original publication]", "title": "Topic" }, { "category": "general", "text": "This release of Red Hat Fuse 7.6.0 serves as a replacement for Red Hat Fuse 7.5, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* undertow: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* golang: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* undertow: HTTP/2: flood using PRIORITY frames results in excessive resource consumption (CVE-2019-9513)\n\n* undertow: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* golang: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* undertow: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* undertow: HTTP/2: 0-length headers lead to denial of service (CVE-2019-9516)\n\n* undertow: HTTP/2: request for large response leads to denial of service (CVE-2019-9517)\n\n* undertow: HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)\n\n* infinispan: invokeAccessibly method from ReflectionUtil class allows to invoke private methods (CVE-2019-10174)\n\n* spring-security-core: mishandling of user passwords allows logging in with a password of NULL (CVE-2019-11272)\n\n* jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution (CVE-2019-12384)\n\n* jackson-databind: default typing mishandling leading to remote code execution (CVE-2019-14379)\n\n* xmlrpc: Deserialization of server-side exception from faultCause in XMLRPC error response (CVE-2019-17570)\n\n* js-jquery: Cross-site scripting via cross-domain ajax requests (CVE-2015-9251)\n\n* logback: Serialization vulnerability in SocketServer and ServerSocketReceiver (CVE-2017-5929)\n\n* js-jquery: XSS in responses from cross-origin ajax requests (CVE-2017-16012)\n\n* apache-commons-compress: ZipArchiveInputStream.read() fails to identify correct EOF allowing for DoS via crafted zip (CVE-2018-11771)\n\n* spring-data-api: potential information disclosure through maliciously crafted example value in ExampleMatcher (CVE-2019-3802)\n\n* undertow: leak credentials to log files UndertowLogger.REQUEST_LOGGER.undertowRequestFailed (CVE-2019-3888)\n\n* shiro: Cookie padding oracle vulnerability with default configuration (CVE-2019-12422)\n\n* jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message. (CVE-2019-12814)\n\n* jackson-databind: Polymorphic typing issue related to logback/JNDI (CVE-2019-14439)\n\n* springframework: DoS Attack via Range Requests (CVE-2018-15756)\n\n* c3p0: loading XML configuration leads to denial of service (CVE-2019-5427)\n\n* undertow: Information leak in requests for directories without trailing slashes (CVE-2019-10184)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:0983", "url": "https://access.redhat.com/errata/RHSA-2020:0983" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=jboss.fuse\u0026version=7.6.0", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=jboss.fuse\u0026version=7.6.0" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "url": "https://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/" }, { "category": "external", "summary": "1399546", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1399546" }, { "category": "external", "summary": "1432858", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1432858" }, { "category": "external", "summary": "1591854", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1591854" }, { "category": "external", "summary": "1618573", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618573" }, { "category": "external", "summary": "1643043", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1643043" }, { "category": "external", "summary": "1693777", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1693777" }, { "category": "external", "summary": "1703469", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1703469" }, { "category": "external", "summary": "1709860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1709860" }, { "category": "external", "summary": "1713068", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1713068" }, { "category": "external", "summary": "1725795", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1725795" }, { "category": "external", "summary": "1725807", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1725807" }, { "category": "external", "summary": "1728993", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1728993" }, { "category": "external", "summary": "1730316", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1730316" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735741" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "1737517", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1737517" }, { "category": "external", "summary": "1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "external", "summary": "1752962", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752962" }, { "category": "external", "summary": "1774726", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774726" }, { "category": "external", "summary": "1775193", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775193" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_0983.json" } ], "title": "Red Hat Security Advisory: Red Hat Fuse 7.6.0 security update", "tracking": { "current_release_date": "2024-12-15T18:56:11+00:00", "generator": { "date": "2024-12-15T18:56:11+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2020:0983", "initial_release_date": "2020-03-26T15:46:59+00:00", "revision_history": [ { "date": "2020-03-26T15:46:59+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-04-20T07:19:13+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-15T18:56:11+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Fuse 7.6.0", "product": { "name": "Red Hat Fuse 7.6.0", "product_id": "Red Hat Fuse 7.6.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_fuse:7" } } } ], "category": "product_family", "name": "Red Hat JBoss Fuse" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-9251", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2016-11-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1399546" } ], "notes": [ { "category": "description", "text": "jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.", "title": "Vulnerability description" }, { "category": "summary", "text": "jquery: Cross-site scripting via cross-domain ajax requests", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-9251" }, { "category": "external", "summary": "RHBZ#1399546", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1399546" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-9251", "url": "https://www.cve.org/CVERecord?id=CVE-2015-9251" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-9251", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-9251" } ], "release_date": "2015-06-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jquery: Cross-site scripting via cross-domain ajax requests" }, { "cve": "CVE-2017-5929", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2017-03-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1432858" } ], "notes": [ { "category": "description", "text": "It was found that logback is vulnerable to a deserialization issue. Logback can be configured to allow remote logging through SocketServer/ServerSocketReceiver interfaces that can accept untrusted serialized data. Authenticated attackers on the adjacent network can leverage this vulnerability to execute arbitrary code through deserialization of custom gadget chains.", "title": "Vulnerability description" }, { "category": "summary", "text": "logback: Serialization vulnerability in SocketServer and ServerSocketReceiver", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-5929" }, { "category": "external", "summary": "RHBZ#1432858", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1432858" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-5929", "url": "https://www.cve.org/CVERecord?id=CVE-2017-5929" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5929", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5929" } ], "release_date": "2017-02-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "logback: Serialization vulnerability in SocketServer and ServerSocketReceiver" }, { "cve": "CVE-2017-16012", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2018-06-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1591854" } ], "notes": [ { "category": "description", "text": "[REJECTED CVE] This CVE has been rejected. This candidate is a duplicate of CVE-2015-9251. Note: All CVE users should reference CVE-2015-9251 instead of this candidate.", "title": "Vulnerability description" }, { "category": "summary", "text": "js-jquery: XSS in responses from cross-origin ajax requests", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-16012" }, { "category": "external", "summary": "RHBZ#1591854", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1591854" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-16012", "url": "https://www.cve.org/CVERecord?id=CVE-2017-16012" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-16012", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16012" } ], "release_date": "2017-03-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "js-jquery: XSS in responses from cross-origin ajax requests" }, { "cve": "CVE-2018-11771", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2018-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618573" } ], "notes": [ { "category": "description", "text": "When reading a specially crafted ZIP archive, the read method of Apache Commons Compress 1.7 to 1.17\u0027s ZipArchiveInputStream can fail to return the correct EOF indication after the end of the stream has been reached. When combined with a java.io.InputStreamReader this can lead to an infinite stream, which can be used to mount a denial of service attack against services that use Compress\u0027 zip package.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-commons-compress: ZipArchiveInputStream.read() fails to identify correct EOF allowing for DoS via crafted zip", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-11771" }, { "category": "external", "summary": "RHBZ#1618573", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618573" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-11771", "url": "https://www.cve.org/CVERecord?id=CVE-2018-11771" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-11771", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11771" }, { "category": "external", "summary": "https://lists.apache.org/thread.html/b8da751fc0ca949534cdf2744111da6bb0349d2798fac94b0a50f330@%3Cannounce.apache.org%3E", "url": "https://lists.apache.org/thread.html/b8da751fc0ca949534cdf2744111da6bb0349d2798fac94b0a50f330@%3Cannounce.apache.org%3E" } ], "release_date": "2018-08-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "apache-commons-compress: ZipArchiveInputStream.read() fails to identify correct EOF allowing for DoS via crafted zip" }, { "cve": "CVE-2018-12536", "cwe": { "id": "CWE-209", "name": "Generation of Error Message Containing Sensitive Information" }, "discovery_date": "2018-06-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1597418" } ], "notes": [ { "category": "description", "text": "In Eclipse Jetty Server, all 9.x versions, on webapps deployed using default Error Handling, when an intentionally bad query arrives that doesn\u0027t match a dynamic url-pattern, and is eventually handled by the DefaultServlet\u0027s static file serving, the bad characters can trigger a java.nio.file.InvalidPathException which includes the full path to the base resource directory that the DefaultServlet and/or webapp is using. If this InvalidPathException is then handled by the default Error Handler, the InvalidPathException message is included in the error response, revealing the full server path to the requesting system.", "title": "Vulnerability description" }, { "category": "summary", "text": "jetty: full server path revealed when using the default Error Handling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-12536" }, { "category": "external", "summary": "RHBZ#1597418", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1597418" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-12536", "url": "https://www.cve.org/CVERecord?id=CVE-2018-12536" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12536", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12536" } ], "release_date": "2018-06-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" }, { "category": "workaround", "details": "Information disclosure occurs when java.nio.file.InvalidPathException occurs and is handled by the default Jetty error handler. To protect against this, a custom error handler can be configured for that particular error or for a larger set of errors according to the documentation link below. Red Hat Product Security advises that production deployments on Jetty use custom error handlers to limit the information disclosed and to ensure effective logging of error conditions.\n\nhttp://www.eclipse.org/jetty/documentation/current/custom-error-pages.html", "product_ids": [ "Red Hat Fuse 7.6.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "jetty: full server path revealed when using the default Error Handling" }, { "cve": "CVE-2018-15756", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2018-10-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1643043" } ], "notes": [ { "category": "description", "text": "Spring Framework, version 5.1, versions 5.0.x prior to 5.0.10, versions 4.3.x prior to 4.3.20, and older unsupported versions on the 4.2.x branch provide support for range requests when serving static resources through the ResourceHttpRequestHandler, or starting in 5.0 when an annotated controller returns an org.springframework.core.io.Resource. A malicious user (or attacker) can add a range header with a high number of ranges, or with wide ranges that overlap, or both, for a denial of service attack. This vulnerability affects applications that depend on either spring-webmvc or spring-webflux. Such applications must also have a registration for serving static resources (e.g. JS, CSS, images, and others), or have an annotated controller that returns an org.springframework.core.io.Resource. Spring Boot applications that depend on spring-boot-starter-web or spring-boot-starter-webflux are ready to serve static resources out of the box and are therefore vulnerable.", "title": "Vulnerability description" }, { "category": "summary", "text": "springframework: DoS Attack via Range Requests", "title": "Vulnerability summary" }, { "category": "other", "text": "The package rhvm-dependencies does not include the vulnerable spring-webmvc component.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-15756" }, { "category": "external", "summary": "RHBZ#1643043", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1643043" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-15756", "url": "https://www.cve.org/CVERecord?id=CVE-2018-15756" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-15756", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-15756" }, { "category": "external", "summary": "https://pivotal.io/security/cve-2018-15756", "url": "https://pivotal.io/security/cve-2018-15756" } ], "release_date": "2018-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "springframework: DoS Attack via Range Requests" }, { "cve": "CVE-2019-3802", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-06-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1730316" } ], "notes": [ { "category": "description", "text": "This affects Spring Data JPA in versions up to and including 2.1.6, 2.0.14 and 1.11.20. ExampleMatcher using ExampleMatcher.StringMatcher.STARTING, ExampleMatcher.StringMatcher.ENDING or ExampleMatcher.StringMatcher.CONTAINING could return more results than anticipated when a maliciously crafted example value is supplied.", "title": "Vulnerability description" }, { "category": "summary", "text": "spring-data-api: potential information disclosure through maliciously crafted example value in ExampleMatcher", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-3802" }, { "category": "external", "summary": "RHBZ#1730316", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1730316" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-3802", "url": "https://www.cve.org/CVERecord?id=CVE-2019-3802" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3802", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3802" }, { "category": "external", "summary": "https://pivotal.io/security/cve-2019-3802", "url": "https://pivotal.io/security/cve-2019-3802" } ], "release_date": "2019-07-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "spring-data-api: potential information disclosure through maliciously crafted example value in ExampleMatcher" }, { "acknowledgments": [ { "names": [ "Carter Kozak" ] } ], "cve": "CVE-2019-3888", "cwe": { "id": "CWE-532", "name": "Insertion of Sensitive Information into Log File" }, "discovery_date": "2019-03-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1693777" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Undertow web server before 2.0.21. An information exposure of plain text credentials through log files because Connectors.executeRootHandler:402 logs the HttpServerExchange object at ERROR level using UndertowLogger.REQUEST_LOGGER.undertowRequestFailed(t, exchange)", "title": "Vulnerability description" }, { "category": "summary", "text": "undertow: leak credentials to log files UndertowLogger.REQUEST_LOGGER.undertowRequestFailed", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-3888" }, { "category": "external", "summary": "RHBZ#1693777", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1693777" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-3888", "url": "https://www.cve.org/CVERecord?id=CVE-2019-3888" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3888", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3888" } ], "release_date": "2019-06-10T15:13:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "undertow: leak credentials to log files UndertowLogger.REQUEST_LOGGER.undertowRequestFailed" }, { "cve": "CVE-2019-5427", "cwe": { "id": "CWE-776", "name": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)" }, "discovery_date": "2019-04-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1709860" } ], "notes": [ { "category": "description", "text": "c3p0 version \u003c 0.9.5.4 may be exploited by a billion laughs attack when loading XML configuration due to missing protections against recursive entity expansion when loading configuration.", "title": "Vulnerability description" }, { "category": "summary", "text": "c3p0: loading XML configuration leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 is not vulnerable to this issue, because the candlepin component who uses the c3p0 jar never passes a XML configuration file to c3p0, even though it includes a vulnerable version of the latter. Since this issue requires a XML files to be loaded by c3p0, an exploitation path doesn\u0027t exist.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-5427" }, { "category": "external", "summary": "RHBZ#1709860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1709860" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-5427", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5427" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5427", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5427" } ], "release_date": "2019-04-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "c3p0: loading XML configuration leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9513", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735741" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker, using PRIORITY frames to flood the system, could cause excessive CPU usage and starvation of other clients. The largest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PRIORITY frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for packages nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9513" }, { "category": "external", "summary": "RHBZ#1735741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735741" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9513", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9513" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9513", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9513" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nghttp2.org/blog/2019/08/19/nghttp2-v1-39-2/", "url": "https://nghttp2.org/blog/2019/08/19/nghttp2-v1-39-2/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "Red Hat Fuse 7.6.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PRIORITY frames results in excessive resource consumption" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "cve": "CVE-2019-9516", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741864" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker, sending a stream of header with a 0-length header name and a 0-length header value, could cause some implementations to allocate memory for these headers and keep the allocations alive until the session dies. The can consume excess memory, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: 0-length headers lead to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9516" }, { "category": "external", "summary": "RHBZ#1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9516", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9516" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://github.com/nghttp2/nghttp2/issues/1382#", "url": "https://github.com/nghttp2/nghttp2/issues/1382#" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "Red Hat Fuse 7.6.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: 0-length headers lead to denial of service" }, { "cve": "CVE-2019-9517", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741868" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in HTTP/2. An attacker can open a HTTP/2 window so the peer can send without constraint. The TCP window remains closed so the peer cannot write the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the server\u0027s queue is setup, the responses can consume excess memory, CPU, or both, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: request for large response leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "The package httpd versions as shipped with Red Hat Enterprise Linux 5, 6 and 7 are not affected by this issue as HTTP/2 support is not provided.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9517" }, { "category": "external", "summary": "RHBZ#1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9517", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9517" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" }, { "category": "workaround", "details": "The httpd version shipped with Red Hat Enterprise Linux 8 provides HTTP/2 support through mod_http2 package. While mod_http2 package is not updated, users can disable HTTP/2 support as mitigation action by executing the following steps:\n\n1. Stop httpd service:\n$ systemctl stop httpd\n\n2. Remove http/2 protocol support from configuration files:\n$ sed -i \u0027s/\\(h2\\)\\|\\(h2c\\)//g\u0027 \u003chttpd_config_file\u003e\n\n3. Validate configuration files to make sure all syntax is valid:\n$ apachectl configtest\n\n4. Restart httpd service:\n$ systemctl start httpd", "product_ids": [ "Red Hat Fuse 7.6.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: request for large response leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9518", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735749" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using frames with an empty payload, a flood could occur that results in excessive CPU usage and starvation of other clients. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using empty frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9518" }, { "category": "external", "summary": "RHBZ#1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9518", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using empty frames results in excessive resource consumption" }, { "cve": "CVE-2019-10174", "cwe": { "id": "CWE-470", "name": "Use of Externally-Controlled Input to Select Classes or Code (\u0027Unsafe Reflection\u0027)" }, "discovery_date": "2018-10-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1703469" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Infinispan such that the invokeAccessibly method from the public class ReflectionUtil allows any application class to invoke private methods in any class with Infinispan\u0027s privileges. The attacker can use reflection to introduce new, malicious behavior into the application.", "title": "Vulnerability description" }, { "category": "summary", "text": "infinispan: invokeAccessibly method from ReflectionUtil class allows to invoke private methods", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform\u0027s OpenDaylight contains the vulnerable library. This library is a requirement of other dependencies (Karaf and Hibernate). Under supported deployments, the vulnerable functionality is not utilized. Based on this, no OpenDaylight versions will not be fixed.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10174" }, { "category": "external", "summary": "RHBZ#1703469", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1703469" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10174", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10174" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10174", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10174" } ], "release_date": "2019-11-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" }, { "category": "workaround", "details": "There is no known mitigation for this issue.", "product_ids": [ "Red Hat Fuse 7.6.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "infinispan: invokeAccessibly method from ReflectionUtil class allows to invoke private methods" }, { "acknowledgments": [ { "names": [ "Christian Schl\u00fcter" ], "organization": "Viada" } ], "cve": "CVE-2019-10184", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "discovery_date": "2019-03-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1713068" } ], "notes": [ { "category": "description", "text": "undertow before version 2.0.23.Final is vulnerable to an information leak issue. Web apps may have their directory structures predicted through requests without trailing slashes via the api.", "title": "Vulnerability description" }, { "category": "summary", "text": "undertow: Information leak in requests for directories without trailing slashes", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10184" }, { "category": "external", "summary": "RHBZ#1713068", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1713068" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10184", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10184" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10184", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10184" } ], "release_date": "2019-07-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "undertow: Information leak in requests for directories without trailing slashes" }, { "cve": "CVE-2019-10241", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2019-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1705924" } ], "notes": [ { "category": "description", "text": "In Eclipse Jetty version 9.2.26 and older, 9.3.25 and older, and 9.4.15 and older, the server is vulnerable to XSS conditions if a remote client USES a specially formatted URL against the DefaultServlet or ResourceHandler that is configured for showing a Listing of directory contents.", "title": "Vulnerability description" }, { "category": "summary", "text": "jetty: using specially formatted URL against DefaultServlet or ResourceHandler leads to XSS conditions", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of jetty which is embedded in the nutch package as shipped with Red Hat Satellite 5. The jetty server is not exposed, as such exploitation is difficult, Red Hat Product Security has rated this issue as having security impact of Low in the context of Red Hat Satellite 5. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10241" }, { "category": "external", "summary": "RHBZ#1705924", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705924" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10241", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10241" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10241", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10241" } ], "release_date": "2019-04-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jetty: using specially formatted URL against DefaultServlet or ResourceHandler leads to XSS conditions" }, { "cve": "CVE-2019-10247", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1705993" } ], "notes": [ { "category": "description", "text": "In Eclipse Jetty version 7.x, 8.x, 9.2.27 and older, 9.3.26 and older, and 9.4.16 and older, the server running on any OS and Jetty version combination will reveal the configured fully qualified directory base resource location on the output of the 404 error for not finding a Context that matches the requested path. The default server behavior on jetty-distribution and jetty-home will include at the end of the Handler tree a DefaultHandler, which is responsible for reporting this 404 error, it presents the various configured contexts as HTML for users to click through to. This produced HTML includes output that contains the configured fully qualified directory base resource location for each context.", "title": "Vulnerability description" }, { "category": "summary", "text": "jetty: error path information disclosure", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of jetty which is embedded in the nutch package as shipped with Red Hat Satellite 5. The jetty server is not exposed, as such exploitation is difficult, Red Hat Product Security has rated this issue as having security impact of Low in the context of Red Hat Satellite 5. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10247" }, { "category": "external", "summary": "RHBZ#1705993", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705993" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10247", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10247" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10247", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10247" } ], "release_date": "2019-04-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "jetty: error path information disclosure" }, { "cve": "CVE-2019-11272", "cwe": { "id": "CWE-305", "name": "Authentication Bypass by Primary Weakness" }, "discovery_date": "2019-06-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1728993" } ], "notes": [ { "category": "description", "text": "A flaw was found in Spring Security in several versions, in the use of plain text passwords using the PlaintextPasswordEncoder. If an application is using an affected version of Spring Security with the PlaintextPasswordEncoder and a user has a null encoded password, an attacker can use this flaw to authenticate using a password of \"null.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "spring-security-core: mishandling of user passwords allows logging in with a password of NULL", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform\u0027s OpenDaylight versions 9 and 10 contain the vulnerable code. However, these OpenDaylight versions were released as technical preview with limited support and will therefore not be updated. Other OpenDaylight versions do not contain the vulnerable library.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-11272" }, { "category": "external", "summary": "RHBZ#1728993", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1728993" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-11272", "url": "https://www.cve.org/CVERecord?id=CVE-2019-11272" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11272", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11272" }, { "category": "external", "summary": "https://pivotal.io/security/cve-2019-11272", "url": "https://pivotal.io/security/cve-2019-11272" } ], "release_date": "2019-07-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "spring-security-core: mishandling of user passwords allows logging in with a password of NULL" }, { "cve": "CVE-2019-12384", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-06-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1725807" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in FasterXML jackson-databind in versions prior to 2.9.9. The vulnerability would permit polymorphic deserialization of malicious objects using the logback-core gadget when used in conjunction with polymorphic type handling methods such as `enableDefaultTyping()` or when @JsonTypeInfo is using `Id.CLASS` or `Id.MINIMAL_CLASS` or in any other way which ObjectMapper.readValue might instantiate objects from unsafe sources. Depending on the classpath content, remote code execution may be possible.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack\u0027s OpenDaylight does not use logback in any supported configuration. Therefore, the prerequisites for this vulnerability are not present and OpenDaylight is not affected.\n\nThis vulnerability relies on logback-core (ch.qos.logback.core) being present in the application\u0027s ClassPath. Logback-core is not packaged as an RPM for Red Hat Enterprise Linux or Red Hat Software Collections. Applications using jackson-databind that do not also use logback-core are not impacted by this vulnerability.\n\nThis issue affects the versions of jackson-databind bundled with candlepin as shipped with Red Hat Satellite 6.x. However the affected code is NOT used at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-12384" }, { "category": "external", "summary": "RHBZ#1725807", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1725807" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-12384", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12384" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-12384", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12384" } ], "release_date": "2019-06-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Fuse 7.6.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution" }, { "cve": "CVE-2019-12422", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2019-11-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1774726" } ], "notes": [ { "category": "description", "text": "Apache Shiro before 1.4.2, when using the default \"remember me\" configuration, cookies could be susceptible to a padding attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "shiro: Cookie padding oracle vulnerability with default configuration", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-12422" }, { "category": "external", "summary": "RHBZ#1774726", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774726" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-12422", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12422" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-12422", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12422" } ], "release_date": "2019-11-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shiro: Cookie padding oracle vulnerability with default configuration" }, { "cve": "CVE-2019-12814", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-06-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1725795" } ], "notes": [ { "category": "description", "text": "A new polymorphic typing flaw was discovered in FasterXML jackson-databind, versions 2.x through 2.9.9. With default typing enabled, an attacker can send a specifically crafted JSON message to the server that allows them to read arbitrary local files.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message.", "title": "Vulnerability summary" }, { "category": "other", "text": "* Red Hat Satellite 6 does not include the jdom or jdom2 packages, thus it is not affected by this vulnerability. \n* Red Hat OpenStack\u0027s OpenDaylight does not include the jdom or jdom2 packages, thus it is not affected by this vulnerability.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-12814" }, { "category": "external", "summary": "RHBZ#1725795", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1725795" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-12814", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12814" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-12814", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12814" } ], "release_date": "2019-06-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" }, { "category": "workaround", "details": "This vulnerability relies on jdom (org.jdom) or jdom2 (org.jdom2) being present in the application\u0027s ClassPath. Applications using jackson-databind that do not also use jdom or jdom2 are not impacted by this vulnerability.", "product_ids": [ "Red Hat Fuse 7.6.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message." }, { "cve": "CVE-2019-14379", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-07-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1737517" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in FasterXML jackson-databind, where it would permit polymorphic deserialization of malicious objects using the ehcache and logback JNDI gadgets when used in conjunction with polymorphic type handling methods such as `enableDefaultTyping()` or when @JsonTypeInfo is using `Id.CLASS` or `Id.MINIMAL_CLASS` or in any other way which ObjectMapper.readValue might instantiate objects from unsafe sources. An attacker could use this flaw to execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: default typing mishandling leading to remote code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nSimilarly, Satellite 6 does not enable polymorphic unmarshmalling, which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14379" }, { "category": "external", "summary": "RHBZ#1737517", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1737517" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14379", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14379" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14379", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14379" } ], "release_date": "2019-07-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Fuse 7.6.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: default typing mishandling leading to remote code execution" }, { "cve": "CVE-2019-14439", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-07-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1752962" } ], "notes": [ { "category": "description", "text": "A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x before 2.9.9.2. This occurs when Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the logback jar in the classpath.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Polymorphic typing issue related to logback/JNDI", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenDaylight provided as part of Red Hat OpenStack does not utilize logback when used in a supported configuration. Therefore, the prerequisites for this vulnerability are not present and OpenDaylight is not affected.\n\nSatellite 6 does not enable polymorphic unmarshmalling, which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14439" }, { "category": "external", "summary": "RHBZ#1752962", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752962" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14439", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14439" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14439", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14439" } ], "release_date": "2019-07-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Fuse 7.6.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Polymorphic typing issue related to logback/JNDI" }, { "acknowledgments": [ { "names": [ "Guillaume Teissier" ], "organization": "Orange" } ], "cve": "CVE-2019-17570", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-11-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1775193" } ], "notes": [ { "category": "description", "text": "A flaw was discovered where the XMLRPC client implementation in Apache XMLRPC, performed deserialization of the server-side exception serialized in the faultCause attribute of XMLRPC error response messages. A malicious or compromised XMLRPC server could possibly use this flaw to execute arbitrary code with the privileges of an application using the Apache XMLRPC client library.", "title": "Vulnerability description" }, { "category": "summary", "text": "xmlrpc: Deserialization of server-side exception from faultCause in XMLRPC error response", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 7 provides vulnerable version of xmlrpc via the Optional repository. As the Optional repository is not supported, this issue is not planned to be addressed there.\n\nRed Hat Virtualization Manager uses xmlrpc only for internal communication with the scheduler. Since this is a component of the Manager itself, it is not subject to attacker influence and does not represent an attack surface.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-17570" }, { "category": "external", "summary": "RHBZ#1775193", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775193" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-17570", "url": "https://www.cve.org/CVERecord?id=CVE-2019-17570" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-17570", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17570" }, { "category": "external", "summary": "https://github.com/orangecertcc/security-research/security/advisories/GHSA-x2r6-4m45-m4jp", "url": "https://github.com/orangecertcc/security-research/security/advisories/GHSA-x2r6-4m45-m4jp" } ], "release_date": "2020-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" }, { "category": "workaround", "details": "There is no known mitigation other than restricting applications using the Apache XMLRPC client library from sending requests to untrusted XMLRPC servers.", "product_ids": [ "Red Hat Fuse 7.6.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xmlrpc: Deserialization of server-side exception from faultCause in XMLRPC error response" } ] }
rhsa-2020:0406
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for containernetworking-plugins is now available for Red Hat Enterprise Linux 7 Extras.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The Container Network Interface (CNI) project consists of a specification and libraries for writing plug-ins for configuring network interfaces in Linux containers, along with a number of supported plug-ins. CNI concerns itself only with network connectivity of containers and removing allocated resources when the container is deleted.\n\nSecurity Fix(es):\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:0406", "url": "https://access.redhat.com/errata/RHSA-2020:0406" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_0406.json" } ], "title": "Red Hat Security Advisory: containernetworking-plugins security update", "tracking": { "current_release_date": "2025-03-15T19:45:12+00:00", "generator": { "date": "2025-03-15T19:45:12+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.1" } }, "id": "RHSA-2020:0406", "initial_release_date": "2020-02-04T19:25:46+00:00", "revision_history": [ { "date": "2020-02-04T19:25:46+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-02-04T19:25:46+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-03-15T19:45:12+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux 7 Extras", "product": { "name": "Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.7", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_other:7" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux 7 Extras", "product": { "name": "Red Hat Enterprise Linux 7 Extras", "product_id": "7Workstation-EXTRAS-7.7", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_other:7" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Extras" }, { "branches": [ { "category": "product_version", "name": "containernetworking-plugins-0:0.8.1-4.el7_7.x86_64", "product": { "name": "containernetworking-plugins-0:0.8.1-4.el7_7.x86_64", "product_id": "containernetworking-plugins-0:0.8.1-4.el7_7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_7?arch=x86_64" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64", "product": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64", "product_id": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "containernetworking-plugins-0:0.8.1-4.el7_7.src", "product": { "name": "containernetworking-plugins-0:0.8.1-4.el7_7.src", "product_id": "containernetworking-plugins-0:0.8.1-4.el7_7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le", "product": { "name": "containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le", "product_id": "containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_7?arch=ppc64le" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le", "product": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le", "product_id": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "containernetworking-plugins-0:0.8.1-4.el7_7.s390x", "product": { "name": "containernetworking-plugins-0:0.8.1-4.el7_7.s390x", "product_id": "containernetworking-plugins-0:0.8.1-4.el7_7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_7?arch=s390x" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x", "product": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x", "product_id": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le" }, "product_reference": "containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le", "relates_to_product_reference": "7Server-EXTRAS-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.1-4.el7_7.s390x as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.s390x" }, "product_reference": "containernetworking-plugins-0:0.8.1-4.el7_7.s390x", "relates_to_product_reference": "7Server-EXTRAS-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.1-4.el7_7.src as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.src" }, "product_reference": "containernetworking-plugins-0:0.8.1-4.el7_7.src", "relates_to_product_reference": "7Server-EXTRAS-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.1-4.el7_7.x86_64 as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.x86_64" }, "product_reference": "containernetworking-plugins-0:0.8.1-4.el7_7.x86_64", "relates_to_product_reference": "7Server-EXTRAS-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le", "relates_to_product_reference": "7Server-EXTRAS-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x", "relates_to_product_reference": "7Server-EXTRAS-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64 as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64", "relates_to_product_reference": "7Server-EXTRAS-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le" }, "product_reference": "containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le", "relates_to_product_reference": "7Workstation-EXTRAS-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.1-4.el7_7.s390x as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.s390x" }, "product_reference": "containernetworking-plugins-0:0.8.1-4.el7_7.s390x", "relates_to_product_reference": "7Workstation-EXTRAS-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.1-4.el7_7.src as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.src" }, "product_reference": "containernetworking-plugins-0:0.8.1-4.el7_7.src", "relates_to_product_reference": "7Workstation-EXTRAS-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.1-4.el7_7.x86_64 as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.x86_64" }, "product_reference": "containernetworking-plugins-0:0.8.1-4.el7_7.x86_64", "relates_to_product_reference": "7Workstation-EXTRAS-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le", "relates_to_product_reference": "7Workstation-EXTRAS-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x", "relates_to_product_reference": "7Workstation-EXTRAS-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64 as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64", "relates_to_product_reference": "7Workstation-EXTRAS-7.7" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le", "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.s390x", "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.src", "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.x86_64", "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le", "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x", "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.s390x", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.src", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.x86_64", "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le", "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x", "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-02-04T19:25:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le", "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.s390x", "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.src", "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.x86_64", "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le", "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x", "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.s390x", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.src", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.x86_64", "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le", "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x", "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0406" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le", "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.s390x", "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.src", "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.x86_64", "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le", "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x", "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.s390x", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.src", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.x86_64", "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le", "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x", "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le", "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.s390x", "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.src", "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.x86_64", "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le", "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x", "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.s390x", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.src", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.x86_64", "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le", "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x", "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-02-04T19:25:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le", "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.s390x", "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.src", "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.x86_64", "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le", "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x", "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.s390x", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.src", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.x86_64", "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le", "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x", "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0406" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le", "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.s390x", "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.src", "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.x86_64", "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le", "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x", "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.s390x", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.src", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.x86_64", "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le", "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x", "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" } ] }
rhsa-2019:2682
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for go-toolset-1.11 and go-toolset-1.11-golang is now available for Red Hat Developer Tools.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.\n\nSecurity Fix(es):\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:2682", "url": "https://access.redhat.com/errata/RHSA-2019:2682" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2682.json" } ], "title": "Red Hat Security Advisory: go-toolset-1.11 and go-toolset-1.11-golang security update", "tracking": { "current_release_date": "2025-03-15T19:44:08+00:00", "generator": { "date": "2025-03-15T19:44:08+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.1" } }, "id": "RHSA-2019:2682", "initial_release_date": "2019-09-10T17:47:41+00:00", "revision_history": [ { "date": "2019-09-10T17:47:41+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-09-10T17:47:41+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-03-15T19:44:08+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:devtools:2019" } } }, { "category": "product_name", "name": "Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:devtools:2019" } } }, { "category": "product_name", "name": "Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:devtools:2019" } } } ], "category": "product_family", "name": "Red Hat Developer Tools" }, { "branches": [ { "category": "product_version", "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "product": { "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "product_id": "go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "product": { "name": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "product_id": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "product": { "name": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "product_id": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "product": { "name": "go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "product_id": "go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "product": { "name": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "product_id": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "product": { "name": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "product_id": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-1.11-0:1.11.13-1.el7.x86_64", "product": { "name": "go-toolset-1.11-0:1.11.13-1.el7.x86_64", "product_id": "go-toolset-1.11-0:1.11.13-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "product": { "name": "go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "product_id": "go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "product": { "name": "go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "product_id": "go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64", "product": { "name": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64", "product_id": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.src", "product": { "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.src", "product_id": "go-toolset-1.11-golang-0:1.11.13-2.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "go-toolset-1.11-0:1.11.13-1.el7.src", "product": { "name": "go-toolset-1.11-0:1.11.13-1.el7.src", "product_id": "go-toolset-1.11-0:1.11.13-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "product": { "name": "go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "product_id": "go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "product": { "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "product_id": "go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "product": { "name": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "product_id": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "product": { "name": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "product_id": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "product": { "name": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "product_id": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "product": { "name": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "product_id": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "product": { "name": "go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "product_id": "go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "product": { "name": "go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "product_id": "go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "product": { "name": "go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "product_id": "go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "product": { "name": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "product_id": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "product": { "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "product_id": "go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=s390x" } } }, { "category": "product_version", "name": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "product": { "name": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "product_id": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=s390x" } } }, { "category": "product_version", "name": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "product": { "name": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "product_id": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=s390x" } } }, { "category": "product_version", "name": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "product": { "name": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "product_id": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=s390x" } } }, { "category": "product_version", "name": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "product": { "name": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "product_id": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=s390x" } } }, { "category": "product_version", "name": "go-toolset-1.11-0:1.11.13-1.el7.s390x", "product": { "name": "go-toolset-1.11-0:1.11.13-1.el7.s390x", "product_id": "go-toolset-1.11-0:1.11.13-1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=s390x" } } }, { "category": "product_version", "name": "go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "product": { "name": "go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "product_id": "go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=s390x" } } }, { "category": "product_version", "name": "go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "product": { "name": "go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "product_id": "go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=s390x" } } }, { "category": "product_version", "name": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "product": { "name": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "product_id": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "product": { "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "product_id": "go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=aarch64" } } }, { "category": "product_version", "name": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "product": { "name": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "product_id": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=aarch64" } } }, { "category": "product_version", "name": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "product": { "name": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "product_id": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=aarch64" } } }, { "category": "product_version", "name": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "product": { "name": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "product_id": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=aarch64" } } }, { "category": "product_version", "name": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "product": { "name": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "product_id": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=aarch64" } } }, { "category": "product_version", "name": "go-toolset-1.11-0:1.11.13-1.el7.aarch64", "product": { "name": "go-toolset-1.11-0:1.11.13-1.el7.aarch64", "product_id": "go-toolset-1.11-0:1.11.13-1.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=aarch64" } } }, { "category": "product_version", "name": "go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "product": { "name": "go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "product_id": "go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=aarch64" } } }, { "category": "product_version", "name": "go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "product": { "name": "go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "product_id": "go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=aarch64" } } }, { "category": "product_version", "name": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "product": { "name": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "product_id": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-0:1.11.13-1.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64" }, "product_reference": "go-toolset-1.11-0:1.11.13-1.el7.aarch64", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-0:1.11.13-1.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le" }, "product_reference": "go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-0:1.11.13-1.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x" }, "product_reference": "go-toolset-1.11-0:1.11.13-1.el7.s390x", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-0:1.11.13-1.el7.src as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src" }, "product_reference": "go-toolset-1.11-0:1.11.13-1.el7.src", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-0:1.11.13-1.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64" }, "product_reference": "go-toolset-1.11-0:1.11.13-1.el7.x86_64", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-build-0:1.11.13-1.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64" }, "product_reference": "go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le" }, "product_reference": "go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-build-0:1.11.13-1.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x" }, "product_reference": "go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-build-0:1.11.13-1.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64" }, "product_reference": "go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64" }, "product_reference": "go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le" }, "product_reference": "go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x" }, "product_reference": "go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.src as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src" }, "product_reference": "go-toolset-1.11-golang-0:1.11.13-2.el7.src", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64" }, "product_reference": "go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64" }, "product_reference": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le" }, "product_reference": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x" }, "product_reference": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64" }, "product_reference": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch" }, "product_reference": "go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64" }, "product_reference": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le" }, "product_reference": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x" }, "product_reference": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64" }, "product_reference": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64" }, "product_reference": "go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64" }, "product_reference": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le" }, "product_reference": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x" }, "product_reference": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64" }, "product_reference": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64" }, "product_reference": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le" }, "product_reference": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x" }, "product_reference": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64" }, "product_reference": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64" }, "product_reference": "go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le" }, "product_reference": "go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x" }, "product_reference": "go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64" }, "product_reference": "go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64" }, "product_reference": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le" }, "product_reference": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x" }, "product_reference": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64" }, "product_reference": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-0:1.11.13-1.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64" }, "product_reference": "go-toolset-1.11-0:1.11.13-1.el7.aarch64", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-0:1.11.13-1.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le" }, "product_reference": "go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-0:1.11.13-1.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x" }, "product_reference": "go-toolset-1.11-0:1.11.13-1.el7.s390x", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-0:1.11.13-1.el7.src as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src" }, "product_reference": "go-toolset-1.11-0:1.11.13-1.el7.src", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-0:1.11.13-1.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64" }, "product_reference": "go-toolset-1.11-0:1.11.13-1.el7.x86_64", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-build-0:1.11.13-1.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64" }, "product_reference": "go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le" }, "product_reference": "go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-build-0:1.11.13-1.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x" }, "product_reference": "go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-build-0:1.11.13-1.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64" }, "product_reference": "go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64" }, "product_reference": "go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le" }, "product_reference": "go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x" }, "product_reference": "go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.src as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src" }, "product_reference": "go-toolset-1.11-golang-0:1.11.13-2.el7.src", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64" }, "product_reference": "go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64" }, "product_reference": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le" }, "product_reference": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x" }, "product_reference": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64" }, "product_reference": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch" }, "product_reference": "go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64" }, "product_reference": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le" }, "product_reference": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x" }, "product_reference": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64" }, "product_reference": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64" }, "product_reference": "go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64" }, "product_reference": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le" }, "product_reference": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x" }, "product_reference": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64" }, "product_reference": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64" }, "product_reference": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le" }, "product_reference": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x" }, "product_reference": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64" }, "product_reference": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64" }, "product_reference": "go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le" }, "product_reference": "go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x" }, "product_reference": "go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64" }, "product_reference": "go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64" }, "product_reference": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le" }, "product_reference": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x" }, "product_reference": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64" }, "product_reference": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-0:1.11.13-1.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64" }, "product_reference": "go-toolset-1.11-0:1.11.13-1.el7.aarch64", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-0:1.11.13-1.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le" }, "product_reference": "go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-0:1.11.13-1.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x" }, "product_reference": "go-toolset-1.11-0:1.11.13-1.el7.s390x", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-0:1.11.13-1.el7.src as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src" }, "product_reference": "go-toolset-1.11-0:1.11.13-1.el7.src", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-0:1.11.13-1.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64" }, "product_reference": "go-toolset-1.11-0:1.11.13-1.el7.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-build-0:1.11.13-1.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64" }, "product_reference": "go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le" }, "product_reference": "go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-build-0:1.11.13-1.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x" }, "product_reference": "go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-build-0:1.11.13-1.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64" }, "product_reference": "go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64" }, "product_reference": "go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le" }, "product_reference": "go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x" }, "product_reference": "go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.src as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src" }, "product_reference": "go-toolset-1.11-golang-0:1.11.13-2.el7.src", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64" }, "product_reference": "go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64" }, "product_reference": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le" }, "product_reference": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x" }, "product_reference": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64" }, "product_reference": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch" }, "product_reference": "go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64" }, "product_reference": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le" }, "product_reference": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x" }, "product_reference": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64" }, "product_reference": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64" }, "product_reference": "go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64" }, "product_reference": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le" }, "product_reference": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x" }, "product_reference": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64" }, "product_reference": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64" }, "product_reference": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le" }, "product_reference": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x" }, "product_reference": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64" }, "product_reference": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64" }, "product_reference": "go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le" }, "product_reference": "go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x" }, "product_reference": "go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64" }, "product_reference": "go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64" }, "product_reference": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le" }, "product_reference": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x" }, "product_reference": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64" }, "product_reference": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2019.3" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-10T17:47:41+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2682" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-10T17:47:41+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2682" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" } ] }
rhsa-2020_0727
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for Red Hat Data Grid is now available.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Data Grid is a distributed, in-memory, NoSQL datastore based on the Infinispan project.\n\nThis release of Red Hat Data Grid 7.3.3 serves as a replacement for Red Hat Data Grid 7.3.2 and includes bug fixes and enhancements, which are described in the Release Notes, linked to in the References section of this erratum.\n\nSecurity Fix(es):\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)\n\n* xstream: remote code execution due to insecure XML deserialization (regression of CVE-2013-7285) (CVE-2019-10173)\n\n* infinispan: invokeAccessibly method from ReflectionUtil class allows to invoke private methods (CVE-2019-10174)\n\n* jackson-databind: default typing mishandling leading to remote code execution (CVE-2019-14379)\n\n* h2: Information Exposure due to insecure handling of permissions in the backup (CVE-2018-14335)\n\n* wildfly: Race condition on PID file allows for termination of arbitrary processes by local users (CVE-2019-3805)\n\n* undertow: leak credentials to log files UndertowLogger.REQUEST_LOGGER.undertowRequestFailed (CVE-2019-3888)\n\n* undertow: DEBUG log for io.undertow.request.security if enabled leaks credentials to log files (CVE-2019-10212)\n\n* undertow: Information leak in requests for directories without trailing slashes (CVE-2019-10184)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:0727", "url": "https://access.redhat.com/errata/RHSA-2020:0727" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=data.grid\u0026downloadType=patches\u0026version=7.3", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=data.grid\u0026downloadType=patches\u0026version=7.3" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_data_grid/7.3/html-single/red_hat_data_grid_7.3_release_notes/index", "url": "https://access.redhat.com/documentation/en-us/red_hat_data_grid/7.3/html-single/red_hat_data_grid_7.3_release_notes/index" }, { "category": "external", "summary": "1610877", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1610877" }, { "category": "external", "summary": "1660263", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1660263" }, { "category": "external", "summary": "1693777", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1693777" }, { "category": "external", "summary": "1703469", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1703469" }, { "category": "external", "summary": "1713068", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1713068" }, { "category": "external", "summary": "1722971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1722971" }, { "category": "external", "summary": "1731984", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1731984" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "1737517", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1737517" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_0727.json" } ], "title": "Red Hat Security Advisory: Red Hat Data Grid 7.3.3 security update", "tracking": { "current_release_date": "2024-11-22T14:27:59+00:00", "generator": { "date": "2024-11-22T14:27:59+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2020:0727", "initial_release_date": "2020-03-05T12:53:27+00:00", "revision_history": [ { "date": "2020-03-05T12:53:27+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-03-05T12:53:27+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T14:27:59+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Data Grid 7.3.3", "product": { "name": "Red Hat Data Grid 7.3.3", "product_id": "Red Hat Data Grid 7.3.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_data_grid:7.3" } } } ], "category": "product_family", "name": "Red Hat JBoss Data Grid" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-14335", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1610877" } ], "notes": [ { "category": "description", "text": "An issue was discovered in H2 1.4.197. Insecure handling of permissions in the backup function allows attackers to read sensitive files (outside of their permissions) via a symlink to a fake database file.", "title": "Vulnerability description" }, { "category": "summary", "text": "h2: Information Exposure due to insecure handling of permissions in the backup", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Data Grid 7.3.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-14335" }, { "category": "external", "summary": "RHBZ#1610877", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1610877" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-14335", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14335" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14335", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14335" } ], "release_date": "2018-07-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-05T12:53:27+00:00", "details": "To install this update, do the following:\n\n1. Download the Data Grid 7.3.3 server patch from the customer portal.\n2. Back up your existing Data Grid installation. You should back up databases, configuration files, and so on.\n3. Install the Data Grid 7.3.3 server patch. Refer to the 7.3 Release Notes for patching instructions.\n4. Restart Data Grid to ensure the changes take effect.", "product_ids": [ "Red Hat Data Grid 7.3.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0727" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat Data Grid 7.3.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "h2: Information Exposure due to insecure handling of permissions in the backup" }, { "acknowledgments": [ { "names": [ "Daniel Le Gall" ], "organization": "SCRT Information Security" } ], "cve": "CVE-2019-3805", "cwe": { "id": "CWE-364", "name": "Signal Handler Race Condition" }, "discovery_date": "2018-11-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1660263" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in wildfly that would allow local users, who are able to execute init.d script, to terminate arbitrary processes on the system. An attacker could exploit this by modifying the PID file in /var/run/jboss-eap/ allowing the init.d script to terminate any process as root.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly: Race condition on PID file allows for termination of arbitrary processes by local users", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Data Grid 7.3.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-3805" }, { "category": "external", "summary": "RHBZ#1660263", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1660263" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-3805", "url": "https://www.cve.org/CVERecord?id=CVE-2019-3805" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3805", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3805" } ], "release_date": "2019-04-30T17:12:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-05T12:53:27+00:00", "details": "To install this update, do the following:\n\n1. Download the Data Grid 7.3.3 server patch from the customer portal.\n2. Back up your existing Data Grid installation. You should back up databases, configuration files, and so on.\n3. Install the Data Grid 7.3.3 server patch. Refer to the 7.3 Release Notes for patching instructions.\n4. Restart Data Grid to ensure the changes take effect.", "product_ids": [ "Red Hat Data Grid 7.3.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0727" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Data Grid 7.3.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wildfly: Race condition on PID file allows for termination of arbitrary processes by local users" }, { "acknowledgments": [ { "names": [ "Carter Kozak" ] } ], "cve": "CVE-2019-3888", "cwe": { "id": "CWE-532", "name": "Insertion of Sensitive Information into Log File" }, "discovery_date": "2019-03-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1693777" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Undertow web server before 2.0.21. An information exposure of plain text credentials through log files because Connectors.executeRootHandler:402 logs the HttpServerExchange object at ERROR level using UndertowLogger.REQUEST_LOGGER.undertowRequestFailed(t, exchange)", "title": "Vulnerability description" }, { "category": "summary", "text": "undertow: leak credentials to log files UndertowLogger.REQUEST_LOGGER.undertowRequestFailed", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Data Grid 7.3.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-3888" }, { "category": "external", "summary": "RHBZ#1693777", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1693777" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-3888", "url": "https://www.cve.org/CVERecord?id=CVE-2019-3888" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3888", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3888" } ], "release_date": "2019-06-10T15:13:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-05T12:53:27+00:00", "details": "To install this update, do the following:\n\n1. Download the Data Grid 7.3.3 server patch from the customer portal.\n2. Back up your existing Data Grid installation. You should back up databases, configuration files, and so on.\n3. Install the Data Grid 7.3.3 server patch. Refer to the 7.3 Release Notes for patching instructions.\n4. Restart Data Grid to ensure the changes take effect.", "product_ids": [ "Red Hat Data Grid 7.3.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0727" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat Data Grid 7.3.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "undertow: leak credentials to log files UndertowLogger.REQUEST_LOGGER.undertowRequestFailed" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Data Grid 7.3.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-05T12:53:27+00:00", "details": "To install this update, do the following:\n\n1. Download the Data Grid 7.3.3 server patch from the customer portal.\n2. Back up your existing Data Grid installation. You should back up databases, configuration files, and so on.\n3. Install the Data Grid 7.3.3 server patch. Refer to the 7.3 Release Notes for patching instructions.\n4. Restart Data Grid to ensure the changes take effect.", "product_ids": [ "Red Hat Data Grid 7.3.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0727" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Data Grid 7.3.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Data Grid 7.3.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-05T12:53:27+00:00", "details": "To install this update, do the following:\n\n1. Download the Data Grid 7.3.3 server patch from the customer portal.\n2. Back up your existing Data Grid installation. You should back up databases, configuration files, and so on.\n3. Install the Data Grid 7.3.3 server patch. Refer to the 7.3 Release Notes for patching instructions.\n4. Restart Data Grid to ensure the changes take effect.", "product_ids": [ "Red Hat Data Grid 7.3.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0727" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Data Grid 7.3.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Data Grid 7.3.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-05T12:53:27+00:00", "details": "To install this update, do the following:\n\n1. Download the Data Grid 7.3.3 server patch from the customer portal.\n2. Back up your existing Data Grid installation. You should back up databases, configuration files, and so on.\n3. Install the Data Grid 7.3.3 server patch. Refer to the 7.3 Release Notes for patching instructions.\n4. Restart Data Grid to ensure the changes take effect.", "product_ids": [ "Red Hat Data Grid 7.3.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0727" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Data Grid 7.3.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9518", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735749" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using frames with an empty payload, a flood could occur that results in excessive CPU usage and starvation of other clients. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using empty frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Data Grid 7.3.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9518" }, { "category": "external", "summary": "RHBZ#1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9518", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-05T12:53:27+00:00", "details": "To install this update, do the following:\n\n1. Download the Data Grid 7.3.3 server patch from the customer portal.\n2. Back up your existing Data Grid installation. You should back up databases, configuration files, and so on.\n3. Install the Data Grid 7.3.3 server patch. Refer to the 7.3 Release Notes for patching instructions.\n4. Restart Data Grid to ensure the changes take effect.", "product_ids": [ "Red Hat Data Grid 7.3.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0727" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Data Grid 7.3.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using empty frames results in excessive resource consumption" }, { "cve": "CVE-2019-10173", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "discovery_date": "2019-06-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1722971" } ], "notes": [ { "category": "description", "text": "It was found that xstream API version 1.4.10 introduced a regression for a previous deserialization flaw. If the security framework has not been initialized, it may allow a remote attacker to run arbitrary shell commands when unmarshalling XML or any supported format. This a regression of CVE-2013-7285 fixed in 1.4.7 (fixed) as of BPMS 6.0.1, the regression was introduced with xstream-1.4.10 implemented in RHPAM.", "title": "Vulnerability description" }, { "category": "summary", "text": "xstream: remote code execution due to insecure XML deserialization (regression of CVE-2013-7285)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Data Grid 7.3.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10173" }, { "category": "external", "summary": "RHBZ#1722971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1722971" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10173", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10173" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10173", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10173" }, { "category": "external", "summary": "http://x-stream.github.io/changes.html#1.4.11", "url": "http://x-stream.github.io/changes.html#1.4.11" } ], "release_date": "2018-10-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-05T12:53:27+00:00", "details": "To install this update, do the following:\n\n1. Download the Data Grid 7.3.3 server patch from the customer portal.\n2. Back up your existing Data Grid installation. You should back up databases, configuration files, and so on.\n3. Install the Data Grid 7.3.3 server patch. Refer to the 7.3 Release Notes for patching instructions.\n4. Restart Data Grid to ensure the changes take effect.", "product_ids": [ "Red Hat Data Grid 7.3.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0727" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat Data Grid 7.3.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xstream: remote code execution due to insecure XML deserialization (regression of CVE-2013-7285)" }, { "cve": "CVE-2019-10174", "cwe": { "id": "CWE-470", "name": "Use of Externally-Controlled Input to Select Classes or Code (\u0027Unsafe Reflection\u0027)" }, "discovery_date": "2018-10-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1703469" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Infinispan such that the invokeAccessibly method from the public class ReflectionUtil allows any application class to invoke private methods in any class with Infinispan\u0027s privileges. The attacker can use reflection to introduce new, malicious behavior into the application.", "title": "Vulnerability description" }, { "category": "summary", "text": "infinispan: invokeAccessibly method from ReflectionUtil class allows to invoke private methods", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform\u0027s OpenDaylight contains the vulnerable library. This library is a requirement of other dependencies (Karaf and Hibernate). Under supported deployments, the vulnerable functionality is not utilized. Based on this, no OpenDaylight versions will not be fixed.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Data Grid 7.3.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10174" }, { "category": "external", "summary": "RHBZ#1703469", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1703469" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10174", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10174" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10174", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10174" } ], "release_date": "2019-11-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-05T12:53:27+00:00", "details": "To install this update, do the following:\n\n1. Download the Data Grid 7.3.3 server patch from the customer portal.\n2. Back up your existing Data Grid installation. You should back up databases, configuration files, and so on.\n3. Install the Data Grid 7.3.3 server patch. Refer to the 7.3 Release Notes for patching instructions.\n4. Restart Data Grid to ensure the changes take effect.", "product_ids": [ "Red Hat Data Grid 7.3.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0727" }, { "category": "workaround", "details": "There is no known mitigation for this issue.", "product_ids": [ "Red Hat Data Grid 7.3.3" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat Data Grid 7.3.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "infinispan: invokeAccessibly method from ReflectionUtil class allows to invoke private methods" }, { "acknowledgments": [ { "names": [ "Christian Schl\u00fcter" ], "organization": "Viada" } ], "cve": "CVE-2019-10184", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "discovery_date": "2019-03-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1713068" } ], "notes": [ { "category": "description", "text": "undertow before version 2.0.23.Final is vulnerable to an information leak issue. Web apps may have their directory structures predicted through requests without trailing slashes via the api.", "title": "Vulnerability description" }, { "category": "summary", "text": "undertow: Information leak in requests for directories without trailing slashes", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Data Grid 7.3.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10184" }, { "category": "external", "summary": "RHBZ#1713068", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1713068" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10184", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10184" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10184", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10184" } ], "release_date": "2019-07-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-05T12:53:27+00:00", "details": "To install this update, do the following:\n\n1. Download the Data Grid 7.3.3 server patch from the customer portal.\n2. Back up your existing Data Grid installation. You should back up databases, configuration files, and so on.\n3. Install the Data Grid 7.3.3 server patch. Refer to the 7.3 Release Notes for patching instructions.\n4. Restart Data Grid to ensure the changes take effect.", "product_ids": [ "Red Hat Data Grid 7.3.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0727" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat Data Grid 7.3.3" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "undertow: Information leak in requests for directories without trailing slashes" }, { "cve": "CVE-2019-10212", "cwe": { "id": "CWE-532", "name": "Insertion of Sensitive Information into Log File" }, "discovery_date": "2019-07-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1731984" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Undertow DEBUG log for io.undertow.request.security. If enabled, an attacker could abuse this flaw to obtain the user\u2019s credentials from the log files.", "title": "Vulnerability description" }, { "category": "summary", "text": "undertow: DEBUG log for io.undertow.request.security if enabled leaks credentials to log files", "title": "Vulnerability summary" }, { "category": "other", "text": "All the Red Hat products using the undertow-core jar version 2.0.20 or before are affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Data Grid 7.3.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10212" }, { "category": "external", "summary": "RHBZ#1731984", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1731984" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10212", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10212" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10212", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10212" } ], "release_date": "2019-09-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-05T12:53:27+00:00", "details": "To install this update, do the following:\n\n1. Download the Data Grid 7.3.3 server patch from the customer portal.\n2. Back up your existing Data Grid installation. You should back up databases, configuration files, and so on.\n3. Install the Data Grid 7.3.3 server patch. Refer to the 7.3 Release Notes for patching instructions.\n4. Restart Data Grid to ensure the changes take effect.", "product_ids": [ "Red Hat Data Grid 7.3.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0727" }, { "category": "workaround", "details": "Use Elytron instead of legacy Security subsystem.", "product_ids": [ "Red Hat Data Grid 7.3.3" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat Data Grid 7.3.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "undertow: DEBUG log for io.undertow.request.security if enabled leaks credentials to log files" }, { "cve": "CVE-2019-14379", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-07-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1737517" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in FasterXML jackson-databind, where it would permit polymorphic deserialization of malicious objects using the ehcache and logback JNDI gadgets when used in conjunction with polymorphic type handling methods such as `enableDefaultTyping()` or when @JsonTypeInfo is using `Id.CLASS` or `Id.MINIMAL_CLASS` or in any other way which ObjectMapper.readValue might instantiate objects from unsafe sources. An attacker could use this flaw to execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: default typing mishandling leading to remote code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nSimilarly, Satellite 6 does not enable polymorphic unmarshmalling, which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Data Grid 7.3.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14379" }, { "category": "external", "summary": "RHBZ#1737517", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1737517" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14379", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14379" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14379", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14379" } ], "release_date": "2019-07-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-05T12:53:27+00:00", "details": "To install this update, do the following:\n\n1. Download the Data Grid 7.3.3 server patch from the customer portal.\n2. Back up your existing Data Grid installation. You should back up databases, configuration files, and so on.\n3. Install the Data Grid 7.3.3 server patch. Refer to the 7.3 Release Notes for patching instructions.\n4. Restart Data Grid to ensure the changes take effect.", "product_ids": [ "Red Hat Data Grid 7.3.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0727" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Data Grid 7.3.3" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat Data Grid 7.3.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: default typing mishandling leading to remote code execution" } ] }
RHSA-2019:3265
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat OpenShift Container Platform 4.1.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the ansible-operator, apb, containernetworking-plugins, golang-github-openshift-prometheus-alert-buffer, golang-github-prometheus-promu and openshift-eventrouter RPM packages for Red Hat OpenShift Container Platform 4.1.21. These packages have been rebuilt with an updated version of Go to address the below security issues.\n\nSecurity Fix(es):\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:3265", "url": "https://access.redhat.com/errata/RHSA-2019:3265" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3265.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 4.1 security update", "tracking": { "current_release_date": "2025-03-15T19:43:55+00:00", "generator": { "date": "2025-03-15T19:43:55+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.1" } }, "id": "RHSA-2019:3265", "initial_release_date": "2019-10-30T18:20:03+00:00", "revision_history": [ { "date": "2019-10-30T18:20:03+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-10-30T18:20:03+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-03-15T19:43:55+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.1", "product": { "name": "Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.1::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "apb-0:2.0.3-2.el7.x86_64", "product": { "name": "apb-0:2.0.3-2.el7.x86_64", "product_id": "apb-0:2.0.3-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.8.1-4.el7.x86_64", "product": { "name": "containernetworking-plugins-0:0.8.1-4.el7.x86_64", "product_id": "containernetworking-plugins-0:0.8.1-4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64", "product": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64", "product_id": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "product": { "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "product_id": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-openshift-prometheus-alert-buffer@0-3.gitceca8c1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "product": { "name": "golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "product_id": "golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "product": { "name": "prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "product_id": "prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-eventrouter-0:0.2-3.gited73fb6.el7.x86_64", "product": { "name": "openshift-eventrouter-0:0.2-3.gited73fb6.el7.x86_64", "product_id": "openshift-eventrouter-0:0.2-3.gited73fb6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-eventrouter-debuginfo-0:0.2-3.gited73fb6.el7.x86_64", "product": { "name": "openshift-eventrouter-debuginfo-0:0.2-3.gited73fb6.el7.x86_64", "product_id": "openshift-eventrouter-debuginfo-0:0.2-3.gited73fb6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.x86_64", "product": { "name": "ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.x86_64", "product_id": "ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "apb-0:2.0.3-2.el7.src", "product": { "name": "apb-0:2.0.3-2.el7.src", "product_id": "apb-0:2.0.3-2.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.8.1-4.el7.src", "product": { "name": "containernetworking-plugins-0:0.8.1-4.el7.src", "product_id": "containernetworking-plugins-0:0.8.1-4.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "product": { "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "product_id": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-openshift-prometheus-alert-buffer@0-3.gitceca8c1.el7?arch=src" } } }, { "category": "product_version", "name": "golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "product": { "name": "golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "product_id": "golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "openshift-eventrouter-0:0.2-3.gited73fb6.el7.src", "product": { "name": "openshift-eventrouter-0:0.2-3.gited73fb6.el7.src", "product_id": "openshift-eventrouter-0:0.2-3.gited73fb6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.src", "product": { "name": "ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.src", "product_id": "ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "apb-container-scripts-0:2.0.3-2.el7.noarch", "product": { "name": "apb-container-scripts-0:2.0.3-2.el7.noarch", "product_id": "apb-container-scripts-0:2.0.3-2.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } }, { "category": "product_version", "name": "apb-devel-0:2.0.3-2.el7.noarch", "product": { "name": "apb-devel-0:2.0.3-2.el7.noarch", "product_id": "apb-devel-0:2.0.3-2.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } }, { "category": "product_version", "name": "ansible-operator-container-scripts-0:0.0.1-3.git.59.4beb3d2.el7.noarch", "product": { "name": "ansible-operator-container-scripts-0:0.0.1-3.git.59.4beb3d2.el7.noarch", "product_id": "ansible-operator-container-scripts-0:0.0.1-3.git.59.4beb3d2.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } }, { "category": "product_version", "name": "ansible-operator-devel-0:0.0.1-3.git.59.4beb3d2.el7.noarch", "product": { "name": "ansible-operator-devel-0:0.0.1-3.git.59.4beb3d2.el7.noarch", "product_id": "ansible-operator-devel-0:0.0.1-3.git.59.4beb3d2.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.src" }, "product_reference": "ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.x86_64" }, "product_reference": "ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-operator-container-scripts-0:0.0.1-3.git.59.4beb3d2.el7.noarch as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:ansible-operator-container-scripts-0:0.0.1-3.git.59.4beb3d2.el7.noarch" }, "product_reference": "ansible-operator-container-scripts-0:0.0.1-3.git.59.4beb3d2.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-operator-devel-0:0.0.1-3.git.59.4beb3d2.el7.noarch as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:ansible-operator-devel-0:0.0.1-3.git.59.4beb3d2.el7.noarch" }, "product_reference": "ansible-operator-devel-0:0.0.1-3.git.59.4beb3d2.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "apb-0:2.0.3-2.el7.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:apb-0:2.0.3-2.el7.src" }, "product_reference": "apb-0:2.0.3-2.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "apb-0:2.0.3-2.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:apb-0:2.0.3-2.el7.x86_64" }, "product_reference": "apb-0:2.0.3-2.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "apb-container-scripts-0:2.0.3-2.el7.noarch as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:apb-container-scripts-0:2.0.3-2.el7.noarch" }, "product_reference": "apb-container-scripts-0:2.0.3-2.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "apb-devel-0:2.0.3-2.el7.noarch as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:apb-devel-0:2.0.3-2.el7.noarch" }, "product_reference": "apb-devel-0:2.0.3-2.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.1-4.el7.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:containernetworking-plugins-0:0.8.1-4.el7.src" }, "product_reference": "containernetworking-plugins-0:0.8.1-4.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.1-4.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:containernetworking-plugins-0:0.8.1-4.el7.x86_64" }, "product_reference": "containernetworking-plugins-0:0.8.1-4.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src" }, "product_reference": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64" }, "product_reference": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src" }, "product_reference": "golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64" }, "product_reference": "golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-eventrouter-0:0.2-3.gited73fb6.el7.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-eventrouter-0:0.2-3.gited73fb6.el7.src" }, "product_reference": "openshift-eventrouter-0:0.2-3.gited73fb6.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-eventrouter-0:0.2-3.gited73fb6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-eventrouter-0:0.2-3.gited73fb6.el7.x86_64" }, "product_reference": "openshift-eventrouter-0:0.2-3.gited73fb6.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-eventrouter-debuginfo-0:0.2-3.gited73fb6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-eventrouter-debuginfo-0:0.2-3.gited73fb6.el7.x86_64" }, "product_reference": "openshift-eventrouter-debuginfo-0:0.2-3.gited73fb6.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-promu-0:0-5.git85ceabc.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:prometheus-promu-0:0-5.git85ceabc.el7.x86_64" }, "product_reference": "prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.1:ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.src", "7Server-RH7-RHOSE-4.1:ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.x86_64", "7Server-RH7-RHOSE-4.1:ansible-operator-container-scripts-0:0.0.1-3.git.59.4beb3d2.el7.noarch", "7Server-RH7-RHOSE-4.1:ansible-operator-devel-0:0.0.1-3.git.59.4beb3d2.el7.noarch", "7Server-RH7-RHOSE-4.1:apb-0:2.0.3-2.el7.src", "7Server-RH7-RHOSE-4.1:apb-0:2.0.3-2.el7.x86_64", "7Server-RH7-RHOSE-4.1:apb-container-scripts-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.1:apb-devel-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.1:containernetworking-plugins-0:0.8.1-4.el7.src", "7Server-RH7-RHOSE-4.1:containernetworking-plugins-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-4.1:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-4.1:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "7Server-RH7-RHOSE-4.1:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-eventrouter-0:0.2-3.gited73fb6.el7.src", "7Server-RH7-RHOSE-4.1:openshift-eventrouter-0:0.2-3.gited73fb6.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-eventrouter-debuginfo-0:0.2-3.gited73fb6.el7.x86_64", "7Server-RH7-RHOSE-4.1:prometheus-promu-0:0-5.git85ceabc.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-30T18:20:03+00:00", "details": "For OpenShift Container Platform 4.1 see the following documentation, which\nwill be updated shortly for release 4.1.21, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-release-notes.html", "product_ids": [ "7Server-RH7-RHOSE-4.1:ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.src", "7Server-RH7-RHOSE-4.1:ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.x86_64", "7Server-RH7-RHOSE-4.1:ansible-operator-container-scripts-0:0.0.1-3.git.59.4beb3d2.el7.noarch", "7Server-RH7-RHOSE-4.1:ansible-operator-devel-0:0.0.1-3.git.59.4beb3d2.el7.noarch", "7Server-RH7-RHOSE-4.1:apb-0:2.0.3-2.el7.src", "7Server-RH7-RHOSE-4.1:apb-0:2.0.3-2.el7.x86_64", "7Server-RH7-RHOSE-4.1:apb-container-scripts-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.1:apb-devel-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.1:containernetworking-plugins-0:0.8.1-4.el7.src", "7Server-RH7-RHOSE-4.1:containernetworking-plugins-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-4.1:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-4.1:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "7Server-RH7-RHOSE-4.1:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-eventrouter-0:0.2-3.gited73fb6.el7.src", "7Server-RH7-RHOSE-4.1:openshift-eventrouter-0:0.2-3.gited73fb6.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-eventrouter-debuginfo-0:0.2-3.gited73fb6.el7.x86_64", "7Server-RH7-RHOSE-4.1:prometheus-promu-0:0-5.git85ceabc.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3265" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-4.1:ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.src", "7Server-RH7-RHOSE-4.1:ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.x86_64", "7Server-RH7-RHOSE-4.1:ansible-operator-container-scripts-0:0.0.1-3.git.59.4beb3d2.el7.noarch", "7Server-RH7-RHOSE-4.1:ansible-operator-devel-0:0.0.1-3.git.59.4beb3d2.el7.noarch", "7Server-RH7-RHOSE-4.1:apb-0:2.0.3-2.el7.src", "7Server-RH7-RHOSE-4.1:apb-0:2.0.3-2.el7.x86_64", "7Server-RH7-RHOSE-4.1:apb-container-scripts-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.1:apb-devel-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.1:containernetworking-plugins-0:0.8.1-4.el7.src", "7Server-RH7-RHOSE-4.1:containernetworking-plugins-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-4.1:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-4.1:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "7Server-RH7-RHOSE-4.1:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-eventrouter-0:0.2-3.gited73fb6.el7.src", "7Server-RH7-RHOSE-4.1:openshift-eventrouter-0:0.2-3.gited73fb6.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-eventrouter-debuginfo-0:0.2-3.gited73fb6.el7.x86_64", "7Server-RH7-RHOSE-4.1:prometheus-promu-0:0-5.git85ceabc.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.1:ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.src", "7Server-RH7-RHOSE-4.1:ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.x86_64", "7Server-RH7-RHOSE-4.1:ansible-operator-container-scripts-0:0.0.1-3.git.59.4beb3d2.el7.noarch", "7Server-RH7-RHOSE-4.1:ansible-operator-devel-0:0.0.1-3.git.59.4beb3d2.el7.noarch", "7Server-RH7-RHOSE-4.1:apb-0:2.0.3-2.el7.src", "7Server-RH7-RHOSE-4.1:apb-0:2.0.3-2.el7.x86_64", "7Server-RH7-RHOSE-4.1:apb-container-scripts-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.1:apb-devel-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.1:containernetworking-plugins-0:0.8.1-4.el7.src", "7Server-RH7-RHOSE-4.1:containernetworking-plugins-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-4.1:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-4.1:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "7Server-RH7-RHOSE-4.1:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-eventrouter-0:0.2-3.gited73fb6.el7.src", "7Server-RH7-RHOSE-4.1:openshift-eventrouter-0:0.2-3.gited73fb6.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-eventrouter-debuginfo-0:0.2-3.gited73fb6.el7.x86_64", "7Server-RH7-RHOSE-4.1:prometheus-promu-0:0-5.git85ceabc.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-30T18:20:03+00:00", "details": "For OpenShift Container Platform 4.1 see the following documentation, which\nwill be updated shortly for release 4.1.21, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-release-notes.html", "product_ids": [ "7Server-RH7-RHOSE-4.1:ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.src", "7Server-RH7-RHOSE-4.1:ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.x86_64", "7Server-RH7-RHOSE-4.1:ansible-operator-container-scripts-0:0.0.1-3.git.59.4beb3d2.el7.noarch", "7Server-RH7-RHOSE-4.1:ansible-operator-devel-0:0.0.1-3.git.59.4beb3d2.el7.noarch", "7Server-RH7-RHOSE-4.1:apb-0:2.0.3-2.el7.src", "7Server-RH7-RHOSE-4.1:apb-0:2.0.3-2.el7.x86_64", "7Server-RH7-RHOSE-4.1:apb-container-scripts-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.1:apb-devel-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.1:containernetworking-plugins-0:0.8.1-4.el7.src", "7Server-RH7-RHOSE-4.1:containernetworking-plugins-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-4.1:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-4.1:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "7Server-RH7-RHOSE-4.1:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-eventrouter-0:0.2-3.gited73fb6.el7.src", "7Server-RH7-RHOSE-4.1:openshift-eventrouter-0:0.2-3.gited73fb6.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-eventrouter-debuginfo-0:0.2-3.gited73fb6.el7.x86_64", "7Server-RH7-RHOSE-4.1:prometheus-promu-0:0-5.git85ceabc.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3265" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-4.1:ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.src", "7Server-RH7-RHOSE-4.1:ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.x86_64", "7Server-RH7-RHOSE-4.1:ansible-operator-container-scripts-0:0.0.1-3.git.59.4beb3d2.el7.noarch", "7Server-RH7-RHOSE-4.1:ansible-operator-devel-0:0.0.1-3.git.59.4beb3d2.el7.noarch", "7Server-RH7-RHOSE-4.1:apb-0:2.0.3-2.el7.src", "7Server-RH7-RHOSE-4.1:apb-0:2.0.3-2.el7.x86_64", "7Server-RH7-RHOSE-4.1:apb-container-scripts-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.1:apb-devel-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.1:containernetworking-plugins-0:0.8.1-4.el7.src", "7Server-RH7-RHOSE-4.1:containernetworking-plugins-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-4.1:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-4.1:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "7Server-RH7-RHOSE-4.1:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-eventrouter-0:0.2-3.gited73fb6.el7.src", "7Server-RH7-RHOSE-4.1:openshift-eventrouter-0:0.2-3.gited73fb6.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-eventrouter-debuginfo-0:0.2-3.gited73fb6.el7.x86_64", "7Server-RH7-RHOSE-4.1:prometheus-promu-0:0-5.git85ceabc.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" } ] }
RHSA-2019:4021
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat JBoss Enterprise Application Platform 7.2.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime.\n\nThis release of Red Hat JBoss Enterprise Application Platform 7.2.5 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.2.4, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.2.5 Release Notes for information about the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* undertow: HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511)\n\n* undertow: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* undertow: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* undertow: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default (CVE-2019-14838)\n\n* wildfly: wildfly-security-manager: security manager authorization bypass (CVE-2019-14843)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:4021", "url": "https://access.redhat.com/errata/RHSA-2019:4021" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform\u0026downloadType=securityPatches\u0026version=7.2", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform\u0026downloadType=securityPatches\u0026version=7.2" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/", "url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/html-single/installation_guide/", "url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/html-single/installation_guide/" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "1751227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751227" }, { "category": "external", "summary": "1752980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752980" }, { "category": "external", "summary": "JBEAP-17075", "url": "https://issues.redhat.com/browse/JBEAP-17075" }, { "category": "external", "summary": "JBEAP-17220", "url": "https://issues.redhat.com/browse/JBEAP-17220" }, { "category": "external", "summary": "JBEAP-17365", "url": "https://issues.redhat.com/browse/JBEAP-17365" }, { "category": "external", "summary": "JBEAP-17476", "url": "https://issues.redhat.com/browse/JBEAP-17476" }, { "category": "external", "summary": "JBEAP-17478", "url": "https://issues.redhat.com/browse/JBEAP-17478" }, { "category": "external", "summary": "JBEAP-17483", "url": "https://issues.redhat.com/browse/JBEAP-17483" }, { "category": "external", "summary": "JBEAP-17495", "url": "https://issues.redhat.com/browse/JBEAP-17495" }, { "category": "external", "summary": "JBEAP-17496", "url": "https://issues.redhat.com/browse/JBEAP-17496" }, { "category": "external", "summary": "JBEAP-17513", "url": "https://issues.redhat.com/browse/JBEAP-17513" }, { "category": "external", "summary": "JBEAP-17521", "url": "https://issues.redhat.com/browse/JBEAP-17521" }, { "category": "external", "summary": "JBEAP-17523", "url": "https://issues.redhat.com/browse/JBEAP-17523" }, { "category": "external", "summary": "JBEAP-17547", "url": "https://issues.redhat.com/browse/JBEAP-17547" }, { "category": "external", "summary": "JBEAP-17548", "url": "https://issues.redhat.com/browse/JBEAP-17548" }, { "category": "external", "summary": "JBEAP-17560", "url": "https://issues.redhat.com/browse/JBEAP-17560" }, { "category": "external", "summary": "JBEAP-17579", "url": "https://issues.redhat.com/browse/JBEAP-17579" }, { "category": "external", "summary": "JBEAP-17582", "url": "https://issues.redhat.com/browse/JBEAP-17582" }, { "category": "external", "summary": "JBEAP-17631", "url": "https://issues.redhat.com/browse/JBEAP-17631" }, { "category": "external", "summary": "JBEAP-17647", "url": "https://issues.redhat.com/browse/JBEAP-17647" }, { "category": "external", "summary": "JBEAP-17665", "url": "https://issues.redhat.com/browse/JBEAP-17665" }, { "category": "external", "summary": "JBEAP-17722", "url": "https://issues.redhat.com/browse/JBEAP-17722" }, { "category": "external", "summary": "JBEAP-17874", "url": "https://issues.redhat.com/browse/JBEAP-17874" }, { "category": "external", "summary": "JBEAP-17880", "url": "https://issues.redhat.com/browse/JBEAP-17880" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_4021.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.5 security update", "tracking": { "current_release_date": "2025-03-15T19:44:34+00:00", "generator": { "date": "2025-03-15T19:44:34+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.1" } }, "id": "RHSA-2019:4021", "initial_release_date": "2019-11-26T19:58:39+00:00", "revision_history": [ { "date": "2019-11-26T19:58:39+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-11-26T19:58:39+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-03-15T19:44:34+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss EAP 7.2", "product": { "name": "Red Hat JBoss EAP 7.2", "product_id": "Red Hat JBoss EAP 7.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:7.2" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-9511", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741860" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker can request a large amount of data by manipulating window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this queue can consume excess CPU, memory, or both, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: large amount of data requests leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "There are no mitigations available for nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss EAP 7.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "RHBZ#1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9511", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T19:58:39+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).\n\nThe JBoss server process must be restarted for the update to take effect.", "product_ids": [ "Red Hat JBoss EAP 7.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4021" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "Red Hat JBoss EAP 7.2" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss EAP 7.2" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: large amount of data requests leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss EAP 7.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T19:58:39+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).\n\nThe JBoss server process must be restarted for the update to take effect.", "product_ids": [ "Red Hat JBoss EAP 7.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4021" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss EAP 7.2" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss EAP 7.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T19:58:39+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).\n\nThe JBoss server process must be restarted for the update to take effect.", "product_ids": [ "Red Hat JBoss EAP 7.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4021" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss EAP 7.2" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss EAP 7.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T19:58:39+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).\n\nThe JBoss server process must be restarted for the update to take effect.", "product_ids": [ "Red Hat JBoss EAP 7.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4021" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss EAP 7.2" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "F\u00e1bio Magalh\u00e3es de Andrade" ], "organization": "Sonda Ativas" }, { "names": [ "Juliano de Castro Santos", "Leonard Lunardi" ], "organization": "UnimedBH" } ], "cve": "CVE-2019-14838", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2019-08-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1751227" } ], "notes": [ { "category": "description", "text": "It was found that Wildfly users had default user permissions set incorrectly. A malicious user could use this flaw to access unauthorized controls for the application server.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss EAP 7.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14838" }, { "category": "external", "summary": "RHBZ#1751227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751227" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14838", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14838" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14838", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14838" }, { "category": "external", "summary": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14838", "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14838" } ], "release_date": "2019-10-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T19:58:39+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).\n\nThe JBoss server process must be restarted for the update to take effect.", "product_ids": [ "Red Hat JBoss EAP 7.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4021" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss EAP 7.2" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default" }, { "cve": "CVE-2019-14843", "cwe": { "id": "CWE-592", "name": "CWE-592" }, "discovery_date": "2019-09-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1752980" } ], "notes": [ { "category": "description", "text": "A flaw was found in Wildfly Security Manager, running under JDK 11 or 8, that authorized requests for any requester. This flaw could be used by a malicious app deployed on the app server to access unauthorized information and possibly conduct further attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-security-manager: security manager authorization bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss EAP 7.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14843" }, { "category": "external", "summary": "RHBZ#1752980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752980" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14843", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14843" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14843", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14843" } ], "release_date": "2019-09-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T19:58:39+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).\n\nThe JBoss server process must be restarted for the update to take effect.", "product_ids": [ "Red Hat JBoss EAP 7.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4021" }, { "category": "workaround", "details": "This flaw only affects the Security Manager running under JDK 11 or 8. To mitigate exposure to this flaw, do not run under those JDK versions.", "product_ids": [ "Red Hat JBoss EAP 7.2" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss EAP 7.2" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "wildfly-security-manager: security manager authorization bypass" } ] }
RHSA-2020:0406
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for containernetworking-plugins is now available for Red Hat Enterprise Linux 7 Extras.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The Container Network Interface (CNI) project consists of a specification and libraries for writing plug-ins for configuring network interfaces in Linux containers, along with a number of supported plug-ins. CNI concerns itself only with network connectivity of containers and removing allocated resources when the container is deleted.\n\nSecurity Fix(es):\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:0406", "url": "https://access.redhat.com/errata/RHSA-2020:0406" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_0406.json" } ], "title": "Red Hat Security Advisory: containernetworking-plugins security update", "tracking": { "current_release_date": "2025-03-15T19:45:12+00:00", "generator": { "date": "2025-03-15T19:45:12+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.1" } }, "id": "RHSA-2020:0406", "initial_release_date": "2020-02-04T19:25:46+00:00", "revision_history": [ { "date": "2020-02-04T19:25:46+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-02-04T19:25:46+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-03-15T19:45:12+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux 7 Extras", "product": { "name": "Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.7", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_other:7" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux 7 Extras", "product": { "name": "Red Hat Enterprise Linux 7 Extras", "product_id": "7Workstation-EXTRAS-7.7", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_other:7" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Extras" }, { "branches": [ { "category": "product_version", "name": "containernetworking-plugins-0:0.8.1-4.el7_7.x86_64", "product": { "name": "containernetworking-plugins-0:0.8.1-4.el7_7.x86_64", "product_id": "containernetworking-plugins-0:0.8.1-4.el7_7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_7?arch=x86_64" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64", "product": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64", "product_id": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "containernetworking-plugins-0:0.8.1-4.el7_7.src", "product": { "name": "containernetworking-plugins-0:0.8.1-4.el7_7.src", "product_id": "containernetworking-plugins-0:0.8.1-4.el7_7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le", "product": { "name": "containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le", "product_id": "containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_7?arch=ppc64le" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le", "product": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le", "product_id": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "containernetworking-plugins-0:0.8.1-4.el7_7.s390x", "product": { "name": "containernetworking-plugins-0:0.8.1-4.el7_7.s390x", "product_id": "containernetworking-plugins-0:0.8.1-4.el7_7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_7?arch=s390x" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x", "product": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x", "product_id": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le" }, "product_reference": "containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le", "relates_to_product_reference": "7Server-EXTRAS-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.1-4.el7_7.s390x as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.s390x" }, "product_reference": "containernetworking-plugins-0:0.8.1-4.el7_7.s390x", "relates_to_product_reference": "7Server-EXTRAS-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.1-4.el7_7.src as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.src" }, "product_reference": "containernetworking-plugins-0:0.8.1-4.el7_7.src", "relates_to_product_reference": "7Server-EXTRAS-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.1-4.el7_7.x86_64 as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.x86_64" }, "product_reference": "containernetworking-plugins-0:0.8.1-4.el7_7.x86_64", "relates_to_product_reference": "7Server-EXTRAS-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le", "relates_to_product_reference": "7Server-EXTRAS-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x", "relates_to_product_reference": "7Server-EXTRAS-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64 as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64", "relates_to_product_reference": "7Server-EXTRAS-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le" }, "product_reference": "containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le", "relates_to_product_reference": "7Workstation-EXTRAS-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.1-4.el7_7.s390x as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.s390x" }, "product_reference": "containernetworking-plugins-0:0.8.1-4.el7_7.s390x", "relates_to_product_reference": "7Workstation-EXTRAS-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.1-4.el7_7.src as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.src" }, "product_reference": "containernetworking-plugins-0:0.8.1-4.el7_7.src", "relates_to_product_reference": "7Workstation-EXTRAS-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.1-4.el7_7.x86_64 as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.x86_64" }, "product_reference": "containernetworking-plugins-0:0.8.1-4.el7_7.x86_64", "relates_to_product_reference": "7Workstation-EXTRAS-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le", "relates_to_product_reference": "7Workstation-EXTRAS-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x", "relates_to_product_reference": "7Workstation-EXTRAS-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64 as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64", "relates_to_product_reference": "7Workstation-EXTRAS-7.7" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le", "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.s390x", "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.src", "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.x86_64", "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le", "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x", "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.s390x", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.src", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.x86_64", "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le", "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x", "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-02-04T19:25:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le", "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.s390x", "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.src", "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.x86_64", "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le", "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x", "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.s390x", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.src", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.x86_64", "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le", "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x", "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0406" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le", "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.s390x", "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.src", "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.x86_64", "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le", "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x", "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.s390x", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.src", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.x86_64", "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le", "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x", "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le", "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.s390x", "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.src", "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.x86_64", "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le", "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x", "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.s390x", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.src", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.x86_64", "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le", "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x", "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-02-04T19:25:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le", "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.s390x", "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.src", "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.x86_64", "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le", "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x", "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.s390x", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.src", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.x86_64", "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le", "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x", "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0406" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le", "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.s390x", "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.src", "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.x86_64", "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le", "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x", "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.s390x", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.src", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.x86_64", "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le", "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x", "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" } ] }
RHSA-2019:3906
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat OpenShift Container Platform 3.11.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThe following RPM packages have been rebuilt with updated version of Go, which includes the security fixes listed further below:\n\natomic-enterprise-service-catalog\natomic-openshift-cluster-autoscaler\natomic-openshift-descheduler\natomic-openshift-metrics-server\natomic-openshift-node-problem-detector\natomic-openshift-service-idler\natomic-openshift-web-console\ncockpit\ncsi-attacher\ncsi-driver-registrar\ncsi-livenessprobe\ncsi-provisioner\ngolang-github-openshift-oauth-proxy\ngolang-github-openshift-prometheus-alert-buffer\ngolang-github-prometheus-alertmanager\ngolang-github-prometheus-node_exporter\ngolang-github-prometheus-prometheus\nhawkular-openshift-agent\nheapster\nimage-inspector\nopenshift-enterprise-autoheal\nopenshift-enterprise-cluster-capacity\nopenshift-eventrouter\nopenshift-external-storage\n\nSecurity Fix(es):\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:3906", "url": "https://access.redhat.com/errata/RHSA-2019:3906" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3906.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 3.11 HTTP/2 security update", "tracking": { "current_release_date": "2025-03-19T15:02:55+00:00", "generator": { "date": "2025-03-19T15:02:55+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.1" } }, "id": "RHSA-2019:3906", "initial_release_date": "2019-11-18T16:26:09+00:00", "revision_history": [ { "date": "2019-11-18T16:26:09+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-11-18T16:26:09+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-03-19T15:02:55+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 3.11", "product": { "name": "Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:3.11::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.ppc64le", "product": { "name": "atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.ppc64le", "product_id": "atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.ppc64le", "product": { "name": "atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.ppc64le", "product_id": "atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog-svcat@3.11.154-1.git.1.fa68ced.el7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.ppc64le", "product": { "name": "atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.ppc64le", "product_id": "atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.ppc64le", "product": { "name": "atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.ppc64le", "product_id": "atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.ppc64le", "product": { "name": "atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.ppc64le", "product_id": "atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.ppc64le", "product": { "name": "atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.ppc64le", "product_id": "atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-node-problem-detector@3.11.154-1.git.1.5e8e065.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.ppc64le", "product": { "name": "atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.ppc64le", "product_id": "atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.ppc64le", "product": { "name": "atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.ppc64le", "product_id": "atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "cockpit-kubernetes-0:195-2.rhaos.el7.ppc64le", "product": { "name": "cockpit-kubernetes-0:195-2.rhaos.el7.ppc64le", "product_id": "cockpit-kubernetes-0:195-2.rhaos.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "cockpit-debuginfo-0:195-2.rhaos.el7.ppc64le", "product": { "name": "cockpit-debuginfo-0:195-2.rhaos.el7.ppc64le", "product_id": "cockpit-debuginfo-0:195-2.rhaos.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "csi-attacher-0:0.2.0-4.git27299be.el7.ppc64le", "product": { "name": "csi-attacher-0:0.2.0-4.git27299be.el7.ppc64le", "product_id": "csi-attacher-0:0.2.0-4.git27299be.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.ppc64le", "product": { "name": "csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.ppc64le", "product_id": "csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "csi-driver-registrar-0:0.2.0-2.el7.ppc64le", "product": { "name": "csi-driver-registrar-0:0.2.0-2.el7.ppc64le", "product_id": "csi-driver-registrar-0:0.2.0-2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "csi-driver-registrar-debuginfo-0:0.2.0-2.el7.ppc64le", "product": { "name": "csi-driver-registrar-debuginfo-0:0.2.0-2.el7.ppc64le", "product_id": "csi-driver-registrar-debuginfo-0:0.2.0-2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.ppc64le", "product": { "name": "csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.ppc64le", "product_id": "csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.ppc64le", "product": { "name": "csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.ppc64le", "product_id": "csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "csi-provisioner-0:0.2.0-3.el7.ppc64le", "product": { "name": "csi-provisioner-0:0.2.0-3.el7.ppc64le", "product_id": "csi-provisioner-0:0.2.0-3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "csi-provisioner-debuginfo-0:0.2.0-3.el7.ppc64le", "product": { "name": "csi-provisioner-debuginfo-0:0.2.0-3.el7.ppc64le", "product_id": "csi-provisioner-debuginfo-0:0.2.0-3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.ppc64le", "product": { "name": "golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.ppc64le", "product_id": "golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.ppc64le", "product": { "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.ppc64le", "product_id": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-openshift-prometheus-alert-buffer@0-3.gitceca8c1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.ppc64le", "product": { "name": "prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.ppc64le", "product_id": "prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.ppc64le", "product": { "name": "prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.ppc64le", "product_id": "prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "prometheus-0:3.11.154-1.git.1.148db48.el7.ppc64le", "product": { "name": "prometheus-0:3.11.154-1.git.1.148db48.el7.ppc64le", "product_id": "prometheus-0:3.11.154-1.git.1.148db48.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "hawkular-openshift-agent-0:1.2.2-3.el7.ppc64le", "product": { "name": "hawkular-openshift-agent-0:1.2.2-3.el7.ppc64le", "product_id": "hawkular-openshift-agent-0:1.2.2-3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "heapster-0:1.3.0-4.el7.ppc64le", "product": { "name": "heapster-0:1.3.0-4.el7.ppc64le", "product_id": "heapster-0:1.3.0-4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "image-inspector-0:2.4.0-4.el7.ppc64le", "product": { "name": "image-inspector-0:2.4.0-4.el7.ppc64le", "product_id": "image-inspector-0:2.4.0-4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.ppc64le", "product": { "name": "openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.ppc64le", "product_id": "openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.ppc64le", "product": { "name": "openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.ppc64le", "product_id": "openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-enterprise-cluster-capacity@3.11.154-1.git.1.5798c2c.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-eventrouter-0:0.2-4.git7c289cc.el7.ppc64le", "product": { "name": "openshift-eventrouter-0:0.2-4.git7c289cc.el7.ppc64le", "product_id": "openshift-eventrouter-0:0.2-4.git7c289cc.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.ppc64le", "product": { "name": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.ppc64le", "product_id": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product": { "name": "openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product_id": "openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-cephfs-provisioner@0.0.2-9.gitd3c94f0.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product": { "name": "openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product_id": "openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-efs-provisioner@0.0.2-9.gitd3c94f0.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product": { "name": "openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product_id": "openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-local-provisioner@0.0.2-9.gitd3c94f0.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product": { "name": "openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product_id": "openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-manila-provisioner@0.0.2-9.gitd3c94f0.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product": { "name": "openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product_id": "openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-snapshot-controller@0.0.2-9.gitd3c94f0.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product": { "name": "openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product_id": "openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-snapshot-provisioner@0.0.2-9.gitd3c94f0.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product": { "name": "openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product_id": "openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.x86_64", "product": { "name": "atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.x86_64", "product_id": "atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.x86_64", "product": { "name": "atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.x86_64", "product_id": "atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog-svcat@3.11.154-1.git.1.fa68ced.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.x86_64", "product": { "name": "atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.x86_64", "product_id": "atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.x86_64", "product": { "name": "atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.x86_64", "product_id": "atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.x86_64", "product": { "name": "atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.x86_64", "product_id": "atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.x86_64", "product": { "name": "atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.x86_64", "product_id": "atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-node-problem-detector@3.11.154-1.git.1.5e8e065.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.x86_64", "product": { "name": "atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.x86_64", "product_id": "atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.x86_64", "product": { "name": "atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.x86_64", "product_id": "atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "product": { "name": "cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "product_id": "cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "product": { "name": "cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "product_id": "cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "csi-attacher-0:0.2.0-4.git27299be.el7.x86_64", "product": { "name": "csi-attacher-0:0.2.0-4.git27299be.el7.x86_64", "product_id": "csi-attacher-0:0.2.0-4.git27299be.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.x86_64", "product": { "name": "csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.x86_64", "product_id": "csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "csi-driver-registrar-0:0.2.0-2.el7.x86_64", "product": { "name": "csi-driver-registrar-0:0.2.0-2.el7.x86_64", "product_id": "csi-driver-registrar-0:0.2.0-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "csi-driver-registrar-debuginfo-0:0.2.0-2.el7.x86_64", "product": { "name": "csi-driver-registrar-debuginfo-0:0.2.0-2.el7.x86_64", "product_id": "csi-driver-registrar-debuginfo-0:0.2.0-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.x86_64", "product": { "name": "csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.x86_64", "product_id": "csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.x86_64", "product": { "name": "csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.x86_64", "product_id": "csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "csi-provisioner-0:0.2.0-3.el7.x86_64", "product": { "name": "csi-provisioner-0:0.2.0-3.el7.x86_64", "product_id": "csi-provisioner-0:0.2.0-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "csi-provisioner-debuginfo-0:0.2.0-3.el7.x86_64", "product": { "name": "csi-provisioner-debuginfo-0:0.2.0-3.el7.x86_64", "product_id": "csi-provisioner-debuginfo-0:0.2.0-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.x86_64", "product": { "name": "golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.x86_64", "product_id": "golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "product": { "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "product_id": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-openshift-prometheus-alert-buffer@0-3.gitceca8c1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.x86_64", "product": { "name": "prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.x86_64", "product_id": "prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.x86_64", "product": { "name": "prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.x86_64", "product_id": "prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "prometheus-0:3.11.154-1.git.1.148db48.el7.x86_64", "product": { "name": "prometheus-0:3.11.154-1.git.1.148db48.el7.x86_64", "product_id": "prometheus-0:3.11.154-1.git.1.148db48.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "product": { "name": "hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "product_id": "hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "heapster-0:1.3.0-4.el7.x86_64", "product": { "name": "heapster-0:1.3.0-4.el7.x86_64", "product_id": "heapster-0:1.3.0-4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "image-inspector-0:2.4.0-4.el7.x86_64", "product": { "name": "image-inspector-0:2.4.0-4.el7.x86_64", "product_id": "image-inspector-0:2.4.0-4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.x86_64", "product": { "name": "openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.x86_64", "product_id": "openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.x86_64", "product": { "name": "openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.x86_64", "product_id": "openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-enterprise-cluster-capacity@3.11.154-1.git.1.5798c2c.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-eventrouter-0:0.2-4.git7c289cc.el7.x86_64", "product": { "name": "openshift-eventrouter-0:0.2-4.git7c289cc.el7.x86_64", "product_id": "openshift-eventrouter-0:0.2-4.git7c289cc.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.x86_64", "product": { "name": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.x86_64", "product_id": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product": { "name": "openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product_id": "openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-cephfs-provisioner@0.0.2-9.gitd3c94f0.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product": { "name": "openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product_id": "openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-efs-provisioner@0.0.2-9.gitd3c94f0.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product": { "name": "openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product_id": "openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-local-provisioner@0.0.2-9.gitd3c94f0.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product": { "name": "openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product_id": "openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-manila-provisioner@0.0.2-9.gitd3c94f0.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product": { "name": "openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product_id": "openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-snapshot-controller@0.0.2-9.gitd3c94f0.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product": { "name": "openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product_id": "openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-snapshot-provisioner@0.0.2-9.gitd3c94f0.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product": { "name": "openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product_id": "openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.src", "product": { "name": "atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.src", "product_id": "atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.src", "product": { "name": "atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.src", "product_id": "atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.src", "product": { "name": "atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.src", "product_id": "atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.src", "product": { "name": "atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.src", "product_id": "atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.src", "product": { "name": "atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.src", "product_id": "atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-node-problem-detector@3.11.154-1.git.1.5e8e065.el7?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.src", "product": { "name": "atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.src", "product_id": "atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.src", "product": { "name": "atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.src", "product_id": "atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "cockpit-0:195-2.rhaos.el7.src", "product": { "name": "cockpit-0:195-2.rhaos.el7.src", "product_id": "cockpit-0:195-2.rhaos.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "csi-attacher-0:0.2.0-4.git27299be.el7.src", "product": { "name": "csi-attacher-0:0.2.0-4.git27299be.el7.src", "product_id": "csi-attacher-0:0.2.0-4.git27299be.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "csi-driver-registrar-0:0.2.0-2.el7.src", "product": { "name": "csi-driver-registrar-0:0.2.0-2.el7.src", "product_id": "csi-driver-registrar-0:0.2.0-2.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.src", "product": { "name": "csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.src", "product_id": "csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "csi-provisioner-0:0.2.0-3.el7.src", "product": { "name": "csi-provisioner-0:0.2.0-3.el7.src", "product_id": "csi-provisioner-0:0.2.0-3.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.src", "product": { "name": "golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.src", "product_id": "golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "product": { "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "product_id": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-openshift-prometheus-alert-buffer@0-3.gitceca8c1.el7?arch=src" } } }, { "category": "product_version", "name": "golang-github-prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.src", "product": { "name": "golang-github-prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.src", "product_id": "golang-github-prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-prometheus-alertmanager@3.11.154-1.git.1.4acd2e6.el7?arch=src" } } }, { "category": "product_version", "name": "golang-github-prometheus-node_exporter-0:3.11.154-1.git.1.bc9f224.el7.src", "product": { "name": "golang-github-prometheus-node_exporter-0:3.11.154-1.git.1.bc9f224.el7.src", "product_id": "golang-github-prometheus-node_exporter-0:3.11.154-1.git.1.bc9f224.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-prometheus-node_exporter@3.11.154-1.git.1.bc9f224.el7?arch=src" } } }, { "category": "product_version", "name": "golang-github-prometheus-prometheus-0:3.11.154-1.git.1.148db48.el7.src", "product": { "name": "golang-github-prometheus-prometheus-0:3.11.154-1.git.1.148db48.el7.src", "product_id": "golang-github-prometheus-prometheus-0:3.11.154-1.git.1.148db48.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "hawkular-openshift-agent-0:1.2.2-3.el7.src", "product": { "name": "hawkular-openshift-agent-0:1.2.2-3.el7.src", "product_id": "hawkular-openshift-agent-0:1.2.2-3.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "heapster-0:1.3.0-4.el7.src", "product": { "name": "heapster-0:1.3.0-4.el7.src", "product_id": "heapster-0:1.3.0-4.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "image-inspector-0:2.4.0-4.el7.src", "product": { "name": "image-inspector-0:2.4.0-4.el7.src", "product_id": "image-inspector-0:2.4.0-4.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.src", "product": { "name": "openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.src", "product_id": "openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.src", "product": { "name": "openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.src", "product_id": "openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-enterprise-cluster-capacity@3.11.154-1.git.1.5798c2c.el7?arch=src" } } }, { "category": "product_version", "name": "openshift-eventrouter-0:0.2-4.git7c289cc.el7.src", "product": { "name": "openshift-eventrouter-0:0.2-4.git7c289cc.el7.src", "product_id": "openshift-eventrouter-0:0.2-4.git7c289cc.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "openshift-external-storage-0:0.0.2-9.gitd3c94f0.el7.src", "product": { "name": "openshift-external-storage-0:0.0.2-9.gitd3c94f0.el7.src", "product_id": "openshift-external-storage-0:0.0.2-9.gitd3c94f0.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.ppc64le" }, "product_reference": "atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.src" }, "product_reference": "atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.x86_64" }, "product_reference": "atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.ppc64le" }, "product_reference": "atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.x86_64" }, "product_reference": "atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.ppc64le" }, "product_reference": "atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.src" }, "product_reference": "atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.x86_64" }, "product_reference": "atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.ppc64le" }, "product_reference": "atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.src" }, "product_reference": "atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.x86_64" }, "product_reference": "atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.ppc64le" }, "product_reference": "atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.src" }, "product_reference": "atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.x86_64" }, "product_reference": "atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.ppc64le" }, "product_reference": "atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.src" }, "product_reference": "atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.x86_64" }, "product_reference": "atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.ppc64le" }, "product_reference": "atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.src" }, "product_reference": "atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.x86_64" }, "product_reference": "atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.ppc64le" }, "product_reference": "atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.src" }, "product_reference": "atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.x86_64" }, "product_reference": "atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "cockpit-0:195-2.rhaos.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:cockpit-0:195-2.rhaos.el7.src" }, "product_reference": "cockpit-0:195-2.rhaos.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "cockpit-debuginfo-0:195-2.rhaos.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:cockpit-debuginfo-0:195-2.rhaos.el7.ppc64le" }, "product_reference": "cockpit-debuginfo-0:195-2.rhaos.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "cockpit-debuginfo-0:195-2.rhaos.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:cockpit-debuginfo-0:195-2.rhaos.el7.x86_64" }, "product_reference": "cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "cockpit-kubernetes-0:195-2.rhaos.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:cockpit-kubernetes-0:195-2.rhaos.el7.ppc64le" }, "product_reference": "cockpit-kubernetes-0:195-2.rhaos.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "cockpit-kubernetes-0:195-2.rhaos.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:cockpit-kubernetes-0:195-2.rhaos.el7.x86_64" }, "product_reference": "cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "csi-attacher-0:0.2.0-4.git27299be.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.ppc64le" }, "product_reference": "csi-attacher-0:0.2.0-4.git27299be.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "csi-attacher-0:0.2.0-4.git27299be.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.src" }, "product_reference": "csi-attacher-0:0.2.0-4.git27299be.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "csi-attacher-0:0.2.0-4.git27299be.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.x86_64" }, "product_reference": "csi-attacher-0:0.2.0-4.git27299be.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.ppc64le" }, "product_reference": "csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.x86_64" }, "product_reference": "csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "csi-driver-registrar-0:0.2.0-2.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.ppc64le" }, "product_reference": "csi-driver-registrar-0:0.2.0-2.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "csi-driver-registrar-0:0.2.0-2.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.src" }, "product_reference": "csi-driver-registrar-0:0.2.0-2.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "csi-driver-registrar-0:0.2.0-2.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.x86_64" }, "product_reference": "csi-driver-registrar-0:0.2.0-2.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "csi-driver-registrar-debuginfo-0:0.2.0-2.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:csi-driver-registrar-debuginfo-0:0.2.0-2.el7.ppc64le" }, "product_reference": "csi-driver-registrar-debuginfo-0:0.2.0-2.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "csi-driver-registrar-debuginfo-0:0.2.0-2.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:csi-driver-registrar-debuginfo-0:0.2.0-2.el7.x86_64" }, "product_reference": "csi-driver-registrar-debuginfo-0:0.2.0-2.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.ppc64le" }, "product_reference": "csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.src" }, "product_reference": "csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.x86_64" }, "product_reference": "csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.ppc64le" }, "product_reference": "csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.x86_64" }, "product_reference": "csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "csi-provisioner-0:0.2.0-3.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.ppc64le" }, "product_reference": "csi-provisioner-0:0.2.0-3.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "csi-provisioner-0:0.2.0-3.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.src" }, "product_reference": "csi-provisioner-0:0.2.0-3.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "csi-provisioner-0:0.2.0-3.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.x86_64" }, "product_reference": "csi-provisioner-0:0.2.0-3.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "csi-provisioner-debuginfo-0:0.2.0-3.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:csi-provisioner-debuginfo-0:0.2.0-3.el7.ppc64le" }, "product_reference": "csi-provisioner-debuginfo-0:0.2.0-3.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "csi-provisioner-debuginfo-0:0.2.0-3.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:csi-provisioner-debuginfo-0:0.2.0-3.el7.x86_64" }, "product_reference": "csi-provisioner-debuginfo-0:0.2.0-3.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.ppc64le" }, "product_reference": "golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.src" }, "product_reference": "golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.x86_64" }, "product_reference": "golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.ppc64le" }, "product_reference": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src" }, "product_reference": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64" }, "product_reference": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.src" }, "product_reference": "golang-github-prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-node_exporter-0:3.11.154-1.git.1.bc9f224.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.154-1.git.1.bc9f224.el7.src" }, "product_reference": "golang-github-prometheus-node_exporter-0:3.11.154-1.git.1.bc9f224.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-prometheus-0:3.11.154-1.git.1.148db48.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.154-1.git.1.148db48.el7.src" }, "product_reference": "golang-github-prometheus-prometheus-0:3.11.154-1.git.1.148db48.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "hawkular-openshift-agent-0:1.2.2-3.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.ppc64le" }, "product_reference": "hawkular-openshift-agent-0:1.2.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "hawkular-openshift-agent-0:1.2.2-3.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.src" }, "product_reference": "hawkular-openshift-agent-0:1.2.2-3.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "hawkular-openshift-agent-0:1.2.2-3.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.x86_64" }, "product_reference": "hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "heapster-0:1.3.0-4.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.ppc64le" }, "product_reference": "heapster-0:1.3.0-4.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "heapster-0:1.3.0-4.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.src" }, "product_reference": "heapster-0:1.3.0-4.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "heapster-0:1.3.0-4.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.x86_64" }, "product_reference": "heapster-0:1.3.0-4.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "image-inspector-0:2.4.0-4.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.ppc64le" }, "product_reference": "image-inspector-0:2.4.0-4.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "image-inspector-0:2.4.0-4.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.src" }, "product_reference": "image-inspector-0:2.4.0-4.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "image-inspector-0:2.4.0-4.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.x86_64" }, "product_reference": "image-inspector-0:2.4.0-4.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.ppc64le" }, "product_reference": "openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.src" }, "product_reference": "openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.x86_64" }, "product_reference": "openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.ppc64le" }, "product_reference": "openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.src" }, "product_reference": "openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.x86_64" }, "product_reference": "openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-eventrouter-0:0.2-4.git7c289cc.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.ppc64le" }, "product_reference": "openshift-eventrouter-0:0.2-4.git7c289cc.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-eventrouter-0:0.2-4.git7c289cc.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.src" }, "product_reference": "openshift-eventrouter-0:0.2-4.git7c289cc.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-eventrouter-0:0.2-4.git7c289cc.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.x86_64" }, "product_reference": "openshift-eventrouter-0:0.2-4.git7c289cc.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.ppc64le" }, "product_reference": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.x86_64" }, "product_reference": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-0:0.0.2-9.gitd3c94f0.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-external-storage-0:0.0.2-9.gitd3c94f0.el7.src" }, "product_reference": "openshift-external-storage-0:0.0.2-9.gitd3c94f0.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le" }, "product_reference": "openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64" }, "product_reference": "openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.ppc64le" }, "product_reference": "openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.x86_64" }, "product_reference": "openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le" }, "product_reference": "openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64" }, "product_reference": "openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le" }, "product_reference": "openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64" }, "product_reference": "openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le" }, "product_reference": "openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64" }, "product_reference": "openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.ppc64le" }, "product_reference": "openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.x86_64" }, "product_reference": "openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le" }, "product_reference": "openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64" }, "product_reference": "openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-0:3.11.154-1.git.1.148db48.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.154-1.git.1.148db48.el7.ppc64le" }, "product_reference": "prometheus-0:3.11.154-1.git.1.148db48.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-0:3.11.154-1.git.1.148db48.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.154-1.git.1.148db48.el7.x86_64" }, "product_reference": "prometheus-0:3.11.154-1.git.1.148db48.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.ppc64le" }, "product_reference": "prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.x86_64" }, "product_reference": "prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.ppc64le" }, "product_reference": "prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.x86_64" }, "product_reference": "prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.x86_64", "7Server-RH7-RHOSE-3.11:cockpit-0:195-2.rhaos.el7.src", "7Server-RH7-RHOSE-3.11:cockpit-debuginfo-0:195-2.rhaos.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.11:cockpit-kubernetes-0:195-2.rhaos.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.src", "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.src", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-debuginfo-0:0.2.0-2.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-debuginfo-0:0.2.0-2.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.src", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.src", "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-provisioner-debuginfo-0:0.2.0-3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-provisioner-debuginfo-0:0.2.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.154-1.git.1.bc9f224.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.154-1.git.1.148db48.el7.src", "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.src", "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.ppc64le", "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.src", "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.ppc64le", "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.src", "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.src", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-0:0.0.2-9.gitd3c94f0.el7.src", "7Server-RH7-RHOSE-3.11:openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.154-1.git.1.148db48.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.154-1.git.1.148db48.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-18T16:26:09+00:00", "details": "See the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_release_notes.html", "product_ids": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.x86_64", "7Server-RH7-RHOSE-3.11:cockpit-0:195-2.rhaos.el7.src", "7Server-RH7-RHOSE-3.11:cockpit-debuginfo-0:195-2.rhaos.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.11:cockpit-kubernetes-0:195-2.rhaos.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.src", "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.src", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-debuginfo-0:0.2.0-2.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-debuginfo-0:0.2.0-2.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.src", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.src", "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-provisioner-debuginfo-0:0.2.0-3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-provisioner-debuginfo-0:0.2.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.154-1.git.1.bc9f224.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.154-1.git.1.148db48.el7.src", "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.src", "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.ppc64le", "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.src", "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.ppc64le", "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.src", "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.src", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-0:0.0.2-9.gitd3c94f0.el7.src", "7Server-RH7-RHOSE-3.11:openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.154-1.git.1.148db48.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.154-1.git.1.148db48.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3906" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.x86_64", "7Server-RH7-RHOSE-3.11:cockpit-0:195-2.rhaos.el7.src", "7Server-RH7-RHOSE-3.11:cockpit-debuginfo-0:195-2.rhaos.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.11:cockpit-kubernetes-0:195-2.rhaos.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.src", "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.src", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-debuginfo-0:0.2.0-2.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-debuginfo-0:0.2.0-2.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.src", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.src", "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-provisioner-debuginfo-0:0.2.0-3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-provisioner-debuginfo-0:0.2.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.154-1.git.1.bc9f224.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.154-1.git.1.148db48.el7.src", "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.src", "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.ppc64le", "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.src", "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.ppc64le", "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.src", "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.src", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-0:0.0.2-9.gitd3c94f0.el7.src", "7Server-RH7-RHOSE-3.11:openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.154-1.git.1.148db48.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.154-1.git.1.148db48.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.x86_64", "7Server-RH7-RHOSE-3.11:cockpit-0:195-2.rhaos.el7.src", "7Server-RH7-RHOSE-3.11:cockpit-debuginfo-0:195-2.rhaos.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.11:cockpit-kubernetes-0:195-2.rhaos.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.src", "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.src", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-debuginfo-0:0.2.0-2.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-debuginfo-0:0.2.0-2.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.src", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.src", "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-provisioner-debuginfo-0:0.2.0-3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-provisioner-debuginfo-0:0.2.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.154-1.git.1.bc9f224.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.154-1.git.1.148db48.el7.src", "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.src", "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.ppc64le", "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.src", "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.ppc64le", "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.src", "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.src", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-0:0.0.2-9.gitd3c94f0.el7.src", "7Server-RH7-RHOSE-3.11:openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.154-1.git.1.148db48.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.154-1.git.1.148db48.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-18T16:26:09+00:00", "details": "See the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_release_notes.html", "product_ids": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.x86_64", "7Server-RH7-RHOSE-3.11:cockpit-0:195-2.rhaos.el7.src", "7Server-RH7-RHOSE-3.11:cockpit-debuginfo-0:195-2.rhaos.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.11:cockpit-kubernetes-0:195-2.rhaos.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.src", "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.src", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-debuginfo-0:0.2.0-2.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-debuginfo-0:0.2.0-2.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.src", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.src", "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-provisioner-debuginfo-0:0.2.0-3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-provisioner-debuginfo-0:0.2.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.154-1.git.1.bc9f224.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.154-1.git.1.148db48.el7.src", "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.src", "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.ppc64le", "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.src", "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.ppc64le", "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.src", "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.src", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-0:0.0.2-9.gitd3c94f0.el7.src", "7Server-RH7-RHOSE-3.11:openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.154-1.git.1.148db48.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.154-1.git.1.148db48.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3906" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.x86_64", "7Server-RH7-RHOSE-3.11:cockpit-0:195-2.rhaos.el7.src", "7Server-RH7-RHOSE-3.11:cockpit-debuginfo-0:195-2.rhaos.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.11:cockpit-kubernetes-0:195-2.rhaos.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.src", "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.src", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-debuginfo-0:0.2.0-2.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-debuginfo-0:0.2.0-2.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.src", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.src", "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-provisioner-debuginfo-0:0.2.0-3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-provisioner-debuginfo-0:0.2.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.154-1.git.1.bc9f224.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.154-1.git.1.148db48.el7.src", "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.src", "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.ppc64le", "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.src", "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.ppc64le", "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.src", "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.src", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-0:0.0.2-9.gitd3c94f0.el7.src", "7Server-RH7-RHOSE-3.11:openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.154-1.git.1.148db48.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.154-1.git.1.148db48.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" } ] }
RHSA-2019:4269
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the container-tools:rhel8 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.\n\nSecurity Fix(es):\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* runc: AppArmor/SELinux bypass with malicious image that specifies a volume at /proc (CVE-2019-16884)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* avc: podman run --security-opt label=type:svirt_qemu_net_t (BZ#1764318)\n\n* backport json-file logging support to 1.4.2 (BZ#1770176)\n\n* Selinux won\u0027t allow SCTP inter pod communication (BZ#1774382)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:4269", "url": "https://access.redhat.com/errata/RHSA-2019:4269" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1757214", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1757214" }, { "category": "external", "summary": "1764318", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764318" }, { "category": "external", "summary": "1770176", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770176" }, { "category": "external", "summary": "1774382", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774382" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_4269.json" } ], "title": "Red Hat Security Advisory: container-tools:rhel8 security and bug fix update", "tracking": { "current_release_date": "2025-03-15T19:44:52+00:00", "generator": { "date": "2025-03-15T19:44:52+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.1" } }, "id": "RHSA-2019:4269", "initial_release_date": "2019-12-17T12:56:53+00:00", "revision_history": [ { "date": "2019-12-17T12:56:53+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-12-17T12:56:53+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-03-15T19:44:52+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "container-tools:rhel8:8010020191126140055:c294d161", "product": { "name": "container-tools:rhel8:8010020191126140055:c294d161", "product_id": "container-tools:rhel8:8010020191126140055:c294d161", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/container-tools@rhel8:8010020191126140055:c294d161" } } }, { "category": "product_version", "name": "cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.noarch", "product": { "name": "cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.noarch", "product_id": "cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=noarch" } } }, { "category": "product_version", "name": "container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.noarch", "product": { "name": "container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.noarch", "product_id": "container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4900%2B9d7326b8?arch=noarch\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-docker-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "product": { "name": "podman-docker-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "product_id": "podman-docker-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4830%2Bf49150d7?arch=noarch" } } }, { "category": "product_version", "name": "podman-manpages-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "product": { "name": "podman-manpages-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "product_id": "podman-manpages-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4830%2Bf49150d7?arch=noarch" } } }, { "category": "product_version", "name": "python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.noarch", "product": { "name": "python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.noarch", "product_id": "python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.src", "product": { "name": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.src", "product_id": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4240%2B893c1ab8?arch=src" } } }, { "category": "product_version", "name": "cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.src", "product": { "name": "cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.src", "product_id": "cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=src" } } }, { "category": "product_version", "name": "container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.src", "product": { "name": "container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.src", "product_id": "container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4900%2B9d7326b8?arch=src\u0026epoch=2" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.src", "product": { "name": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.src", "product_id": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4881%2B045289ee?arch=src" } } }, { "category": "product_version", "name": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.src", "product": { "name": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.src", "product_id": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=src" } } }, { "category": "product_version", "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.src", "product": { "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.src", "product_id": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.src", "product": { "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.src", "product_id": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=src\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.src", "product": { "name": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.src", "product_id": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4830%2Bf49150d7?arch=src" } } }, { "category": "product_version", "name": "python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.src", "product": { "name": "python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.src", "product_id": "python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=src" } } }, { "category": "product_version", "name": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.src", "product": { "name": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.src", "product_id": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4873%2B4a24e241?arch=src" } } }, { "category": "product_version", "name": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.src", "product": { "name": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.src", "product_id": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4876%2Be678a192?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.src", "product": { "name": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.src", "product_id": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4306%2B1d917805?arch=src" } } }, { "category": "product_version", "name": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.src", "product": { "name": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.src", "product_id": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "product": { "name": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "product_id": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4240%2B893c1ab8?arch=x86_64" } } }, { "category": "product_version", "name": "buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "product": { "name": "buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "product_id": "buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4240%2B893c1ab8?arch=x86_64" } } }, { "category": "product_version", "name": "buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "product": { "name": "buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "product_id": "buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4240%2B893c1ab8?arch=x86_64" } } }, { "category": "product_version", "name": "buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "product": { "name": "buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "product_id": "buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4240%2B893c1ab8?arch=x86_64" } } }, { "category": "product_version", "name": "buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "product": { "name": "buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "product_id": "buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4240%2B893c1ab8?arch=x86_64" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "product": { "name": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "product_id": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4881%2B045289ee?arch=x86_64" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "product": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "product_id": "containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4881%2B045289ee?arch=x86_64" } } }, { "category": "product_version", "name": "containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "product": { "name": "containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "product_id": "containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4881%2B045289ee?arch=x86_64" } } }, { "category": "product_version", "name": "containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "product": { "name": "containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "product_id": "containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4876%2Be678a192?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "product": { "name": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "product_id": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=x86_64" } } }, { "category": "product_version", "name": "fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "product": { "name": "fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "product_id": "fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=x86_64" } } }, { "category": "product_version", "name": "fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "product": { "name": "fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "product_id": "fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=x86_64" } } }, { "category": "product_version", "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "product": { "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "product_id": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "product": { "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "product_id": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "product": { "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "product_id": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "product": { "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "product_id": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "product": { "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "product_id": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "product": { "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "product_id": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "product": { "name": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "product_id": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4830%2Bf49150d7?arch=x86_64" } } }, { "category": "product_version", "name": "podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "product": { "name": "podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "product_id": "podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4830%2Bf49150d7?arch=x86_64" } } }, { "category": "product_version", "name": "podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "product": { "name": "podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "product_id": "podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4830%2Bf49150d7?arch=x86_64" } } }, { "category": "product_version", "name": "podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "product": { "name": "podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "product_id": "podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4830%2Bf49150d7?arch=x86_64" } } }, { "category": "product_version", "name": "podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "product": { "name": "podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "product_id": "podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4830%2Bf49150d7?arch=x86_64" } } }, { "category": "product_version", "name": "podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "product": { "name": "podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "product_id": "podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4830%2Bf49150d7?arch=x86_64" } } }, { "category": "product_version", "name": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "product": { "name": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "product_id": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4873%2B4a24e241?arch=x86_64" } } }, { "category": "product_version", "name": "runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "product": { "name": "runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "product_id": "runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4873%2B4a24e241?arch=x86_64" } } }, { "category": "product_version", "name": "runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "product": { "name": "runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "product_id": "runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4873%2B4a24e241?arch=x86_64" } } }, { "category": "product_version", "name": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "product": { "name": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "product_id": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4876%2Be678a192?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "product": { "name": "skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "product_id": "skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4876%2Be678a192?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "product": { "name": "skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "product_id": "skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4876%2Be678a192?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "product": { "name": "skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "product_id": "skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4876%2Be678a192?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "product": { "name": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "product_id": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4306%2B1d917805?arch=x86_64" } } }, { "category": "product_version", "name": "slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "product": { "name": "slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "product_id": "slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4306%2B1d917805?arch=x86_64" } } }, { "category": "product_version", "name": "slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "product": { "name": "slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "product_id": "slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4306%2B1d917805?arch=x86_64" } } }, { "category": "product_version", "name": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.x86_64", "product": { "name": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.x86_64", "product_id": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "product": { "name": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "product_id": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4240%2B893c1ab8?arch=s390x" } } }, { "category": "product_version", "name": "buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "product": { "name": "buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "product_id": "buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4240%2B893c1ab8?arch=s390x" } } }, { "category": "product_version", "name": "buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "product": { "name": "buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "product_id": "buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4240%2B893c1ab8?arch=s390x" } } }, { "category": "product_version", "name": "buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "product": { "name": "buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "product_id": "buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4240%2B893c1ab8?arch=s390x" } } }, { "category": "product_version", "name": "buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "product": { "name": "buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "product_id": "buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4240%2B893c1ab8?arch=s390x" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "product": { "name": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "product_id": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4881%2B045289ee?arch=s390x" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "product": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "product_id": "containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4881%2B045289ee?arch=s390x" } } }, { "category": "product_version", "name": "containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "product": { "name": "containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "product_id": "containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4881%2B045289ee?arch=s390x" } } }, { "category": "product_version", "name": "containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "product": { "name": "containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "product_id": "containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4876%2Be678a192?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "product": { "name": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "product_id": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=s390x" } } }, { "category": "product_version", "name": "fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "product": { "name": "fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "product_id": "fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=s390x" } } }, { "category": "product_version", "name": "fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "product": { "name": "fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "product_id": "fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=s390x" } } }, { "category": "product_version", "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "product": { "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "product_id": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "product": { "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "product_id": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "product": { "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "product_id": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "product": { "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "product_id": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "product": { "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "product_id": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "product": { "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "product_id": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "product": { "name": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "product_id": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4830%2Bf49150d7?arch=s390x" } } }, { "category": "product_version", "name": "podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "product": { "name": "podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "product_id": "podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4830%2Bf49150d7?arch=s390x" } } }, { "category": "product_version", "name": "podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "product": { "name": "podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "product_id": "podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4830%2Bf49150d7?arch=s390x" } } }, { "category": "product_version", "name": "podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "product": { "name": "podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "product_id": "podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4830%2Bf49150d7?arch=s390x" } } }, { "category": "product_version", "name": "podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "product": { "name": "podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "product_id": "podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4830%2Bf49150d7?arch=s390x" } } }, { "category": "product_version", "name": "podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "product": { "name": "podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "product_id": "podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4830%2Bf49150d7?arch=s390x" } } }, { "category": "product_version", "name": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "product": { "name": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "product_id": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4873%2B4a24e241?arch=s390x" } } }, { "category": "product_version", "name": "runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "product": { "name": "runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "product_id": "runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4873%2B4a24e241?arch=s390x" } } }, { "category": "product_version", "name": "runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "product": { "name": "runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "product_id": "runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4873%2B4a24e241?arch=s390x" } } }, { "category": "product_version", "name": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "product": { "name": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "product_id": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4876%2Be678a192?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "product": { "name": "skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "product_id": "skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4876%2Be678a192?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "product": { "name": "skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "product_id": "skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4876%2Be678a192?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "product": { "name": "skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "product_id": "skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4876%2Be678a192?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "product": { "name": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "product_id": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4306%2B1d917805?arch=s390x" } } }, { "category": "product_version", "name": "slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "product": { "name": "slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "product_id": "slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4306%2B1d917805?arch=s390x" } } }, { "category": "product_version", "name": "slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "product": { "name": "slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "product_id": "slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4306%2B1d917805?arch=s390x" } } }, { "category": "product_version", "name": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.s390x", "product": { "name": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.s390x", "product_id": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "product": { "name": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "product_id": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4240%2B893c1ab8?arch=ppc64le" } } }, { "category": "product_version", "name": "buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "product": { "name": "buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "product_id": "buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4240%2B893c1ab8?arch=ppc64le" } } }, { "category": "product_version", "name": "buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "product": { "name": "buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "product_id": "buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4240%2B893c1ab8?arch=ppc64le" } } }, { "category": "product_version", "name": "buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "product": { "name": "buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "product_id": "buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4240%2B893c1ab8?arch=ppc64le" } } }, { "category": "product_version", "name": "buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "product": { "name": "buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "product_id": "buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4240%2B893c1ab8?arch=ppc64le" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "product": { "name": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "product_id": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4881%2B045289ee?arch=ppc64le" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "product": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "product_id": "containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4881%2B045289ee?arch=ppc64le" } } }, { "category": "product_version", "name": "containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "product": { "name": "containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "product_id": "containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4881%2B045289ee?arch=ppc64le" } } }, { "category": "product_version", "name": "containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "product": { "name": "containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "product_id": "containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4876%2Be678a192?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "product": { "name": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "product_id": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=ppc64le" } } }, { "category": "product_version", "name": "fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "product": { "name": "fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "product_id": "fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=ppc64le" } } }, { "category": "product_version", "name": "fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "product": { "name": "fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "product_id": "fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=ppc64le" } } }, { "category": "product_version", "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "product": { "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "product_id": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "product": { "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "product_id": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "product": { "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "product_id": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "product": { "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "product_id": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "product": { "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "product_id": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "product": { "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "product_id": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "product": { "name": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "product_id": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4830%2Bf49150d7?arch=ppc64le" } } }, { "category": "product_version", "name": "podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "product": { "name": "podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "product_id": "podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4830%2Bf49150d7?arch=ppc64le" } } }, { "category": "product_version", "name": "podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "product": { "name": "podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "product_id": "podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4830%2Bf49150d7?arch=ppc64le" } } }, { "category": "product_version", "name": "podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "product": { "name": "podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "product_id": "podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4830%2Bf49150d7?arch=ppc64le" } } }, { "category": "product_version", "name": "podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "product": { "name": "podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "product_id": "podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4830%2Bf49150d7?arch=ppc64le" } } }, { "category": "product_version", "name": "podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "product": { "name": "podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "product_id": "podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4830%2Bf49150d7?arch=ppc64le" } } }, { "category": "product_version", "name": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "product": { "name": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "product_id": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4873%2B4a24e241?arch=ppc64le" } } }, { "category": "product_version", "name": "runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "product": { "name": "runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "product_id": "runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4873%2B4a24e241?arch=ppc64le" } } }, { "category": "product_version", "name": "runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "product": { "name": "runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "product_id": "runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4873%2B4a24e241?arch=ppc64le" } } }, { "category": "product_version", "name": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "product": { "name": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "product_id": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4876%2Be678a192?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "product": { "name": "skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "product_id": "skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4876%2Be678a192?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "product": { "name": "skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "product_id": "skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4876%2Be678a192?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "product": { "name": "skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "product_id": "skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4876%2Be678a192?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "product": { "name": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "product_id": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4306%2B1d917805?arch=ppc64le" } } }, { "category": "product_version", "name": "slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "product": { "name": "slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "product_id": "slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4306%2B1d917805?arch=ppc64le" } } }, { "category": "product_version", "name": "slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "product": { "name": "slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "product_id": "slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4306%2B1d917805?arch=ppc64le" } } }, { "category": "product_version", "name": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.ppc64le", "product": { "name": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.ppc64le", "product_id": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "product": { "name": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "product_id": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4240%2B893c1ab8?arch=aarch64" } } }, { "category": "product_version", "name": "buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "product": { "name": "buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "product_id": "buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4240%2B893c1ab8?arch=aarch64" } } }, { "category": "product_version", "name": "buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "product": { "name": "buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "product_id": "buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4240%2B893c1ab8?arch=aarch64" } } }, { "category": "product_version", "name": "buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "product": { "name": "buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "product_id": "buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4240%2B893c1ab8?arch=aarch64" } } }, { "category": "product_version", "name": "buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "product": { "name": "buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "product_id": "buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4240%2B893c1ab8?arch=aarch64" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "product": { "name": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "product_id": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4881%2B045289ee?arch=aarch64" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "product": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "product_id": "containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4881%2B045289ee?arch=aarch64" } } }, { "category": "product_version", "name": "containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "product": { "name": "containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "product_id": "containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4881%2B045289ee?arch=aarch64" } } }, { "category": "product_version", "name": "containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "product": { "name": "containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "product_id": "containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4876%2Be678a192?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "product": { "name": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "product_id": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=aarch64" } } }, { "category": "product_version", "name": "fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "product": { "name": "fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "product_id": "fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=aarch64" } } }, { "category": "product_version", "name": "fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "product": { "name": "fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "product_id": "fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=aarch64" } } }, { "category": "product_version", "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "product": { "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "product_id": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "product": { "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "product_id": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "product": { "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "product_id": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "product": { "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "product_id": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "product": { "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "product_id": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "product": { "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "product_id": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "product": { "name": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "product_id": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4830%2Bf49150d7?arch=aarch64" } } }, { "category": "product_version", "name": "podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "product": { "name": "podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "product_id": "podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4830%2Bf49150d7?arch=aarch64" } } }, { "category": "product_version", "name": "podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "product": { "name": "podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "product_id": "podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4830%2Bf49150d7?arch=aarch64" } } }, { "category": "product_version", "name": "podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "product": { "name": "podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "product_id": "podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4830%2Bf49150d7?arch=aarch64" } } }, { "category": "product_version", "name": "podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "product": { "name": "podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "product_id": "podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4830%2Bf49150d7?arch=aarch64" } } }, { "category": "product_version", "name": "podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "product": { "name": "podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "product_id": "podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4830%2Bf49150d7?arch=aarch64" } } }, { "category": "product_version", "name": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "product": { "name": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "product_id": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4873%2B4a24e241?arch=aarch64" } } }, { "category": "product_version", "name": "runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "product": { "name": "runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "product_id": "runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4873%2B4a24e241?arch=aarch64" } } }, { "category": "product_version", "name": "runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "product": { "name": "runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "product_id": "runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4873%2B4a24e241?arch=aarch64" } } }, { "category": "product_version", "name": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "product": { "name": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "product_id": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4876%2Be678a192?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "product": { "name": "skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "product_id": "skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4876%2Be678a192?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "product": { "name": "skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "product_id": "skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4876%2Be678a192?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "product": { "name": "skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "product_id": "skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4876%2Be678a192?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "product": { "name": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "product_id": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4306%2B1d917805?arch=aarch64" } } }, { "category": "product_version", "name": "slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "product": { "name": "slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "product_id": "slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4306%2B1d917805?arch=aarch64" } } }, { "category": "product_version", "name": "slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "product": { "name": "slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "product_id": "slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4306%2B1d917805?arch=aarch64" } } }, { "category": "product_version", "name": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.aarch64", "product": { "name": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.aarch64", "product_id": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4081%2Bb29780af?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, "product_reference": "container-tools:rhel8:8010020191126140055:c294d161", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64" }, "product_reference": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le" }, "product_reference": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x" }, "product_reference": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.src as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.src" }, "product_reference": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64" }, "product_reference": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64" }, "product_reference": "buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le" }, "product_reference": "buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x" }, "product_reference": "buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64" }, "product_reference": "buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64" }, "product_reference": "buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le" }, "product_reference": "buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x" }, "product_reference": "buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64" }, "product_reference": "buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64" }, "product_reference": "buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le" }, "product_reference": "buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x" }, "product_reference": "buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64" }, "product_reference": "buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64" }, "product_reference": "buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le" }, "product_reference": "buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x" }, "product_reference": "buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64" }, "product_reference": "buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.noarch as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.noarch" }, "product_reference": "cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.src as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.src" }, "product_reference": "cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.noarch as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.noarch" }, "product_reference": "container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.src as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.src" }, "product_reference": "container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64" }, "product_reference": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le" }, "product_reference": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x" }, "product_reference": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.src as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.src" }, "product_reference": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64" }, "product_reference": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64" }, "product_reference": "containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le" }, "product_reference": "containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x" }, "product_reference": "containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64" }, "product_reference": "containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64" }, "product_reference": "containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le" }, "product_reference": "containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x" }, "product_reference": "containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64" }, "product_reference": "containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64" }, "product_reference": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le" }, "product_reference": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x" }, "product_reference": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.src as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.src" }, "product_reference": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64" }, "product_reference": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64" }, "product_reference": "fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le" }, "product_reference": "fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x" }, "product_reference": "fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64" }, "product_reference": "fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64" }, "product_reference": "fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le" }, "product_reference": "fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x" }, "product_reference": "fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64" }, "product_reference": "fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64" }, "product_reference": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le" }, "product_reference": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x" }, "product_reference": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.src as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.src" }, "product_reference": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64" }, "product_reference": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64" }, "product_reference": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le" }, "product_reference": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x" }, "product_reference": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64" }, "product_reference": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64" }, "product_reference": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le" }, "product_reference": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x" }, "product_reference": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64" }, "product_reference": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64" }, "product_reference": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le" }, "product_reference": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x" }, "product_reference": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.src as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.src" }, "product_reference": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64" }, "product_reference": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64" }, "product_reference": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le" }, "product_reference": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x" }, "product_reference": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64" }, "product_reference": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64" }, "product_reference": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le" }, "product_reference": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x" }, "product_reference": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64" }, "product_reference": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64" }, "product_reference": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le" }, "product_reference": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x" }, "product_reference": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.src as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.src" }, "product_reference": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64" }, "product_reference": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64" }, "product_reference": "podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le" }, "product_reference": "podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x" }, "product_reference": "podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64" }, "product_reference": "podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64" }, "product_reference": "podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le" }, "product_reference": "podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x" }, "product_reference": "podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64" }, "product_reference": "podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-docker-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-docker-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch" }, "product_reference": "podman-docker-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-manpages-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-manpages-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch" }, "product_reference": "podman-manpages-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64" }, "product_reference": "podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le" }, "product_reference": "podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x" }, "product_reference": "podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64" }, "product_reference": "podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64" }, "product_reference": "podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le" }, "product_reference": "podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x" }, "product_reference": "podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64" }, "product_reference": "podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64" }, "product_reference": "podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le" }, "product_reference": "podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x" }, "product_reference": "podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64" }, "product_reference": "podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.noarch as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.noarch" }, "product_reference": "python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.src as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.src" }, "product_reference": "python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64" }, "product_reference": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le" }, "product_reference": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x" }, "product_reference": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.src as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.src" }, "product_reference": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64" }, "product_reference": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64" }, "product_reference": "runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le" }, "product_reference": "runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x" }, "product_reference": "runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64" }, "product_reference": "runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64" }, "product_reference": "runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le" }, "product_reference": "runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x" }, "product_reference": "runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64" }, "product_reference": "runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64" }, "product_reference": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le" }, "product_reference": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x" }, "product_reference": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.src as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.src" }, "product_reference": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64" }, "product_reference": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64" }, "product_reference": "skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le" }, "product_reference": "skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x" }, "product_reference": "skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64" }, "product_reference": "skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64" }, "product_reference": "skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le" }, "product_reference": "skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x" }, "product_reference": "skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64" }, "product_reference": "skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64" }, "product_reference": "skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le" }, "product_reference": "skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x" }, "product_reference": "skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64" }, "product_reference": "skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64" }, "product_reference": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le" }, "product_reference": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x" }, "product_reference": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.src as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.src" }, "product_reference": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64" }, "product_reference": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64" }, "product_reference": "slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le" }, "product_reference": "slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x" }, "product_reference": "slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64" }, "product_reference": "slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64" }, "product_reference": "slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le" }, "product_reference": "slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x" }, "product_reference": "slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64" }, "product_reference": "slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.aarch64" }, "product_reference": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.ppc64le" }, "product_reference": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.s390x" }, "product_reference": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.src as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.src" }, "product_reference": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.x86_64" }, "product_reference": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-docker-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-manpages-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-17T12:56:53+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-docker-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-manpages-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4269" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-docker-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-manpages-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-docker-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-manpages-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-17T12:56:53+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-docker-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-manpages-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4269" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-docker-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-manpages-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "cve": "CVE-2019-16884", "cwe": { "id": "CWE-41", "name": "Improper Resolution of Path Equivalence" }, "discovery_date": "2019-09-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1757214" } ], "notes": [ { "category": "description", "text": "runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other products, allows AppArmor restriction bypass because libcontainer/rootfs_linux.go incorrectly checks mount targets, and thus a malicious Docker image can mount over a /proc directory.", "title": "Vulnerability description" }, { "category": "summary", "text": "runc: AppArmor/SELinux bypass with malicious image that specifies a volume at /proc", "title": "Vulnerability summary" }, { "category": "other", "text": "The AppArmor security module is not supported by Red Hat, on the other hand the flaw also affects SELinux based distributions like Red Hat Enterprise Linux.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-docker-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-manpages-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-16884" }, { "category": "external", "summary": "RHBZ#1757214", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1757214" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16884", "url": "https://www.cve.org/CVERecord?id=CVE-2019-16884" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16884", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16884" } ], "release_date": "2019-09-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-17T12:56:53+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-docker-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-manpages-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4269" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N", "version": "3.0" }, "products": [ "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-docker-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-manpages-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "runc: AppArmor/SELinux bypass with malicious image that specifies a volume at /proc" }, { "cve": "CVE-2019-18466", "cwe": { "id": "CWE-59", "name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)" }, "discovery_date": "2019-08-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1744588" } ], "notes": [ { "category": "description", "text": "It was discovered that podman resolves a symlink in the host context during a copy operation from the container to the host. An attacker could create a container image containing particular symlinks that, when copied by a victim user to the host filesystem, may overwrite existing files with others from the host.", "title": "Vulnerability description" }, { "category": "summary", "text": "podman: resolving symlink in host filesystem leads to unexpected results of copy operation", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of podman as shipped with Red Hat Enterprise Linux 8 as they did not include support for the copy function.\n\nThis issue did not affect the versions of podman as shipped in OpenShift Container Platform 3.11 and 4.1 as they did not include support for the copy function.\n\nThe version of podman shipped in OpenShift Container Platform 4.2 was superseded by the version delivered Red Hat Enterprise Linux 8.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-docker-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-manpages-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-18466" }, { "category": "external", "summary": "RHBZ#1744588", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1744588" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-18466", "url": "https://www.cve.org/CVERecord?id=CVE-2019-18466" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-18466", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-18466" } ], "release_date": "2019-08-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-17T12:56:53+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-docker-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-manpages-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4269" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-docker-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-manpages-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "podman: resolving symlink in host filesystem leads to unexpected results of copy operation" } ] }
RHSA-2019:4042
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "New Red Hat Single Sign-On 7.3.5 packages are now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Single Sign-On 7.3 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications.\n\nThis release of Red Hat Single Sign-On 7.3.5 on RHEL 8 serves as a replacement for Red Hat Single Sign-On 7.3.4, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* keycloak: Service accounts reset password flow not using placeholder.org domain anymore (CVE-2019-14837)\n\n* undertow: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* undertow: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* undertow: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default (CVE-2019-14838)\n\n* wildfly: wildfly-security-manager: security manager authorization bypass (CVE-2019-14843)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:4042", "url": "https://access.redhat.com/errata/RHSA-2019:4042" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.3/", "url": "https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.3/" }, { "category": "external", "summary": "1730227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1730227" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1751227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751227" }, { "category": "external", "summary": "1752980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752980" }, { "category": "external", "summary": "KEYCLOAK-11817", "url": "https://issues.redhat.com/browse/KEYCLOAK-11817" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_4042.json" } ], "title": "Red Hat Security Advisory: Red Hat Single Sign-On 7.3.5 security update on RHEL 8", "tracking": { "current_release_date": "2025-03-15T19:44:42+00:00", "generator": { "date": "2025-03-15T19:44:42+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.1" } }, "id": "RHSA-2019:4042", "initial_release_date": "2019-12-02T17:04:50+00:00", "revision_history": [ { "date": "2019-12-02T17:04:50+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-12-02T17:04:50+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-03-15T19:44:42+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Single Sign-On 7.3 for RHEL 8", "product": { "name": "Red Hat Single Sign-On 7.3 for RHEL 8", "product_id": "8Base-RHSSO-7.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:red_hat_single_sign_on:7::el8" } } } ], "category": "product_family", "name": "Red Hat Single Sign-On" }, { "branches": [ { "category": "product_version", "name": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "product": { "name": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "product_id": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8sso?arch=noarch" } } }, { "category": "product_version", "name": "rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "product": { "name": "rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "product_id": "rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8sso?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "product": { "name": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "product_id": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8sso?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch as a component of Red Hat Single Sign-On 7.3 for RHEL 8", "product_id": "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" }, "product_reference": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "relates_to_product_reference": "8Base-RHSSO-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src as a component of Red Hat Single Sign-On 7.3 for RHEL 8", "product_id": "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src" }, "product_reference": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "relates_to_product_reference": "8Base-RHSSO-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch as a component of Red Hat Single Sign-On 7.3 for RHEL 8", "product_id": "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" }, "product_reference": "rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "relates_to_product_reference": "8Base-RHSSO-7.3" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:04:50+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4042" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:04:50+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4042" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:04:50+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4042" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "Vadim Ashikhman" ] } ], "cve": "CVE-2019-14837", "cwe": { "id": "CWE-547", "name": "Use of Hard-coded, Security-relevant Constants" }, "discovery_date": "2019-07-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1730227" } ], "notes": [ { "category": "description", "text": "A flaw was found in Keycloak. The use of an open hard-coded domain can allow an unauthorized login by setting up a mail server and resetting the user credentials, enabling information disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak: keycloak uses hardcoded open dummy domain for new accounts enabling information disclosure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14837" }, { "category": "external", "summary": "RHBZ#1730227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1730227" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14837", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14837" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14837", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14837" } ], "release_date": "2019-12-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:04:50+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4042" }, { "category": "workaround", "details": "It is not a very straight forward workaround but it is possible to mitigate this by manually editing the default Email ID ([email protected]) to some valid email ID ([email protected]) in the USER_ENTITY table in the RHSSO database used.", "product_ids": [ "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "keycloak: keycloak uses hardcoded open dummy domain for new accounts enabling information disclosure" }, { "acknowledgments": [ { "names": [ "F\u00e1bio Magalh\u00e3es de Andrade" ], "organization": "Sonda Ativas" }, { "names": [ "Juliano de Castro Santos", "Leonard Lunardi" ], "organization": "UnimedBH" } ], "cve": "CVE-2019-14838", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2019-08-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1751227" } ], "notes": [ { "category": "description", "text": "It was found that Wildfly users had default user permissions set incorrectly. A malicious user could use this flaw to access unauthorized controls for the application server.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14838" }, { "category": "external", "summary": "RHBZ#1751227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751227" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14838", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14838" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14838", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14838" }, { "category": "external", "summary": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14838", "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14838" } ], "release_date": "2019-10-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:04:50+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4042" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default" }, { "cve": "CVE-2019-14843", "cwe": { "id": "CWE-592", "name": "CWE-592" }, "discovery_date": "2019-09-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1752980" } ], "notes": [ { "category": "description", "text": "A flaw was found in Wildfly Security Manager, running under JDK 11 or 8, that authorized requests for any requester. This flaw could be used by a malicious app deployed on the app server to access unauthorized information and possibly conduct further attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-security-manager: security manager authorization bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14843" }, { "category": "external", "summary": "RHBZ#1752980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752980" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14843", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14843" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14843", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14843" } ], "release_date": "2019-09-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:04:50+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4042" }, { "category": "workaround", "details": "This flaw only affects the Security Manager running under JDK 11 or 8. To mitigate exposure to this flaw, do not run under those JDK versions.", "product_ids": [ "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "wildfly-security-manager: security manager authorization bypass" } ] }
RHSA-2019:4045
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "A security update is now available for Red Hat Single Sign-On 7.3 from the Customer Portal.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Single Sign-On 7.3 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications.\n\nThis release of Red Hat Single Sign-On 7.3.5 serves as a replacement for Red Hat Single Sign-On 7.2.6, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* keycloak: Service accounts reset password flow not using placeholder.org domain anymore (CVE-2019-14837)\n\n* undertow: HTTP/2: flood using PING frames results in unbounded memory growth\n(CVE-2019-9512)\n\n* undertow: HTTP/2: flood using HEADERS frames results in unbounded memory\ngrowth (CVE-2019-9514)\n\n* undertow: HTTP/2: flood using SETTINGS frames results in unbounded memory\ngrowth (CVE-2019-9515)\n\n* wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027\nuser by default (CVE-2019-14838)\n\n* wildfly: wildfly-security-manager: security manager authorization bypass\n(CVE-2019-14843)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:4045", "url": "https://access.redhat.com/errata/RHSA-2019:4045" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.rhsso\u0026downloadType=securityPatches\u0026version=7.3", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.rhsso\u0026downloadType=securityPatches\u0026version=7.3" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.3/", "url": "https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.3/" }, { "category": "external", "summary": "1730227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1730227" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1751227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751227" }, { "category": "external", "summary": "1752980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752980" }, { "category": "external", "summary": "KEYCLOAK-11792", "url": "https://issues.redhat.com/browse/KEYCLOAK-11792" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_4045.json" } ], "title": "Red Hat Security Advisory: Red Hat Single Sign-On 7.3.5 security update", "tracking": { "current_release_date": "2025-03-15T19:44:47+00:00", "generator": { "date": "2025-03-15T19:44:47+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.1" } }, "id": "RHSA-2019:4045", "initial_release_date": "2019-12-02T17:21:07+00:00", "revision_history": [ { "date": "2019-12-02T17:21:07+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-12-02T17:21:07+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-03-15T19:44:47+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Single Sign-On 7.3", "product": { "name": "Red Hat Single Sign-On 7.3", "product_id": "Red Hat Single Sign-On 7.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_single_sign_on:7.3" } } } ], "category": "product_family", "name": "Red Hat Single Sign-On" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Single Sign-On 7.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:21:07+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Single Sign-On 7.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4045" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Single Sign-On 7.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Single Sign-On 7.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:21:07+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Single Sign-On 7.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4045" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Single Sign-On 7.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Single Sign-On 7.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:21:07+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Single Sign-On 7.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4045" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Single Sign-On 7.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "Vadim Ashikhman" ] } ], "cve": "CVE-2019-14837", "cwe": { "id": "CWE-547", "name": "Use of Hard-coded, Security-relevant Constants" }, "discovery_date": "2019-07-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1730227" } ], "notes": [ { "category": "description", "text": "A flaw was found in Keycloak. The use of an open hard-coded domain can allow an unauthorized login by setting up a mail server and resetting the user credentials, enabling information disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak: keycloak uses hardcoded open dummy domain for new accounts enabling information disclosure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Single Sign-On 7.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14837" }, { "category": "external", "summary": "RHBZ#1730227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1730227" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14837", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14837" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14837", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14837" } ], "release_date": "2019-12-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:21:07+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Single Sign-On 7.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4045" }, { "category": "workaround", "details": "It is not a very straight forward workaround but it is possible to mitigate this by manually editing the default Email ID ([email protected]) to some valid email ID ([email protected]) in the USER_ENTITY table in the RHSSO database used.", "product_ids": [ "Red Hat Single Sign-On 7.3" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "Red Hat Single Sign-On 7.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "keycloak: keycloak uses hardcoded open dummy domain for new accounts enabling information disclosure" }, { "acknowledgments": [ { "names": [ "F\u00e1bio Magalh\u00e3es de Andrade" ], "organization": "Sonda Ativas" }, { "names": [ "Juliano de Castro Santos", "Leonard Lunardi" ], "organization": "UnimedBH" } ], "cve": "CVE-2019-14838", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2019-08-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1751227" } ], "notes": [ { "category": "description", "text": "It was found that Wildfly users had default user permissions set incorrectly. A malicious user could use this flaw to access unauthorized controls for the application server.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Single Sign-On 7.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14838" }, { "category": "external", "summary": "RHBZ#1751227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751227" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14838", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14838" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14838", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14838" }, { "category": "external", "summary": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14838", "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14838" } ], "release_date": "2019-10-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:21:07+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Single Sign-On 7.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4045" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "Red Hat Single Sign-On 7.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default" }, { "cve": "CVE-2019-14843", "cwe": { "id": "CWE-592", "name": "CWE-592" }, "discovery_date": "2019-09-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1752980" } ], "notes": [ { "category": "description", "text": "A flaw was found in Wildfly Security Manager, running under JDK 11 or 8, that authorized requests for any requester. This flaw could be used by a malicious app deployed on the app server to access unauthorized information and possibly conduct further attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-security-manager: security manager authorization bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Single Sign-On 7.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14843" }, { "category": "external", "summary": "RHBZ#1752980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752980" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14843", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14843" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14843", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14843" } ], "release_date": "2019-09-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:21:07+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Single Sign-On 7.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4045" }, { "category": "workaround", "details": "This flaw only affects the Security Manager running under JDK 11 or 8. To mitigate exposure to this flaw, do not run under those JDK versions.", "product_ids": [ "Red Hat Single Sign-On 7.3" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat Single Sign-On 7.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "wildfly-security-manager: security manager authorization bypass" } ] }
rhsa-2020_2565
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "This is a security update for JBoss EAP Continuous Delivery 18.0.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Enterprise Application Platform CD18 is a platform for Java applications based on the WildFly application runtime.\n\nThis release of Red Hat JBoss Enterprise Application Platform CD18 includes bug fixes and enhancements. \n\nSecurity Fix(es):\n\n* jackson-databind: Serialization gadgets in org.springframework:spring-aop (CVE-2020-11619)\n* jackson-databind: Serialization gadgets in commons-jelly:commons-jelly (CVE-2020-11620)\n* wildfly: Race condition on PID file allows for termination of arbitrary processes by local users (CVE-2019-3805)\n* undertow: HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511)\n* undertow: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n* undertow: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n* undertow: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n* wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default (CVE-2019-14838)\n* undertow: Memory Leak in Undertow HttpOpenListener due to holding remoting connections indefinitely (CVE-2019-19343)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:2565", "url": "https://access.redhat.com/errata/RHSA-2020:2565" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1660263", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1660263" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "1751227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751227" }, { "category": "external", "summary": "1780445", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1780445" }, { "category": "external", "summary": "1826798", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1826798" }, { "category": "external", "summary": "1826805", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1826805" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_2565.json" } ], "title": "Red Hat Security Advisory: EAP Continuous Delivery Technical Preview Release 18 security update", "tracking": { "current_release_date": "2024-11-15T08:31:57+00:00", "generator": { "date": "2024-11-15T08:31:57+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2020:2565", "initial_release_date": "2020-06-15T16:17:24+00:00", "revision_history": [ { "date": "2020-06-15T16:17:24+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-06-15T16:17:24+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T08:31:57+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform Continuous Delivery", "product": { "name": "Red Hat JBoss Enterprise Application Platform Continuous Delivery", "product_id": "Red Hat JBoss Enterprise Application Platform Continuous Delivery", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform_cd:18" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Daniel Le Gall" ], "organization": "SCRT Information Security" } ], "cve": "CVE-2019-3805", "cwe": { "id": "CWE-364", "name": "Signal Handler Race Condition" }, "discovery_date": "2018-11-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1660263" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in wildfly that would allow local users, who are able to execute init.d script, to terminate arbitrary processes on the system. An attacker could exploit this by modifying the PID file in /var/run/jboss-eap/ allowing the init.d script to terminate any process as root.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly: Race condition on PID file allows for termination of arbitrary processes by local users", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-3805" }, { "category": "external", "summary": "RHBZ#1660263", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1660263" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-3805", "url": "https://www.cve.org/CVERecord?id=CVE-2019-3805" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3805", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3805" } ], "release_date": "2019-04-30T17:12:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-15T16:17:24+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nYou must restart the JBoss server process for the update to take effect.\n\nThe References section of this erratum contains a download link (you must log in to download the update)", "product_ids": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2565" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wildfly: Race condition on PID file allows for termination of arbitrary processes by local users" }, { "cve": "CVE-2019-9511", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741860" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker can request a large amount of data by manipulating window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this queue can consume excess CPU, memory, or both, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: large amount of data requests leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "There are no mitigations available for nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "RHBZ#1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9511", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-15T16:17:24+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nYou must restart the JBoss server process for the update to take effect.\n\nThe References section of this erratum contains a download link (you must log in to download the update)", "product_ids": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2565" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: large amount of data requests leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-15T16:17:24+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nYou must restart the JBoss server process for the update to take effect.\n\nThe References section of this erratum contains a download link (you must log in to download the update)", "product_ids": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2565" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-15T16:17:24+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nYou must restart the JBoss server process for the update to take effect.\n\nThe References section of this erratum contains a download link (you must log in to download the update)", "product_ids": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2565" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-15T16:17:24+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nYou must restart the JBoss server process for the update to take effect.\n\nThe References section of this erratum contains a download link (you must log in to download the update)", "product_ids": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2565" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "F\u00e1bio Magalh\u00e3es de Andrade" ], "organization": "Sonda Ativas" }, { "names": [ "Juliano de Castro Santos", "Leonard Lunardi" ], "organization": "UnimedBH" } ], "cve": "CVE-2019-14838", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2019-08-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1751227" } ], "notes": [ { "category": "description", "text": "It was found that Wildfly users had default user permissions set incorrectly. A malicious user could use this flaw to access unauthorized controls for the application server.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14838" }, { "category": "external", "summary": "RHBZ#1751227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751227" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14838", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14838" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14838", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14838" }, { "category": "external", "summary": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14838", "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14838" } ], "release_date": "2019-10-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-15T16:17:24+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nYou must restart the JBoss server process for the update to take effect.\n\nThe References section of this erratum contains a download link (you must log in to download the update)", "product_ids": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2565" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default" }, { "cve": "CVE-2019-19343", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-12-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1780445" } ], "notes": [ { "category": "description", "text": "A flaw was found in Undertow when using Remoting as shipped in Red Hat Jboss EAP before version 7.2.4. A memory leak in HttpOpenListener due to holding remote connections indefinitely may lead to denial of service. Versions before undertow 2.0.25.SP1 and jboss-remoting 5.0.14.SP1 are believed to be vulnerable.", "title": "Vulnerability description" }, { "category": "summary", "text": "Undertow: Memory Leak in Undertow HttpOpenListener due to holding remoting connections indefinitely", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19343" }, { "category": "external", "summary": "RHBZ#1780445", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1780445" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19343", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19343" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19343", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19343" } ], "release_date": "2019-12-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-15T16:17:24+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nYou must restart the JBoss server process for the update to take effect.\n\nThe References section of this erratum contains a download link (you must log in to download the update)", "product_ids": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2565" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Undertow: Memory Leak in Undertow HttpOpenListener due to holding remoting connections indefinitely" }, { "cve": "CVE-2020-11619", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-04-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1826805" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.springframework:spring-aop", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11619" }, { "category": "external", "summary": "RHBZ#1826805", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1826805" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11619", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11619" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11619", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11619" } ], "release_date": "2020-04-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-15T16:17:24+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nYou must restart the JBoss server process for the update to take effect.\n\nThe References section of this erratum contains a download link (you must log in to download the update)", "product_ids": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2565" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in org.springframework:spring-aop" }, { "cve": "CVE-2020-11620", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-04-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1826798" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in commons-jelly:commons-jelly", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11620" }, { "category": "external", "summary": "RHBZ#1826798", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1826798" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11620", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11620" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11620", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11620" } ], "release_date": "2020-04-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-15T16:17:24+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nYou must restart the JBoss server process for the update to take effect.\n\nThe References section of this erratum contains a download link (you must log in to download the update)", "product_ids": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2565" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in commons-jelly:commons-jelly" } ] }
rhsa-2019_4021
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat JBoss Enterprise Application Platform 7.2.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime.\n\nThis release of Red Hat JBoss Enterprise Application Platform 7.2.5 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.2.4, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.2.5 Release Notes for information about the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* undertow: HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511)\n\n* undertow: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* undertow: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* undertow: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default (CVE-2019-14838)\n\n* wildfly: wildfly-security-manager: security manager authorization bypass (CVE-2019-14843)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:4021", "url": "https://access.redhat.com/errata/RHSA-2019:4021" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform\u0026downloadType=securityPatches\u0026version=7.2", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform\u0026downloadType=securityPatches\u0026version=7.2" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/", "url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/html-single/installation_guide/", "url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/html-single/installation_guide/" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "1751227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751227" }, { "category": "external", "summary": "1752980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752980" }, { "category": "external", "summary": "JBEAP-17075", "url": "https://issues.redhat.com/browse/JBEAP-17075" }, { "category": "external", "summary": "JBEAP-17220", "url": "https://issues.redhat.com/browse/JBEAP-17220" }, { "category": "external", "summary": "JBEAP-17365", "url": "https://issues.redhat.com/browse/JBEAP-17365" }, { "category": "external", "summary": "JBEAP-17476", "url": "https://issues.redhat.com/browse/JBEAP-17476" }, { "category": "external", "summary": "JBEAP-17478", "url": "https://issues.redhat.com/browse/JBEAP-17478" }, { "category": "external", "summary": "JBEAP-17483", "url": "https://issues.redhat.com/browse/JBEAP-17483" }, { "category": "external", "summary": "JBEAP-17495", "url": "https://issues.redhat.com/browse/JBEAP-17495" }, { "category": "external", "summary": "JBEAP-17496", "url": "https://issues.redhat.com/browse/JBEAP-17496" }, { "category": "external", "summary": "JBEAP-17513", "url": "https://issues.redhat.com/browse/JBEAP-17513" }, { "category": "external", "summary": "JBEAP-17521", "url": "https://issues.redhat.com/browse/JBEAP-17521" }, { "category": "external", "summary": "JBEAP-17523", "url": "https://issues.redhat.com/browse/JBEAP-17523" }, { "category": "external", "summary": "JBEAP-17547", "url": "https://issues.redhat.com/browse/JBEAP-17547" }, { "category": "external", "summary": "JBEAP-17548", "url": "https://issues.redhat.com/browse/JBEAP-17548" }, { "category": "external", "summary": "JBEAP-17560", "url": "https://issues.redhat.com/browse/JBEAP-17560" }, { "category": "external", "summary": "JBEAP-17579", "url": "https://issues.redhat.com/browse/JBEAP-17579" }, { "category": "external", "summary": "JBEAP-17582", "url": "https://issues.redhat.com/browse/JBEAP-17582" }, { "category": "external", "summary": "JBEAP-17631", "url": "https://issues.redhat.com/browse/JBEAP-17631" }, { "category": "external", "summary": "JBEAP-17647", "url": "https://issues.redhat.com/browse/JBEAP-17647" }, { "category": "external", "summary": "JBEAP-17665", "url": "https://issues.redhat.com/browse/JBEAP-17665" }, { "category": "external", "summary": "JBEAP-17722", "url": "https://issues.redhat.com/browse/JBEAP-17722" }, { "category": "external", "summary": "JBEAP-17874", "url": "https://issues.redhat.com/browse/JBEAP-17874" }, { "category": "external", "summary": "JBEAP-17880", "url": "https://issues.redhat.com/browse/JBEAP-17880" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_4021.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.5 security update", "tracking": { "current_release_date": "2024-11-15T04:13:34+00:00", "generator": { "date": "2024-11-15T04:13:34+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2019:4021", "initial_release_date": "2019-11-26T19:58:39+00:00", "revision_history": [ { "date": "2019-11-26T19:58:39+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-11-26T19:58:39+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T04:13:34+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss EAP 7.2", "product": { "name": "Red Hat JBoss EAP 7.2", "product_id": "Red Hat JBoss EAP 7.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:7.2" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-9511", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741860" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker can request a large amount of data by manipulating window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this queue can consume excess CPU, memory, or both, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: large amount of data requests leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "There are no mitigations available for nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss EAP 7.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "RHBZ#1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9511", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T19:58:39+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).\n\nThe JBoss server process must be restarted for the update to take effect.", "product_ids": [ "Red Hat JBoss EAP 7.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4021" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "Red Hat JBoss EAP 7.2" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss EAP 7.2" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: large amount of data requests leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss EAP 7.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T19:58:39+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).\n\nThe JBoss server process must be restarted for the update to take effect.", "product_ids": [ "Red Hat JBoss EAP 7.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4021" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss EAP 7.2" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss EAP 7.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T19:58:39+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).\n\nThe JBoss server process must be restarted for the update to take effect.", "product_ids": [ "Red Hat JBoss EAP 7.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4021" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss EAP 7.2" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss EAP 7.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T19:58:39+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).\n\nThe JBoss server process must be restarted for the update to take effect.", "product_ids": [ "Red Hat JBoss EAP 7.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4021" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss EAP 7.2" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "F\u00e1bio Magalh\u00e3es de Andrade" ], "organization": "Sonda Ativas" }, { "names": [ "Juliano de Castro Santos", "Leonard Lunardi" ], "organization": "UnimedBH" } ], "cve": "CVE-2019-14838", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2019-08-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1751227" } ], "notes": [ { "category": "description", "text": "It was found that Wildfly users had default user permissions set incorrectly. A malicious user could use this flaw to access unauthorized controls for the application server.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss EAP 7.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14838" }, { "category": "external", "summary": "RHBZ#1751227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751227" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14838", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14838" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14838", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14838" }, { "category": "external", "summary": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14838", "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14838" } ], "release_date": "2019-10-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T19:58:39+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).\n\nThe JBoss server process must be restarted for the update to take effect.", "product_ids": [ "Red Hat JBoss EAP 7.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4021" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss EAP 7.2" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default" }, { "cve": "CVE-2019-14843", "cwe": { "id": "CWE-592", "name": "CWE-592" }, "discovery_date": "2019-09-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1752980" } ], "notes": [ { "category": "description", "text": "A flaw was found in Wildfly Security Manager, running under JDK 11 or 8, that authorized requests for any requester. This flaw could be used by a malicious app deployed on the app server to access unauthorized information and possibly conduct further attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-security-manager: security manager authorization bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss EAP 7.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14843" }, { "category": "external", "summary": "RHBZ#1752980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752980" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14843", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14843" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14843", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14843" } ], "release_date": "2019-09-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T19:58:39+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).\n\nThe JBoss server process must be restarted for the update to take effect.", "product_ids": [ "Red Hat JBoss EAP 7.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4021" }, { "category": "workaround", "details": "This flaw only affects the Security Manager running under JDK 11 or 8. To mitigate exposure to this flaw, do not run under those JDK versions.", "product_ids": [ "Red Hat JBoss EAP 7.2" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss EAP 7.2" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "wildfly-security-manager: security manager authorization bypass" } ] }
rhsa-2019:4042
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "New Red Hat Single Sign-On 7.3.5 packages are now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Single Sign-On 7.3 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications.\n\nThis release of Red Hat Single Sign-On 7.3.5 on RHEL 8 serves as a replacement for Red Hat Single Sign-On 7.3.4, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* keycloak: Service accounts reset password flow not using placeholder.org domain anymore (CVE-2019-14837)\n\n* undertow: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* undertow: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* undertow: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default (CVE-2019-14838)\n\n* wildfly: wildfly-security-manager: security manager authorization bypass (CVE-2019-14843)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:4042", "url": "https://access.redhat.com/errata/RHSA-2019:4042" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.3/", "url": "https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.3/" }, { "category": "external", "summary": "1730227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1730227" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1751227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751227" }, { "category": "external", "summary": "1752980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752980" }, { "category": "external", "summary": "KEYCLOAK-11817", "url": "https://issues.redhat.com/browse/KEYCLOAK-11817" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_4042.json" } ], "title": "Red Hat Security Advisory: Red Hat Single Sign-On 7.3.5 security update on RHEL 8", "tracking": { "current_release_date": "2025-03-15T19:44:42+00:00", "generator": { "date": "2025-03-15T19:44:42+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.1" } }, "id": "RHSA-2019:4042", "initial_release_date": "2019-12-02T17:04:50+00:00", "revision_history": [ { "date": "2019-12-02T17:04:50+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-12-02T17:04:50+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-03-15T19:44:42+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Single Sign-On 7.3 for RHEL 8", "product": { "name": "Red Hat Single Sign-On 7.3 for RHEL 8", "product_id": "8Base-RHSSO-7.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:red_hat_single_sign_on:7::el8" } } } ], "category": "product_family", "name": "Red Hat Single Sign-On" }, { "branches": [ { "category": "product_version", "name": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "product": { "name": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "product_id": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8sso?arch=noarch" } } }, { "category": "product_version", "name": "rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "product": { "name": "rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "product_id": "rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8sso?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "product": { "name": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "product_id": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8sso?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch as a component of Red Hat Single Sign-On 7.3 for RHEL 8", "product_id": "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" }, "product_reference": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "relates_to_product_reference": "8Base-RHSSO-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src as a component of Red Hat Single Sign-On 7.3 for RHEL 8", "product_id": "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src" }, "product_reference": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "relates_to_product_reference": "8Base-RHSSO-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch as a component of Red Hat Single Sign-On 7.3 for RHEL 8", "product_id": "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" }, "product_reference": "rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "relates_to_product_reference": "8Base-RHSSO-7.3" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:04:50+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4042" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:04:50+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4042" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:04:50+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4042" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "Vadim Ashikhman" ] } ], "cve": "CVE-2019-14837", "cwe": { "id": "CWE-547", "name": "Use of Hard-coded, Security-relevant Constants" }, "discovery_date": "2019-07-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1730227" } ], "notes": [ { "category": "description", "text": "A flaw was found in Keycloak. The use of an open hard-coded domain can allow an unauthorized login by setting up a mail server and resetting the user credentials, enabling information disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak: keycloak uses hardcoded open dummy domain for new accounts enabling information disclosure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14837" }, { "category": "external", "summary": "RHBZ#1730227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1730227" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14837", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14837" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14837", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14837" } ], "release_date": "2019-12-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:04:50+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4042" }, { "category": "workaround", "details": "It is not a very straight forward workaround but it is possible to mitigate this by manually editing the default Email ID ([email protected]) to some valid email ID ([email protected]) in the USER_ENTITY table in the RHSSO database used.", "product_ids": [ "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "keycloak: keycloak uses hardcoded open dummy domain for new accounts enabling information disclosure" }, { "acknowledgments": [ { "names": [ "F\u00e1bio Magalh\u00e3es de Andrade" ], "organization": "Sonda Ativas" }, { "names": [ "Juliano de Castro Santos", "Leonard Lunardi" ], "organization": "UnimedBH" } ], "cve": "CVE-2019-14838", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2019-08-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1751227" } ], "notes": [ { "category": "description", "text": "It was found that Wildfly users had default user permissions set incorrectly. A malicious user could use this flaw to access unauthorized controls for the application server.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14838" }, { "category": "external", "summary": "RHBZ#1751227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751227" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14838", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14838" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14838", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14838" }, { "category": "external", "summary": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14838", "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14838" } ], "release_date": "2019-10-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:04:50+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4042" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default" }, { "cve": "CVE-2019-14843", "cwe": { "id": "CWE-592", "name": "CWE-592" }, "discovery_date": "2019-09-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1752980" } ], "notes": [ { "category": "description", "text": "A flaw was found in Wildfly Security Manager, running under JDK 11 or 8, that authorized requests for any requester. This flaw could be used by a malicious app deployed on the app server to access unauthorized information and possibly conduct further attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-security-manager: security manager authorization bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14843" }, { "category": "external", "summary": "RHBZ#1752980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752980" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14843", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14843" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14843", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14843" } ], "release_date": "2019-09-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:04:50+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4042" }, { "category": "workaround", "details": "This flaw only affects the Security Manager running under JDK 11 or 8. To mitigate exposure to this flaw, do not run under those JDK versions.", "product_ids": [ "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "wildfly-security-manager: security manager authorization bypass" } ] }
rhsa-2019_4273
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the container-tools:1.0 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.\n\nSecurity Fix(es):\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:4273", "url": "https://access.redhat.com/errata/RHSA-2019:4273" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_4273.json" } ], "title": "Red Hat Security Advisory: container-tools:1.0 security update", "tracking": { "current_release_date": "2024-11-13T22:10:43+00:00", "generator": { "date": "2024-11-13T22:10:43+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2019:4273", "initial_release_date": "2019-12-17T12:56:46+00:00", "revision_history": [ { "date": "2019-12-17T12:56:46+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-12-17T12:56:46+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-13T22:10:43+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "container-tools:1.0:8010020191126173920:c294d161", "product": { "name": "container-tools:1.0:8010020191126173920:c294d161", "product_id": "container-tools:1.0:8010020191126173920:c294d161", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/[email protected]:8010020191126173920:c294d161" } } }, { "category": "product_version", "name": "container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.noarch", "product": { "name": "container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.noarch", "product_id": "container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=noarch\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-docker-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.noarch", "product": { "name": "podman-docker-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.noarch", "product_id": "podman-docker-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.src", "product": { "name": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.src", "product_id": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=src" } } }, { "category": "product_version", "name": "container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.src", "product": { "name": "container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.src", "product_id": "container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=src\u0026epoch=2" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.src", "product": { "name": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.src", "product_id": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=src" } } }, { "category": "product_version", "name": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.src", "product": { "name": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.src", "product_id": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=src" } } }, { "category": "product_version", "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.src", "product": { "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.src", "product_id": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.src", "product": { "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.src", "product_id": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=src\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.src", "product": { "name": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.src", "product_id": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=src" } } }, { "category": "product_version", "name": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.src", "product": { "name": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.src", "product_id": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=src" } } }, { "category": "product_version", "name": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.src", "product": { "name": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.src", "product_id": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4903%2B9bde5d6c?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.src", "product": { "name": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.src", "product_id": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4308%2B9d868e48?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "product": { "name": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "product_id": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=x86_64" } } }, { "category": "product_version", "name": "buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "product": { "name": "buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "product_id": "buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=x86_64" } } }, { "category": "product_version", "name": "buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "product": { "name": "buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "product_id": "buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=x86_64" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "product": { "name": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "product_id": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=x86_64" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "product": { "name": "containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "product_id": "containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=x86_64" } } }, { "category": "product_version", "name": "containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "product": { "name": "containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "product_id": "containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@0.7.4-4.git9ebe139.module%2Bel8.1.0%2B4908%2B72a45cef?arch=x86_64" } } }, { "category": "product_version", "name": "containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "product": { "name": "containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "product_id": "containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4903%2B9bde5d6c?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "product": { "name": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "product_id": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=x86_64" } } }, { "category": "product_version", "name": "fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "product": { "name": "fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "product_id": "fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=x86_64" } } }, { "category": "product_version", "name": "fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "product": { "name": "fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "product_id": "fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=x86_64" } } }, { "category": "product_version", "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "product": { "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "product_id": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "product": { "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "product_id": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "product": { "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "product_id": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "product": { "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "product_id": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "product": { "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "product_id": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "product": { "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "product_id": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "product": { "name": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "product_id": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=x86_64" } } }, { "category": "product_version", "name": "podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "product": { "name": "podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "product_id": "podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=x86_64" } } }, { "category": "product_version", "name": "podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "product": { "name": "podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "product_id": "podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=x86_64" } } }, { "category": "product_version", "name": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "product": { "name": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "product_id": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=x86_64" } } }, { "category": "product_version", "name": "runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "product": { "name": "runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "product_id": "runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=x86_64" } } }, { "category": "product_version", "name": "runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "product": { "name": "runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "product_id": "runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=x86_64" } } }, { "category": "product_version", "name": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "product": { "name": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "product_id": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4903%2B9bde5d6c?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "product": { "name": "skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "product_id": "skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4903%2B9bde5d6c?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "product": { "name": "skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "product_id": "skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4903%2B9bde5d6c?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "product": { "name": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "product_id": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4308%2B9d868e48?arch=x86_64" } } }, { "category": "product_version", "name": "slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "product": { "name": "slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "product_id": "slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4308%2B9d868e48?arch=x86_64" } } }, { "category": "product_version", "name": "slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "product": { "name": "slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "product_id": "slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4308%2B9d868e48?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "product": { "name": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "product_id": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=s390x" } } }, { "category": "product_version", "name": "buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "product": { "name": "buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "product_id": "buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=s390x" } } }, { "category": "product_version", "name": "buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "product": { "name": "buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "product_id": "buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=s390x" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "product": { "name": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "product_id": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=s390x" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "product": { "name": "containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "product_id": "containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=s390x" } } }, { "category": "product_version", "name": "containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "product": { "name": "containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "product_id": "containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@0.7.4-4.git9ebe139.module%2Bel8.1.0%2B4908%2B72a45cef?arch=s390x" } } }, { "category": "product_version", "name": "containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "product": { "name": "containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "product_id": "containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4903%2B9bde5d6c?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "product": { "name": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "product_id": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=s390x" } } }, { "category": "product_version", "name": "fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "product": { "name": "fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "product_id": "fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=s390x" } } }, { "category": "product_version", "name": "fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "product": { "name": "fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "product_id": "fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=s390x" } } }, { "category": "product_version", "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "product": { "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "product_id": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "product": { "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "product_id": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "product": { "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "product_id": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "product": { "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "product_id": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "product": { "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "product_id": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "product": { "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "product_id": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "product": { "name": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "product_id": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=s390x" } } }, { "category": "product_version", "name": "podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "product": { "name": "podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "product_id": "podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=s390x" } } }, { "category": "product_version", "name": "podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "product": { "name": "podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "product_id": "podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=s390x" } } }, { "category": "product_version", "name": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "product": { "name": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "product_id": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=s390x" } } }, { "category": "product_version", "name": "runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "product": { "name": "runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "product_id": "runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=s390x" } } }, { "category": "product_version", "name": "runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "product": { "name": "runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "product_id": "runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=s390x" } } }, { "category": "product_version", "name": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "product": { "name": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "product_id": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4903%2B9bde5d6c?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "product": { "name": "skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "product_id": "skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4903%2B9bde5d6c?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "product": { "name": "skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "product_id": "skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4903%2B9bde5d6c?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "product": { "name": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "product_id": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4308%2B9d868e48?arch=s390x" } } }, { "category": "product_version", "name": "slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "product": { "name": "slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "product_id": "slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4308%2B9d868e48?arch=s390x" } } }, { "category": "product_version", "name": "slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "product": { "name": "slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "product_id": "slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4308%2B9d868e48?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "product": { "name": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "product_id": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=ppc64le" } } }, { "category": "product_version", "name": "buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "product": { "name": "buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "product_id": "buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=ppc64le" } } }, { "category": "product_version", "name": "buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "product": { "name": "buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "product_id": "buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=ppc64le" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "product": { "name": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "product_id": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=ppc64le" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "product": { "name": "containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "product_id": "containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=ppc64le" } } }, { "category": "product_version", "name": "containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "product": { "name": "containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "product_id": "containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@0.7.4-4.git9ebe139.module%2Bel8.1.0%2B4908%2B72a45cef?arch=ppc64le" } } }, { "category": "product_version", "name": "containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "product": { "name": "containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "product_id": "containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4903%2B9bde5d6c?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "product": { "name": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "product_id": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=ppc64le" } } }, { "category": "product_version", "name": "fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "product": { "name": "fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "product_id": "fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=ppc64le" } } }, { "category": "product_version", "name": "fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "product": { "name": "fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "product_id": "fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=ppc64le" } } }, { "category": "product_version", "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "product": { "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "product_id": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "product": { "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "product_id": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "product": { "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "product_id": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "product": { "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "product_id": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "product": { "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "product_id": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "product": { "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "product_id": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "product": { "name": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "product_id": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=ppc64le" } } }, { "category": "product_version", "name": "podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "product": { "name": "podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "product_id": "podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=ppc64le" } } }, { "category": "product_version", "name": "podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "product": { "name": "podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "product_id": "podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=ppc64le" } } }, { "category": "product_version", "name": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "product": { "name": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "product_id": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=ppc64le" } } }, { "category": "product_version", "name": "runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "product": { "name": "runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "product_id": "runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=ppc64le" } } }, { "category": "product_version", "name": "runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "product": { "name": "runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "product_id": "runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=ppc64le" } } }, { "category": "product_version", "name": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "product": { "name": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "product_id": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4903%2B9bde5d6c?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "product": { "name": "skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "product_id": "skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4903%2B9bde5d6c?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "product": { "name": "skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "product_id": "skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4903%2B9bde5d6c?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "product": { "name": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "product_id": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4308%2B9d868e48?arch=ppc64le" } } }, { "category": "product_version", "name": "slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "product": { "name": "slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "product_id": "slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4308%2B9d868e48?arch=ppc64le" } } }, { "category": "product_version", "name": "slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "product": { "name": "slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "product_id": "slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4308%2B9d868e48?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "product": { "name": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "product_id": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=aarch64" } } }, { "category": "product_version", "name": "buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "product": { "name": "buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "product_id": "buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=aarch64" } } }, { "category": "product_version", "name": "buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "product": { "name": "buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "product_id": "buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=aarch64" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "product": { "name": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "product_id": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=aarch64" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "product": { "name": "containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "product_id": "containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=aarch64" } } }, { "category": "product_version", "name": "containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "product": { "name": "containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "product_id": "containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@0.7.4-4.git9ebe139.module%2Bel8.1.0%2B4908%2B72a45cef?arch=aarch64" } } }, { "category": "product_version", "name": "containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "product": { "name": "containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "product_id": "containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4903%2B9bde5d6c?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "product": { "name": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "product_id": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=aarch64" } } }, { "category": "product_version", "name": "fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "product": { "name": "fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "product_id": "fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=aarch64" } } }, { "category": "product_version", "name": "fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "product": { "name": "fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "product_id": "fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=aarch64" } } }, { "category": "product_version", "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "product": { "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "product_id": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "product": { "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "product_id": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "product": { "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "product_id": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "product": { "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "product_id": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "product": { "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "product_id": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "product": { "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "product_id": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "product": { "name": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "product_id": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=aarch64" } } }, { "category": "product_version", "name": "podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "product": { "name": "podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "product_id": "podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=aarch64" } } }, { "category": "product_version", "name": "podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "product": { "name": "podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "product_id": "podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=aarch64" } } }, { "category": "product_version", "name": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "product": { "name": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "product_id": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=aarch64" } } }, { "category": "product_version", "name": "runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "product": { "name": "runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "product_id": "runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=aarch64" } } }, { "category": "product_version", "name": "runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "product": { "name": "runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "product_id": "runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=aarch64" } } }, { "category": "product_version", "name": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "product": { "name": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "product_id": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4903%2B9bde5d6c?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "product": { "name": "skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "product_id": "skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4903%2B9bde5d6c?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "product": { "name": "skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "product_id": "skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4903%2B9bde5d6c?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "product": { "name": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "product_id": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4308%2B9d868e48?arch=aarch64" } } }, { "category": "product_version", "name": "slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "product": { "name": "slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "product_id": "slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4308%2B9d868e48?arch=aarch64" } } }, { "category": "product_version", "name": "slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "product": { "name": "slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "product_id": "slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4308%2B9d868e48?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, "product_reference": "container-tools:1.0:8010020191126173920:c294d161", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64" }, "product_reference": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le" }, "product_reference": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x" }, "product_reference": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.src as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.src" }, "product_reference": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64" }, "product_reference": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64" }, "product_reference": "buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le" }, "product_reference": "buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x" }, "product_reference": "buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64" }, "product_reference": "buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64" }, "product_reference": "buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le" }, "product_reference": "buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x" }, "product_reference": "buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64" }, "product_reference": "buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.noarch as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.noarch" }, "product_reference": "container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.src as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.src" }, "product_reference": "container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64" }, "product_reference": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le" }, "product_reference": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x" }, "product_reference": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.src as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.src" }, "product_reference": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64" }, "product_reference": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64" }, "product_reference": "containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le" }, "product_reference": "containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x" }, "product_reference": "containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64" }, "product_reference": "containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64" }, "product_reference": "containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le" }, "product_reference": "containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x" }, "product_reference": "containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64" }, "product_reference": "containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64" }, "product_reference": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le" }, "product_reference": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x" }, "product_reference": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.src as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.src" }, "product_reference": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64" }, "product_reference": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64" }, "product_reference": "fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le" }, "product_reference": "fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x" }, "product_reference": "fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64" }, "product_reference": "fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64" }, "product_reference": "fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le" }, "product_reference": "fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x" }, "product_reference": "fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64" }, "product_reference": "fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64" }, "product_reference": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le" }, "product_reference": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x" }, "product_reference": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.src as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.src" }, "product_reference": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64" }, "product_reference": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64" }, "product_reference": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le" }, "product_reference": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x" }, "product_reference": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64" }, "product_reference": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64" }, "product_reference": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le" }, "product_reference": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x" }, "product_reference": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64" }, "product_reference": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64" }, "product_reference": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le" }, "product_reference": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x" }, "product_reference": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.src as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.src" }, "product_reference": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64" }, "product_reference": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64" }, "product_reference": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le" }, "product_reference": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x" }, "product_reference": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64" }, "product_reference": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64" }, "product_reference": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le" }, "product_reference": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x" }, "product_reference": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64" }, "product_reference": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64" }, "product_reference": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le" }, "product_reference": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x" }, "product_reference": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.src as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.src" }, "product_reference": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64" }, "product_reference": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64" }, "product_reference": "podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le" }, "product_reference": "podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x" }, "product_reference": "podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64" }, "product_reference": "podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64" }, "product_reference": "podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le" }, "product_reference": "podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x" }, "product_reference": "podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64" }, "product_reference": "podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-docker-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.noarch as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-docker-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.noarch" }, "product_reference": "podman-docker-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64" }, "product_reference": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le" }, "product_reference": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x" }, "product_reference": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.src as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.src" }, "product_reference": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64" }, "product_reference": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64" }, "product_reference": "runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le" }, "product_reference": "runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x" }, "product_reference": "runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64" }, "product_reference": "runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64" }, "product_reference": "runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le" }, "product_reference": "runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x" }, "product_reference": "runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64" }, "product_reference": "runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64" }, "product_reference": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le" }, "product_reference": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x" }, "product_reference": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.src as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.src" }, "product_reference": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64" }, "product_reference": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64" }, "product_reference": "skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le" }, "product_reference": "skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x" }, "product_reference": "skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64" }, "product_reference": "skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64" }, "product_reference": "skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le" }, "product_reference": "skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x" }, "product_reference": "skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64" }, "product_reference": "skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64" }, "product_reference": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le" }, "product_reference": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x" }, "product_reference": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.src as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.src" }, "product_reference": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64" }, "product_reference": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64" }, "product_reference": "slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le" }, "product_reference": "slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x" }, "product_reference": "slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64" }, "product_reference": "slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64" }, "product_reference": "slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le" }, "product_reference": "slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x" }, "product_reference": "slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64" }, "product_reference": "slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-docker-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-17T12:56:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-docker-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4273" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-docker-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-docker-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-17T12:56:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-docker-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4273" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-docker-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" } ] }
rhsa-2019_2682
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for go-toolset-1.11 and go-toolset-1.11-golang is now available for Red Hat Developer Tools.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.\n\nSecurity Fix(es):\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:2682", "url": "https://access.redhat.com/errata/RHSA-2019:2682" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2682.json" } ], "title": "Red Hat Security Advisory: go-toolset-1.11 and go-toolset-1.11-golang security update", "tracking": { "current_release_date": "2024-11-13T22:08:53+00:00", "generator": { "date": "2024-11-13T22:08:53+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2019:2682", "initial_release_date": "2019-09-10T17:47:41+00:00", "revision_history": [ { "date": "2019-09-10T17:47:41+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-09-10T17:47:41+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-13T22:08:53+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:devtools:2019" } } }, { "category": "product_name", "name": "Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:devtools:2019" } } }, { "category": "product_name", "name": "Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:devtools:2019" } } } ], "category": "product_family", "name": "Red Hat Developer Tools" }, { "branches": [ { "category": "product_version", "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "product": { "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "product_id": "go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "product": { "name": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "product_id": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "product": { "name": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "product_id": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "product": { "name": "go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "product_id": "go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "product": { "name": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "product_id": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "product": { "name": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "product_id": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-1.11-0:1.11.13-1.el7.x86_64", "product": { "name": "go-toolset-1.11-0:1.11.13-1.el7.x86_64", "product_id": "go-toolset-1.11-0:1.11.13-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "product": { "name": "go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "product_id": "go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "product": { "name": "go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "product_id": "go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64", "product": { "name": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64", "product_id": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.src", "product": { "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.src", "product_id": "go-toolset-1.11-golang-0:1.11.13-2.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "go-toolset-1.11-0:1.11.13-1.el7.src", "product": { "name": "go-toolset-1.11-0:1.11.13-1.el7.src", "product_id": "go-toolset-1.11-0:1.11.13-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "product": { "name": "go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "product_id": "go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "product": { "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "product_id": "go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "product": { "name": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "product_id": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "product": { "name": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "product_id": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "product": { "name": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "product_id": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "product": { "name": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "product_id": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "product": { "name": "go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "product_id": "go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "product": { "name": "go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "product_id": "go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "product": { "name": "go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "product_id": "go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "product": { "name": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "product_id": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "product": { "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "product_id": "go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=s390x" } } }, { "category": "product_version", "name": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "product": { "name": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "product_id": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=s390x" } } }, { "category": "product_version", "name": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "product": { "name": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "product_id": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=s390x" } } }, { "category": "product_version", "name": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "product": { "name": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "product_id": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=s390x" } } }, { "category": "product_version", "name": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "product": { "name": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "product_id": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=s390x" } } }, { "category": "product_version", "name": "go-toolset-1.11-0:1.11.13-1.el7.s390x", "product": { "name": "go-toolset-1.11-0:1.11.13-1.el7.s390x", "product_id": "go-toolset-1.11-0:1.11.13-1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=s390x" } } }, { "category": "product_version", "name": "go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "product": { "name": "go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "product_id": "go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=s390x" } } }, { "category": "product_version", "name": "go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "product": { "name": "go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "product_id": "go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=s390x" } } }, { "category": "product_version", "name": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "product": { "name": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "product_id": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "product": { "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "product_id": "go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=aarch64" } } }, { "category": "product_version", "name": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "product": { "name": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "product_id": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=aarch64" } } }, { "category": "product_version", "name": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "product": { "name": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "product_id": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=aarch64" } } }, { "category": "product_version", "name": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "product": { "name": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "product_id": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=aarch64" } } }, { "category": "product_version", "name": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "product": { "name": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "product_id": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=aarch64" } } }, { "category": "product_version", "name": "go-toolset-1.11-0:1.11.13-1.el7.aarch64", "product": { "name": "go-toolset-1.11-0:1.11.13-1.el7.aarch64", "product_id": "go-toolset-1.11-0:1.11.13-1.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=aarch64" } } }, { "category": "product_version", "name": "go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "product": { "name": "go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "product_id": "go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=aarch64" } } }, { "category": "product_version", "name": "go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "product": { "name": "go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "product_id": "go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=aarch64" } } }, { "category": "product_version", "name": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "product": { "name": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "product_id": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-0:1.11.13-1.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64" }, "product_reference": "go-toolset-1.11-0:1.11.13-1.el7.aarch64", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-0:1.11.13-1.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le" }, "product_reference": "go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-0:1.11.13-1.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x" }, "product_reference": "go-toolset-1.11-0:1.11.13-1.el7.s390x", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-0:1.11.13-1.el7.src as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src" }, "product_reference": "go-toolset-1.11-0:1.11.13-1.el7.src", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-0:1.11.13-1.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64" }, "product_reference": "go-toolset-1.11-0:1.11.13-1.el7.x86_64", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-build-0:1.11.13-1.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64" }, "product_reference": "go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le" }, "product_reference": "go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-build-0:1.11.13-1.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x" }, "product_reference": "go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-build-0:1.11.13-1.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64" }, "product_reference": "go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64" }, "product_reference": "go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le" }, "product_reference": "go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x" }, "product_reference": "go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.src as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src" }, "product_reference": "go-toolset-1.11-golang-0:1.11.13-2.el7.src", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64" }, "product_reference": "go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64" }, "product_reference": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le" }, "product_reference": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x" }, "product_reference": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64" }, "product_reference": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch" }, "product_reference": "go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64" }, "product_reference": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le" }, "product_reference": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x" }, "product_reference": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64" }, "product_reference": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64" }, "product_reference": "go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64" }, "product_reference": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le" }, "product_reference": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x" }, "product_reference": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64" }, "product_reference": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64" }, "product_reference": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le" }, "product_reference": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x" }, "product_reference": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64" }, "product_reference": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64" }, "product_reference": "go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le" }, "product_reference": "go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x" }, "product_reference": "go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64" }, "product_reference": "go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64" }, "product_reference": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le" }, "product_reference": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x" }, "product_reference": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64" }, "product_reference": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-0:1.11.13-1.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64" }, "product_reference": "go-toolset-1.11-0:1.11.13-1.el7.aarch64", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-0:1.11.13-1.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le" }, "product_reference": "go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-0:1.11.13-1.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x" }, "product_reference": "go-toolset-1.11-0:1.11.13-1.el7.s390x", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-0:1.11.13-1.el7.src as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src" }, "product_reference": "go-toolset-1.11-0:1.11.13-1.el7.src", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-0:1.11.13-1.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64" }, "product_reference": "go-toolset-1.11-0:1.11.13-1.el7.x86_64", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-build-0:1.11.13-1.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64" }, "product_reference": "go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le" }, "product_reference": "go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-build-0:1.11.13-1.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x" }, "product_reference": "go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-build-0:1.11.13-1.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64" }, "product_reference": "go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64" }, "product_reference": "go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le" }, "product_reference": "go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x" }, "product_reference": "go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.src as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src" }, "product_reference": "go-toolset-1.11-golang-0:1.11.13-2.el7.src", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64" }, "product_reference": "go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64" }, "product_reference": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le" }, "product_reference": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x" }, "product_reference": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64" }, "product_reference": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch" }, "product_reference": "go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64" }, "product_reference": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le" }, "product_reference": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x" }, "product_reference": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64" }, "product_reference": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64" }, "product_reference": "go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64" }, "product_reference": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le" }, "product_reference": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x" }, "product_reference": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64" }, "product_reference": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64" }, "product_reference": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le" }, "product_reference": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x" }, "product_reference": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64" }, "product_reference": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64" }, "product_reference": "go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le" }, "product_reference": "go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x" }, "product_reference": "go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64" }, "product_reference": "go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64" }, "product_reference": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le" }, "product_reference": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x" }, "product_reference": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64" }, "product_reference": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-0:1.11.13-1.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64" }, "product_reference": "go-toolset-1.11-0:1.11.13-1.el7.aarch64", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-0:1.11.13-1.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le" }, "product_reference": "go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-0:1.11.13-1.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x" }, "product_reference": "go-toolset-1.11-0:1.11.13-1.el7.s390x", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-0:1.11.13-1.el7.src as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src" }, "product_reference": "go-toolset-1.11-0:1.11.13-1.el7.src", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-0:1.11.13-1.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64" }, "product_reference": "go-toolset-1.11-0:1.11.13-1.el7.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-build-0:1.11.13-1.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64" }, "product_reference": "go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le" }, "product_reference": "go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-build-0:1.11.13-1.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x" }, "product_reference": "go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-build-0:1.11.13-1.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64" }, "product_reference": "go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64" }, "product_reference": "go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le" }, "product_reference": "go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x" }, "product_reference": "go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.src as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src" }, "product_reference": "go-toolset-1.11-golang-0:1.11.13-2.el7.src", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64" }, "product_reference": "go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64" }, "product_reference": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le" }, "product_reference": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x" }, "product_reference": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64" }, "product_reference": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch" }, "product_reference": "go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64" }, "product_reference": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le" }, "product_reference": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x" }, "product_reference": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64" }, "product_reference": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64" }, "product_reference": "go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64" }, "product_reference": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le" }, "product_reference": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x" }, "product_reference": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64" }, "product_reference": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64" }, "product_reference": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le" }, "product_reference": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x" }, "product_reference": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64" }, "product_reference": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64" }, "product_reference": "go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le" }, "product_reference": "go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x" }, "product_reference": "go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64" }, "product_reference": "go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64" }, "product_reference": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le" }, "product_reference": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x" }, "product_reference": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64" }, "product_reference": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2019.3" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-10T17:47:41+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2682" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-10T17:47:41+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2682" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" } ] }
RHSA-2020:0922
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat AMQ Broker 7.6 is now available from the Red Hat Customer Portal.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "AMQ Broker is a high-performance messaging implementation based on ActiveMQ Artemis. It uses an asynchronous journal for fast message persistence, and supports multiple languages, protocols, and platforms. \n\nThis release of Red Hat AMQ Broker 7.6.0 serves as a replacement for Red Hat AMQ Broker 7.5.0, and includes security and bug fixes, and enhancements. For further information, refer to the release notes linked to in the References section.\n\nSecurity Fix(es):\n\n* netty: HTTP request smuggling (CVE-2019-20444)\n\n* netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header (CVE-2019-20445)\n\n* jetty: HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511)\n\n* jetty: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* jetty: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* jetty: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* jetty: HTTP/2: 0-length headers lead to denial of service (CVE-2019-9516)\n\n* jetty: HTTP/2: request for large response leads to denial of service (CVE-2019-9517)\n\n* jetty: HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)\n\n* jetty: using specially formatted URL against DefaultServlet or ResourceHandler leads to XSS conditions (CVE-2019-10241)\n\n* jetty: error path information disclosure (CVE-2019-10247)\n\n* mqtt-client: activemq: Corrupt MQTT frame can cause broker shutdown (CVE-2019-0222)\n\n* netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers (CVE-2019-16869)\n\n* netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling (CVE-2020-7238)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:0922", "url": "https://access.redhat.com/errata/RHSA-2020:0922" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=jboss.amq.broker\u0026version=7.6.0\u0026productChanged=yes", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=jboss.amq.broker\u0026version=7.6.0\u0026productChanged=yes" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_amq/7.6/", "url": "https://access.redhat.com/documentation/en-us/red_hat_amq/7.6/" }, { "category": "external", "summary": "1696012", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1696012" }, { "category": "external", "summary": "1705924", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705924" }, { "category": "external", "summary": "1705993", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705993" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "external", "summary": "1758619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758619" }, { "category": "external", "summary": "1796225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796225" }, { "category": "external", "summary": "1798509", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798509" }, { "category": "external", "summary": "1798524", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798524" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_0922.json" } ], "title": "Red Hat Security Advisory: Red Hat AMQ Broker 7.6 release and security update", "tracking": { "current_release_date": "2025-04-09T17:53:01+00:00", "generator": { "date": "2025-04-09T17:53:01+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.2" } }, "id": "RHSA-2020:0922", "initial_release_date": "2020-03-23T08:21:33+00:00", "revision_history": [ { "date": "2020-03-23T08:21:33+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-03-23T08:21:33+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-04-09T17:53:01+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat AMQ", "product": { "name": "Red Hat AMQ", "product_id": "Red Hat AMQ", "product_identification_helper": { "cpe": "cpe:/a:redhat:amq_broker:7" } } } ], "category": "product_family", "name": "Red Hat JBoss AMQ" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-0222", "discovery_date": "2019-03-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1696012" } ], "notes": [ { "category": "description", "text": "In Apache ActiveMQ 5.0.0 - 5.15.8, unmarshalling corrupt MQTT frame can lead to broker Out of Memory exception making it unresponsive.", "title": "Vulnerability description" }, { "category": "summary", "text": "activemq: Corrupt MQTT frame can cause broker shutdown", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-0222" }, { "category": "external", "summary": "RHBZ#1696012", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1696012" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0222", "url": "https://www.cve.org/CVERecord?id=CVE-2019-0222" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0222", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0222" } ], "release_date": "2019-03-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "activemq: Corrupt MQTT frame can cause broker shutdown" }, { "cve": "CVE-2019-9511", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741860" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker can request a large amount of data by manipulating window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this queue can consume excess CPU, memory, or both, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: large amount of data requests leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "There are no mitigations available for nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "RHBZ#1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9511", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "Red Hat AMQ" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: large amount of data requests leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "cve": "CVE-2019-9516", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741864" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker, sending a stream of header with a 0-length header name and a 0-length header value, could cause some implementations to allocate memory for these headers and keep the allocations alive until the session dies. The can consume excess memory, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: 0-length headers lead to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9516" }, { "category": "external", "summary": "RHBZ#1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9516", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9516" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://github.com/nghttp2/nghttp2/issues/1382#", "url": "https://github.com/nghttp2/nghttp2/issues/1382#" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "Red Hat AMQ" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: 0-length headers lead to denial of service" }, { "cve": "CVE-2019-9517", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741868" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in HTTP/2. An attacker can open a HTTP/2 window so the peer can send without constraint. The TCP window remains closed so the peer cannot write the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the server\u0027s queue is setup, the responses can consume excess memory, CPU, or both, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: request for large response leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "The package httpd versions as shipped with Red Hat Enterprise Linux 5, 6 and 7 are not affected by this issue as HTTP/2 support is not provided.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9517" }, { "category": "external", "summary": "RHBZ#1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9517", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9517" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" }, { "category": "workaround", "details": "The httpd version shipped with Red Hat Enterprise Linux 8 provides HTTP/2 support through mod_http2 package. While mod_http2 package is not updated, users can disable HTTP/2 support as mitigation action by executing the following steps:\n\n1. Stop httpd service:\n$ systemctl stop httpd\n\n2. Remove http/2 protocol support from configuration files:\n$ sed -i \u0027s/\\(h2\\)\\|\\(h2c\\)//g\u0027 \u003chttpd_config_file\u003e\n\n3. Validate configuration files to make sure all syntax is valid:\n$ apachectl configtest\n\n4. Restart httpd service:\n$ systemctl start httpd", "product_ids": [ "Red Hat AMQ" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: request for large response leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9518", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735749" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using frames with an empty payload, a flood could occur that results in excessive CPU usage and starvation of other clients. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using empty frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9518" }, { "category": "external", "summary": "RHBZ#1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9518", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: flood using empty frames results in excessive resource consumption" }, { "cve": "CVE-2019-10241", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2019-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1705924" } ], "notes": [ { "category": "description", "text": "In Eclipse Jetty version 9.2.26 and older, 9.3.25 and older, and 9.4.15 and older, the server is vulnerable to XSS conditions if a remote client USES a specially formatted URL against the DefaultServlet or ResourceHandler that is configured for showing a Listing of directory contents.", "title": "Vulnerability description" }, { "category": "summary", "text": "jetty: using specially formatted URL against DefaultServlet or ResourceHandler leads to XSS conditions", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of jetty which is embedded in the nutch package as shipped with Red Hat Satellite 5. The jetty server is not exposed, as such exploitation is difficult, Red Hat Product Security has rated this issue as having security impact of Low in the context of Red Hat Satellite 5. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10241" }, { "category": "external", "summary": "RHBZ#1705924", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705924" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10241", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10241" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10241", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10241" } ], "release_date": "2019-04-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jetty: using specially formatted URL against DefaultServlet or ResourceHandler leads to XSS conditions" }, { "cve": "CVE-2019-10247", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1705993" } ], "notes": [ { "category": "description", "text": "In Eclipse Jetty version 7.x, 8.x, 9.2.27 and older, 9.3.26 and older, and 9.4.16 and older, the server running on any OS and Jetty version combination will reveal the configured fully qualified directory base resource location on the output of the 404 error for not finding a Context that matches the requested path. The default server behavior on jetty-distribution and jetty-home will include at the end of the Handler tree a DefaultHandler, which is responsible for reporting this 404 error, it presents the various configured contexts as HTML for users to click through to. This produced HTML includes output that contains the configured fully qualified directory base resource location for each context.", "title": "Vulnerability description" }, { "category": "summary", "text": "jetty: error path information disclosure", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of jetty which is embedded in the nutch package as shipped with Red Hat Satellite 5. The jetty server is not exposed, as such exploitation is difficult, Red Hat Product Security has rated this issue as having security impact of Low in the context of Red Hat Satellite 5. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10247" }, { "category": "external", "summary": "RHBZ#1705993", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705993" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10247", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10247" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10247", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10247" } ], "release_date": "2019-04-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "jetty: error path information disclosure" }, { "cve": "CVE-2019-16869", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2019-09-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1758619" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty, where whitespace before the colon in HTTP headers is mishandled. This flaw allows an attacker to cause HTTP request smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that this vulnerability does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships vulnerable netty version embedded in Candlepin, however, is not directly vulnerable since HTTP requests are handled by Tomcat and not netty.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-16869" }, { "category": "external", "summary": "RHBZ#1758619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758619" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16869", "url": "https://www.cve.org/CVERecord?id=CVE-2019-16869" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16869", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16869" } ], "release_date": "2019-09-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat AMQ" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers" }, { "cve": "CVE-2019-20444", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1798524" } ], "notes": [ { "category": "description", "text": "A HTTP smuggling flaw was found in HttpObjectDecoder.java in Netty in versions prior to version 4.1.44. HTTP headers with an invalid fold, in this case CRLF (carriage return, line feed) without being followed by SP (space) or HTAB (horizontal tab), result in situations where headers can be misread. Data integrity is the highest threat with this vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP request smuggling", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that the previous vulnerability, CVE-2019-16869, does not pose a substantial practical threat to ElasticSearch 6. We agree that these issues would be difficult to exploit on OpenShift Container Platform so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships a vulnerable version of netty embedded in Candlepin. However, the flaw can not be triggered in that context, because HTTP requests are handled by Tomcat, not by netty. A future release may fix this.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20444" }, { "category": "external", "summary": "RHBZ#1798524", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798524" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20444", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20444" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20444", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20444" }, { "category": "external", "summary": "https://github.com/elastic/elasticsearch/issues/49396", "url": "https://github.com/elastic/elasticsearch/issues/49396" } ], "release_date": "2020-01-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat AMQ" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP request smuggling" }, { "cve": "CVE-2019-20445", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1798509" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty before version 4.1.44, where it accepted multiple Content-Length headers and also accepted both Transfer-Encoding, as well as Content-Length headers where it should reject the message under such circumstances. In circumstances where Netty is used in the context of a server, it could result in a viable HTTP smuggling vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that the previous vulnerability, CVE-2019-16869, does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit both these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships a vulnerable version of netty embedded in Candlepin. However, the flaw can not be triggered in that context, because HTTP requests are handled by Tomcat, not by netty. A future release may fix this.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20445" }, { "category": "external", "summary": "RHBZ#1798509", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798509" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20445", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20445" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20445", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20445" } ], "release_date": "2020-01-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat AMQ" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header" }, { "cve": "CVE-2020-7238", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1796225" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty, where it mishandles Transfer-Encoding whitespace. This flaw allows HTTP Request Smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that the previous vulnerability, CVE-2019-16869, does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit both these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships vulnerable netty version embedded in Candlepin, however, is not directly vulnerable since HTTP requests are handled by Tomcat and not netty.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-7238" }, { "category": "external", "summary": "RHBZ#1796225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796225" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-7238", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7238" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7238", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7238" }, { "category": "external", "summary": "https://netty.io/news/2019/12/18/4-1-44-Final.html", "url": "https://netty.io/news/2019/12/18/4-1-44-Final.html" } ], "release_date": "2020-01-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat AMQ" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling" } ] }
RHSA-2019:4273
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the container-tools:1.0 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.\n\nSecurity Fix(es):\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:4273", "url": "https://access.redhat.com/errata/RHSA-2019:4273" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_4273.json" } ], "title": "Red Hat Security Advisory: container-tools:1.0 security update", "tracking": { "current_release_date": "2025-03-15T19:44:59+00:00", "generator": { "date": "2025-03-15T19:44:59+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.1" } }, "id": "RHSA-2019:4273", "initial_release_date": "2019-12-17T12:56:46+00:00", "revision_history": [ { "date": "2019-12-17T12:56:46+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-12-17T12:56:46+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-03-15T19:44:59+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "container-tools:1.0:8010020191126173920:c294d161", "product": { "name": "container-tools:1.0:8010020191126173920:c294d161", "product_id": "container-tools:1.0:8010020191126173920:c294d161", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/[email protected]:8010020191126173920:c294d161" } } }, { "category": "product_version", "name": "container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.noarch", "product": { "name": "container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.noarch", "product_id": "container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=noarch\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-docker-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.noarch", "product": { "name": "podman-docker-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.noarch", "product_id": "podman-docker-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.src", "product": { "name": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.src", "product_id": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=src" } } }, { "category": "product_version", "name": "container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.src", "product": { "name": "container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.src", "product_id": "container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=src\u0026epoch=2" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.src", "product": { "name": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.src", "product_id": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=src" } } }, { "category": "product_version", "name": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.src", "product": { "name": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.src", "product_id": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=src" } } }, { "category": "product_version", "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.src", "product": { "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.src", "product_id": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.src", "product": { "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.src", "product_id": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=src\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.src", "product": { "name": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.src", "product_id": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=src" } } }, { "category": "product_version", "name": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.src", "product": { "name": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.src", "product_id": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=src" } } }, { "category": "product_version", "name": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.src", "product": { "name": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.src", "product_id": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4903%2B9bde5d6c?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.src", "product": { "name": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.src", "product_id": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4308%2B9d868e48?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "product": { "name": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "product_id": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=x86_64" } } }, { "category": "product_version", "name": "buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "product": { "name": "buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "product_id": "buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=x86_64" } } }, { "category": "product_version", "name": "buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "product": { "name": "buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "product_id": "buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=x86_64" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "product": { "name": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "product_id": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=x86_64" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "product": { "name": "containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "product_id": "containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=x86_64" } } }, { "category": "product_version", "name": "containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "product": { "name": "containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "product_id": "containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@0.7.4-4.git9ebe139.module%2Bel8.1.0%2B4908%2B72a45cef?arch=x86_64" } } }, { "category": "product_version", "name": "containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "product": { "name": "containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "product_id": "containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4903%2B9bde5d6c?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "product": { "name": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "product_id": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=x86_64" } } }, { "category": "product_version", "name": "fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "product": { "name": "fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "product_id": "fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=x86_64" } } }, { "category": "product_version", "name": "fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "product": { "name": "fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "product_id": "fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=x86_64" } } }, { "category": "product_version", "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "product": { "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "product_id": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "product": { "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "product_id": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "product": { "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "product_id": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "product": { "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "product_id": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "product": { "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "product_id": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "product": { "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "product_id": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "product": { "name": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "product_id": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=x86_64" } } }, { "category": "product_version", "name": "podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "product": { "name": "podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "product_id": "podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=x86_64" } } }, { "category": "product_version", "name": "podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "product": { "name": "podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "product_id": "podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=x86_64" } } }, { "category": "product_version", "name": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "product": { "name": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "product_id": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=x86_64" } } }, { "category": "product_version", "name": "runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "product": { "name": "runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "product_id": "runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=x86_64" } } }, { "category": "product_version", "name": "runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "product": { "name": "runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "product_id": "runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=x86_64" } } }, { "category": "product_version", "name": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "product": { "name": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "product_id": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4903%2B9bde5d6c?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "product": { "name": "skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "product_id": "skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4903%2B9bde5d6c?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "product": { "name": "skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "product_id": "skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4903%2B9bde5d6c?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "product": { "name": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "product_id": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4308%2B9d868e48?arch=x86_64" } } }, { "category": "product_version", "name": "slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "product": { "name": "slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "product_id": "slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4308%2B9d868e48?arch=x86_64" } } }, { "category": "product_version", "name": "slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "product": { "name": "slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "product_id": "slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4308%2B9d868e48?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "product": { "name": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "product_id": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=s390x" } } }, { "category": "product_version", "name": "buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "product": { "name": "buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "product_id": "buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=s390x" } } }, { "category": "product_version", "name": "buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "product": { "name": "buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "product_id": "buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=s390x" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "product": { "name": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "product_id": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=s390x" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "product": { "name": "containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "product_id": "containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=s390x" } } }, { "category": "product_version", "name": "containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "product": { "name": "containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "product_id": "containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@0.7.4-4.git9ebe139.module%2Bel8.1.0%2B4908%2B72a45cef?arch=s390x" } } }, { "category": "product_version", "name": "containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "product": { "name": "containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "product_id": "containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4903%2B9bde5d6c?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "product": { "name": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "product_id": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=s390x" } } }, { "category": "product_version", "name": "fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "product": { "name": "fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "product_id": "fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=s390x" } } }, { "category": "product_version", "name": "fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "product": { "name": "fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "product_id": "fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=s390x" } } }, { "category": "product_version", "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "product": { "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "product_id": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "product": { "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "product_id": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "product": { "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "product_id": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "product": { "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "product_id": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "product": { "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "product_id": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "product": { "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "product_id": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "product": { "name": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "product_id": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=s390x" } } }, { "category": "product_version", "name": "podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "product": { "name": "podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "product_id": "podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=s390x" } } }, { "category": "product_version", "name": "podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "product": { "name": "podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "product_id": "podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=s390x" } } }, { "category": "product_version", "name": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "product": { "name": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "product_id": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=s390x" } } }, { "category": "product_version", "name": "runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "product": { "name": "runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "product_id": "runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=s390x" } } }, { "category": "product_version", "name": "runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "product": { "name": "runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "product_id": "runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=s390x" } } }, { "category": "product_version", "name": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "product": { "name": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "product_id": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4903%2B9bde5d6c?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "product": { "name": "skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "product_id": "skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4903%2B9bde5d6c?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "product": { "name": "skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "product_id": "skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4903%2B9bde5d6c?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "product": { "name": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "product_id": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4308%2B9d868e48?arch=s390x" } } }, { "category": "product_version", "name": "slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "product": { "name": "slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "product_id": "slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4308%2B9d868e48?arch=s390x" } } }, { "category": "product_version", "name": "slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "product": { "name": "slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "product_id": "slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4308%2B9d868e48?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "product": { "name": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "product_id": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=ppc64le" } } }, { "category": "product_version", "name": "buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "product": { "name": "buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "product_id": "buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=ppc64le" } } }, { "category": "product_version", "name": "buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "product": { "name": "buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "product_id": "buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=ppc64le" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "product": { "name": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "product_id": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=ppc64le" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "product": { "name": "containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "product_id": "containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=ppc64le" } } }, { "category": "product_version", "name": "containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "product": { "name": "containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "product_id": "containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@0.7.4-4.git9ebe139.module%2Bel8.1.0%2B4908%2B72a45cef?arch=ppc64le" } } }, { "category": "product_version", "name": "containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "product": { "name": "containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "product_id": "containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4903%2B9bde5d6c?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "product": { "name": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "product_id": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=ppc64le" } } }, { "category": "product_version", "name": "fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "product": { "name": "fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "product_id": "fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=ppc64le" } } }, { "category": "product_version", "name": "fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "product": { "name": "fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "product_id": "fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=ppc64le" } } }, { "category": "product_version", "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "product": { "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "product_id": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "product": { "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "product_id": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "product": { "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "product_id": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "product": { "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "product_id": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "product": { "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "product_id": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "product": { "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "product_id": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "product": { "name": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "product_id": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=ppc64le" } } }, { "category": "product_version", "name": "podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "product": { "name": "podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "product_id": "podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=ppc64le" } } }, { "category": "product_version", "name": "podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "product": { "name": "podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "product_id": "podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=ppc64le" } } }, { "category": "product_version", "name": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "product": { "name": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "product_id": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=ppc64le" } } }, { "category": "product_version", "name": "runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "product": { "name": "runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "product_id": "runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=ppc64le" } } }, { "category": "product_version", "name": "runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "product": { "name": "runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "product_id": "runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=ppc64le" } } }, { "category": "product_version", "name": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "product": { "name": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "product_id": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4903%2B9bde5d6c?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "product": { "name": "skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "product_id": "skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4903%2B9bde5d6c?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "product": { "name": "skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "product_id": "skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4903%2B9bde5d6c?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "product": { "name": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "product_id": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4308%2B9d868e48?arch=ppc64le" } } }, { "category": "product_version", "name": "slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "product": { "name": "slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "product_id": "slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4308%2B9d868e48?arch=ppc64le" } } }, { "category": "product_version", "name": "slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "product": { "name": "slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "product_id": "slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4308%2B9d868e48?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "product": { "name": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "product_id": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=aarch64" } } }, { "category": "product_version", "name": "buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "product": { "name": "buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "product_id": "buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=aarch64" } } }, { "category": "product_version", "name": "buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "product": { "name": "buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "product_id": "buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=aarch64" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "product": { "name": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "product_id": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=aarch64" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "product": { "name": "containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "product_id": "containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=aarch64" } } }, { "category": "product_version", "name": "containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "product": { "name": "containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "product_id": "containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@0.7.4-4.git9ebe139.module%2Bel8.1.0%2B4908%2B72a45cef?arch=aarch64" } } }, { "category": "product_version", "name": "containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "product": { "name": "containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "product_id": "containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4903%2B9bde5d6c?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "product": { "name": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "product_id": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=aarch64" } } }, { "category": "product_version", "name": "fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "product": { "name": "fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "product_id": "fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=aarch64" } } }, { "category": "product_version", "name": "fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "product": { "name": "fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "product_id": "fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=aarch64" } } }, { "category": "product_version", "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "product": { "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "product_id": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "product": { "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "product_id": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "product": { "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "product_id": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "product": { "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "product_id": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "product": { "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "product_id": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "product": { "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "product_id": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B3468%2B011f0ab0?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "product": { "name": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "product_id": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=aarch64" } } }, { "category": "product_version", "name": "podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "product": { "name": "podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "product_id": "podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=aarch64" } } }, { "category": "product_version", "name": "podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "product": { "name": "podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "product_id": "podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=aarch64" } } }, { "category": "product_version", "name": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "product": { "name": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "product_id": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=aarch64" } } }, { "category": "product_version", "name": "runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "product": { "name": "runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "product_id": "runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=aarch64" } } }, { "category": "product_version", "name": "runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "product": { "name": "runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "product_id": "runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4908%2B72a45cef?arch=aarch64" } } }, { "category": "product_version", "name": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "product": { "name": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "product_id": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4903%2B9bde5d6c?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "product": { "name": "skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "product_id": "skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4903%2B9bde5d6c?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "product": { "name": "skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "product_id": "skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4903%2B9bde5d6c?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "product": { "name": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "product_id": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4308%2B9d868e48?arch=aarch64" } } }, { "category": "product_version", "name": "slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "product": { "name": "slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "product_id": "slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4308%2B9d868e48?arch=aarch64" } } }, { "category": "product_version", "name": "slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "product": { "name": "slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "product_id": "slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]%2Bel8.1.0%2B4308%2B9d868e48?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, "product_reference": "container-tools:1.0:8010020191126173920:c294d161", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64" }, "product_reference": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le" }, "product_reference": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x" }, "product_reference": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.src as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.src" }, "product_reference": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64" }, "product_reference": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64" }, "product_reference": "buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le" }, "product_reference": "buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x" }, "product_reference": "buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64" }, "product_reference": "buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64" }, "product_reference": "buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le" }, "product_reference": "buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x" }, "product_reference": "buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64" }, "product_reference": "buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.noarch as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.noarch" }, "product_reference": "container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.src as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.src" }, "product_reference": "container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64" }, "product_reference": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le" }, "product_reference": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x" }, "product_reference": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.src as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.src" }, "product_reference": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64" }, "product_reference": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64" }, "product_reference": "containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le" }, "product_reference": "containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x" }, "product_reference": "containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64" }, "product_reference": "containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64" }, "product_reference": "containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le" }, "product_reference": "containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x" }, "product_reference": "containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64" }, "product_reference": "containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64" }, "product_reference": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le" }, "product_reference": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x" }, "product_reference": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.src as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.src" }, "product_reference": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64" }, "product_reference": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64" }, "product_reference": "fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le" }, "product_reference": "fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x" }, "product_reference": "fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64" }, "product_reference": "fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64" }, "product_reference": "fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le" }, "product_reference": "fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x" }, "product_reference": "fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64" }, "product_reference": "fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64" }, "product_reference": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le" }, "product_reference": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x" }, "product_reference": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.src as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.src" }, "product_reference": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64" }, "product_reference": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64" }, "product_reference": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le" }, "product_reference": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x" }, "product_reference": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64" }, "product_reference": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64" }, "product_reference": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le" }, "product_reference": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x" }, "product_reference": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64" }, "product_reference": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64" }, "product_reference": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le" }, "product_reference": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x" }, "product_reference": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.src as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.src" }, "product_reference": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64" }, "product_reference": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64" }, "product_reference": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le" }, "product_reference": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x" }, "product_reference": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64" }, "product_reference": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64" }, "product_reference": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le" }, "product_reference": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x" }, "product_reference": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64" }, "product_reference": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64" }, "product_reference": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le" }, "product_reference": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x" }, "product_reference": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.src as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.src" }, "product_reference": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64" }, "product_reference": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64" }, "product_reference": "podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le" }, "product_reference": "podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x" }, "product_reference": "podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64" }, "product_reference": "podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64" }, "product_reference": "podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le" }, "product_reference": "podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x" }, "product_reference": "podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64" }, "product_reference": "podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-docker-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.noarch as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-docker-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.noarch" }, "product_reference": "podman-docker-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64" }, "product_reference": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le" }, "product_reference": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x" }, "product_reference": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.src as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.src" }, "product_reference": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64" }, "product_reference": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64" }, "product_reference": "runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le" }, "product_reference": "runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x" }, "product_reference": "runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64" }, "product_reference": "runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64" }, "product_reference": "runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le" }, "product_reference": "runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x" }, "product_reference": "runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64" }, "product_reference": "runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64" }, "product_reference": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le" }, "product_reference": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x" }, "product_reference": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.src as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.src" }, "product_reference": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64" }, "product_reference": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64" }, "product_reference": "skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le" }, "product_reference": "skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x" }, "product_reference": "skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64" }, "product_reference": "skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64" }, "product_reference": "skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le" }, "product_reference": "skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x" }, "product_reference": "skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64" }, "product_reference": "skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64" }, "product_reference": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le" }, "product_reference": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x" }, "product_reference": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.src as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.src" }, "product_reference": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64" }, "product_reference": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64" }, "product_reference": "slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le" }, "product_reference": "slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x" }, "product_reference": "slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64" }, "product_reference": "slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64" }, "product_reference": "slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le" }, "product_reference": "slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x" }, "product_reference": "slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64" }, "product_reference": "slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-docker-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-17T12:56:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-docker-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4273" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-docker-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-docker-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-17T12:56:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-docker-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4273" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-docker-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" } ] }
rhsa-2019_4040
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "New Red Hat Single Sign-On 7.3.5 packages are now available for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Single Sign-On 7.3 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications.\n\nThis release of Red Hat Single Sign-On 7.3.5 on RHEL 6 serves as a replacement for Red Hat Single Sign-On 7.3.4, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* keycloak: Service accounts reset password flow not using placeholder.org domain anymore (CVE-2019-14837)\n\n* undertow: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* undertow: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* undertow: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default (CVE-2019-14838)\n\n* wildfly: wildfly-security-manager: security manager authorization bypass (CVE-2019-14843)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:4040", "url": "https://access.redhat.com/errata/RHSA-2019:4040" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.3/", "url": "https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.3/" }, { "category": "external", "summary": "1730227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1730227" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1751227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751227" }, { "category": "external", "summary": "1752980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752980" }, { "category": "external", "summary": "KEYCLOAK-11815", "url": "https://issues.redhat.com/browse/KEYCLOAK-11815" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_4040.json" } ], "title": "Red Hat Security Advisory: Red Hat Single Sign-On 7.3.5 security update on RHEL 6", "tracking": { "current_release_date": "2024-11-15T04:13:39+00:00", "generator": { "date": "2024-11-15T04:13:39+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2019:4040", "initial_release_date": "2019-12-02T17:04:39+00:00", "revision_history": [ { "date": "2019-12-02T17:04:39+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-12-02T17:04:39+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T04:13:39+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Single Sign-On 7.3 for RHEL 6 Server", "product": { "name": "Red Hat Single Sign-On 7.3 for RHEL 6 Server", "product_id": "6Server-RHSSO-7.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:red_hat_single_sign_on:7::el6" } } } ], "category": "product_family", "name": "Red Hat Single Sign-On" }, { "branches": [ { "category": "product_version", "name": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "product": { "name": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "product_id": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6sso?arch=noarch" } } }, { "category": "product_version", "name": "rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "product": { "name": "rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "product_id": "rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6sso?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "product": { "name": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "product_id": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el6sso?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch as a component of Red Hat Single Sign-On 7.3 for RHEL 6 Server", "product_id": "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" }, "product_reference": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "relates_to_product_reference": "6Server-RHSSO-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src as a component of Red Hat Single Sign-On 7.3 for RHEL 6 Server", "product_id": "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src" }, "product_reference": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "relates_to_product_reference": "6Server-RHSSO-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch as a component of Red Hat Single Sign-On 7.3 for RHEL 6 Server", "product_id": "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" }, "product_reference": "rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "relates_to_product_reference": "6Server-RHSSO-7.3" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:04:39+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4040" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:04:39+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4040" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:04:39+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4040" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "Vadim Ashikhman" ] } ], "cve": "CVE-2019-14837", "cwe": { "id": "CWE-547", "name": "Use of Hard-coded, Security-relevant Constants" }, "discovery_date": "2019-07-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1730227" } ], "notes": [ { "category": "description", "text": "A flaw was found in Keycloak. The use of an open hard-coded domain can allow an unauthorized login by setting up a mail server and resetting the user credentials, enabling information disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak: keycloak uses hardcoded open dummy domain for new accounts enabling information disclosure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14837" }, { "category": "external", "summary": "RHBZ#1730227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1730227" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14837", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14837" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14837", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14837" } ], "release_date": "2019-12-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:04:39+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4040" }, { "category": "workaround", "details": "It is not a very straight forward workaround but it is possible to mitigate this by manually editing the default Email ID ([email protected]) to some valid email ID ([email protected]) in the USER_ENTITY table in the RHSSO database used.", "product_ids": [ "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "keycloak: keycloak uses hardcoded open dummy domain for new accounts enabling information disclosure" }, { "acknowledgments": [ { "names": [ "F\u00e1bio Magalh\u00e3es de Andrade" ], "organization": "Sonda Ativas" }, { "names": [ "Juliano de Castro Santos", "Leonard Lunardi" ], "organization": "UnimedBH" } ], "cve": "CVE-2019-14838", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2019-08-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1751227" } ], "notes": [ { "category": "description", "text": "It was found that Wildfly users had default user permissions set incorrectly. A malicious user could use this flaw to access unauthorized controls for the application server.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14838" }, { "category": "external", "summary": "RHBZ#1751227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751227" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14838", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14838" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14838", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14838" }, { "category": "external", "summary": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14838", "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14838" } ], "release_date": "2019-10-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:04:39+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4040" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default" }, { "cve": "CVE-2019-14843", "cwe": { "id": "CWE-592", "name": "CWE-592" }, "discovery_date": "2019-09-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1752980" } ], "notes": [ { "category": "description", "text": "A flaw was found in Wildfly Security Manager, running under JDK 11 or 8, that authorized requests for any requester. This flaw could be used by a malicious app deployed on the app server to access unauthorized information and possibly conduct further attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-security-manager: security manager authorization bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14843" }, { "category": "external", "summary": "RHBZ#1752980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752980" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14843", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14843" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14843", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14843" } ], "release_date": "2019-09-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:04:39+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4040" }, { "category": "workaround", "details": "This flaw only affects the Security Manager running under JDK 11 or 8. To mitigate exposure to this flaw, do not run under those JDK versions.", "product_ids": [ "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "wildfly-security-manager: security manager authorization bypass" } ] }
rhsa-2020_2067
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat build of Thorntail.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability. For more information, see the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "This release of Red Hat build of Thorntail 2.5.1 includes security updates, bug fixes, and enhancements. For more information, see the release notes page listed in the References section.\n\nSecurity Fix(es):\n\n* apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default (CVE-2019-10086)\n\n* cxf: does not restrict the number of message attachments (CVE-2019-12406)\n\n* cxf: OpenId Connect token service does not properly validate the clientId (CVE-2019-12419)\n\n* hibernate-validator: safeHTML validator allows XSS (CVE-2019-10219)\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511)\n\n* jackson-databind: Multiple serialization gadgets (CVE-2019-17531, CVE-2019-16943, CVE-2019-16942, CVE-2019-17267, CVE-2019-14540, CVE-2019-16335, CVE-2019-14893, CVE-2019-14892, CVE-2020-9546, CVE-2020-9547, CVE-2020-9548, CVE-2020-10969, CVE-2020-10968, CVE-2020-11111, CVE-2020-11112, CVE-2020-11113, CVE-2020-11619, CVE-2020-11620, CVE-2019-20330, CVE-2020-8840)\n\n* jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command \nexecution (CVE-2020-10672, CVE-2020-10673)\n\n* keycloak: adapter endpoints are exposed via arbitrary URLs (CVE-2019-14820)\n\n* keycloak: missing signatures validation on CRL used to verify client certificates (CVE-2019-3875)\n\n* keycloak: SAML broker does not check existence of signature on document allowing any user impersonation (CVE-2019-10201)\n\n* keycloak: CSRF check missing in My Resources functionality in the Account Console (CVE-2019-10199)\n\n* keycloak: cross-realm user access auth bypass (CVE-2019-14832)\n\n* netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling (CVE-2020-7238)\n\n* SmallRye: SecuritySupport class is incorrectly public and contains a static method to access the current threads context class loader (CVE-2020-1729)\n\n* thrift: Out-of-bounds read related to TJSONProtocol or TSimpleJSONProtocol (CVE-2019-0210)\n\n* thrift: Endless loop when feed with specific input data (CVE-2019-0205)\n\n* undertow: possible Denial Of Service (DOS) in Undertow HTTP server listening on HTTPS (CVE-2019-14888)\n\n* wildfly: The \u0027enabled-protocols\u0027 value in legacy security is not respected if OpenSSL security provider is in use (CVE-2019-14887)\n\n* wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default (CVE-2019-14838)\n\n* xml-security: Apache Santuario potentially loads XML parsing code from an untrusted source (CVE-2019-12400)\n\nFor more details about the security issues and their impact, the CVSS score, acknowledgements, and other related information, see the CVE pages listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:2067", "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=catRhoar.thorntail\u0026version=2.5.1", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=catRhoar.thorntail\u0026version=2.5.1" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_build_of_thorntail/2.5/html/release_notes_for_thorntail_2.5/", "url": "https://access.redhat.com/documentation/en-us/red_hat_build_of_thorntail/2.5/html/release_notes_for_thorntail_2.5/" }, { "category": "external", "summary": "1649870", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1649870" }, { "category": "external", "summary": "1690628", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1690628" }, { "category": "external", "summary": "1728609", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1728609" }, { "category": "external", "summary": "1729261", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1729261" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1738673", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1738673" }, { "category": "external", "summary": "1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "1749487", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1749487" }, { "category": "external", "summary": "1751227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751227" }, { "category": "external", "summary": "1755831", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755831" }, { "category": "external", "summary": "1755849", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755849" }, { "category": "external", "summary": "1758167", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758167" }, { "category": "external", "summary": "1758171", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758171" }, { "category": "external", "summary": "1758182", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758182" }, { "category": "external", "summary": "1758187", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758187" }, { "category": "external", "summary": "1758191", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758191" }, { "category": "external", "summary": "1764607", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764607" }, { "category": "external", "summary": "1764612", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764612" }, { "category": "external", "summary": "1764658", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764658" }, { "category": "external", "summary": "1767483", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767483" }, { "category": "external", "summary": "1772008", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772008" }, { "category": "external", "summary": "1772464", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772464" }, { "category": "external", "summary": "1775293", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775293" }, { "category": "external", "summary": "1793154", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793154" }, { "category": "external", "summary": "1796225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796225" }, { "category": "external", "summary": "1802444", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802444" }, { "category": "external", "summary": "1815470", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1815470" }, { "category": "external", "summary": "1815495", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1815495" }, { "category": "external", "summary": "1816170", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816170" }, { "category": "external", "summary": "1816175", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816175" }, { "category": "external", "summary": "1816330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816330" }, { "category": "external", "summary": "1816332", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816332" }, { "category": "external", "summary": "1816337", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816337" }, { "category": "external", "summary": "1816340", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816340" }, { "category": "external", "summary": "1819208", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819208" }, { "category": "external", "summary": "1819212", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819212" }, { "category": "external", "summary": "1821304", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821304" }, { "category": "external", "summary": "1821311", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821311" }, { "category": "external", "summary": "1821315", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821315" }, { "category": "external", "summary": "1826798", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1826798" }, { "category": "external", "summary": "1826805", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1826805" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_2067.json" } ], "title": "Red Hat Security Advisory: Red Hat build of Thorntail 2.5.1 security and bug fix update", "tracking": { "current_release_date": "2025-01-05T19:09:25+00:00", "generator": { "date": "2025-01-05T19:09:25+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.5" } }, "id": "RHSA-2020:2067", "initial_release_date": "2020-05-18T10:24:57+00:00", "revision_history": [ { "date": "2020-05-18T10:24:57+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-05-18T10:24:57+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-01-05T19:09:25+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Text-Only RHOAR", "product": { "name": "Text-Only RHOAR", "product_id": "Text-Only RHOAR", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift_application_runtimes:1.0" } } } ], "category": "product_family", "name": "Red Hat OpenShift Application Runtimes" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-0205", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-10-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1764612" } ], "notes": [ { "category": "description", "text": "In Apache Thrift all versions up to and including 0.12.0, a server or client may run into an endless loop when feed with specific input data. Because the issue had already been partially fixed in version 0.11.0, depending on the installed version it affects only certain language bindings.", "title": "Vulnerability description" }, { "category": "summary", "text": "thrift: Endless loop when feed with specific input data", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains a vulnerable version of libthrift. However, OpenDaylight does not expose libthrift in a vulnerable way, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe thrift package in OpenShift Container Platform is installed only in Curator images in the Logging stack. The affected code is included in this package, it\u0027s functionality is not used. This vulnerability is therefore rated Low for OpenShift Container Platform.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-0205" }, { "category": "external", "summary": "RHBZ#1764612", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764612" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0205", "url": "https://www.cve.org/CVERecord?id=CVE-2019-0205" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0205", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0205" } ], "release_date": "2019-10-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "thrift: Endless loop when feed with specific input data" }, { "cve": "CVE-2019-0210", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2019-10-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1764607" } ], "notes": [ { "category": "description", "text": "In Apache Thrift 0.9.3 to 0.12.0, a server implemented in Go using TJSONProtocol or TSimpleJSONProtocol may panic when feed with invalid input data.", "title": "Vulnerability description" }, { "category": "summary", "text": "thrift: Out-of-bounds read related to TJSONProtocol or TSimpleJSONProtocol", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains a vulnerable version of libthrift. However, OpenDaylight is not affected as this is a Golang specific problem, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe version of thrift delivered in OpenShift Container Platform is not affected by this vulnerability as it does not contain the affected code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-0210" }, { "category": "external", "summary": "RHBZ#1764607", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764607" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0210", "url": "https://www.cve.org/CVERecord?id=CVE-2019-0210" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0210", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0210" } ], "release_date": "2019-10-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "thrift: Out-of-bounds read related to TJSONProtocol or TSimpleJSONProtocol" }, { "acknowledgments": [ { "names": [ "Marek Posolda" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2019-3875", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "discovery_date": "2019-03-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1690628" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in keycloak before 6.0.2. The X.509 authenticator supports the verification of client certificates through the CRL, where the CRL list can be obtained from the URL provided in the certificate itself (CDP) or through the separately configured path. The CRL are often available over the network through unsecured protocols (\u0027http\u0027 or \u0027ldap\u0027) and hence the caller should verify the signature and possibly the certification path. Keycloak currently doesn\u0027t validate signatures on CRL, which can result in a possibility of various attacks like man-in-the-middle.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak: missing signatures validation on CRL used to verify client certificates", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-3875" }, { "category": "external", "summary": "RHBZ#1690628", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1690628" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-3875", "url": "https://www.cve.org/CVERecord?id=CVE-2019-3875" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3875", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3875" } ], "release_date": "2019-06-11T14:22:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "keycloak: missing signatures validation on CRL used to verify client certificates" }, { "cve": "CVE-2019-9511", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741860" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker can request a large amount of data by manipulating window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this queue can consume excess CPU, memory, or both, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: large amount of data requests leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "There are no mitigations available for nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "RHBZ#1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9511", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: large amount of data requests leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "cve": "CVE-2019-10086", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-10-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1767483" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Apache Commons BeanUtils, where the class property in PropertyUtilsBean is not suppressed by default. This flaw allows an attacker to access the classloader.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10086" }, { "category": "external", "summary": "RHBZ#1767483", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767483" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10086", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10086" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10086", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10086" }, { "category": "external", "summary": "https://commons.apache.org/proper/commons-beanutils/javadocs/v1.9.4/RELEASE-NOTES.txt", "url": "https://commons.apache.org/proper/commons-beanutils/javadocs/v1.9.4/RELEASE-NOTES.txt" } ], "release_date": "2019-08-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "There is no currently known mitigation for this flaw.", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default" }, { "cve": "CVE-2019-10199", "cwe": { "id": "CWE-352", "name": "Cross-Site Request Forgery (CSRF)" }, "discovery_date": "2019-07-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1729261" } ], "notes": [ { "category": "description", "text": "It was found that Keycloak\u0027s account console did not perform adequate header checks in some requests. An attacker could use this flaw to trick an authenticated user into performing operations via request from an untrusted domain.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak: CSRF check missing in My Resources functionality in the Account Console", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10199" }, { "category": "external", "summary": "RHBZ#1729261", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1729261" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10199", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10199" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10199", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10199" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "keycloak: CSRF check missing in My Resources functionality in the Account Console" }, { "cve": "CVE-2019-10201", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2019-07-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1728609" } ], "notes": [ { "category": "description", "text": "It was found that Keycloak\u0027s SAML broker did not verify missing message signatures. If an attacker modifies the SAML Response and removes the \u003cSignature\u003e sections, the message is still accepted, and the message can be modified. An attacker could use this flaw to impersonate other users and gain access to sensitive information.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak: SAML broker does not check existence of signature on document allowing any user impersonation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10201" }, { "category": "external", "summary": "RHBZ#1728609", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1728609" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10201", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10201" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10201", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10201" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "Administrator can prevent this issue for POST binding by requiring signed assertions.", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "keycloak: SAML broker does not check existence of signature on document allowing any user impersonation" }, { "acknowledgments": [ { "names": [ "Dominik Mizyn" ], "organization": "Samsung R\u0026D Institute Poland" } ], "cve": "CVE-2019-10219", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2019-05-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1738673" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Hibernate-Validator. The SafeHtml validator annotation fails to properly sanitize payloads consisting of potentially malicious code in HTML comments and instructions. This vulnerability can result in an XSS attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "hibernate-validator: safeHTML validator allows XSS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform\u0027s OpenDaylight will not be updated for this flaw because it is being deprecated and is only receiving security fixes for Important and Critical flaws.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10219" }, { "category": "external", "summary": "RHBZ#1738673", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1738673" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10219", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10219" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10219", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10219" } ], "release_date": "2019-08-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hibernate-validator: safeHTML validator allows XSS" }, { "cve": "CVE-2019-12400", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2019-08-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1764658" } ], "notes": [ { "category": "description", "text": "In version 2.0.3 Apache Santuario XML Security for Java, a caching mechanism was introduced to speed up creating new XML documents using a static pool of DocumentBuilders. However, if some untrusted code can register a malicious implementation with the thread context class loader first, then this implementation might be cached and re-used by Apache Santuario - XML Security for Java, leading to potential security flaws when validating signed documents, etc. The vulnerability affects Apache Santuario - XML Security for Java 2.0.x releases from 2.0.3 and all 2.1.x releases before 2.1.4.", "title": "Vulnerability description" }, { "category": "summary", "text": "xml-security: Apache Santuario potentially loads XML parsing code from an untrusted source", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-12400" }, { "category": "external", "summary": "RHBZ#1764658", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764658" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-12400", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12400" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-12400", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12400" } ], "release_date": "2019-08-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xml-security: Apache Santuario potentially loads XML parsing code from an untrusted source" }, { "cve": "CVE-2019-12406", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-03-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816170" } ], "notes": [ { "category": "description", "text": "Apache CXF before 3.3.4 and 3.2.11 does not restrict the number of message attachments present in a given message. This leaves open the possibility of a denial of service type attack, where a malicious user crafts a message containing a very large number of message attachments. From the 3.3.4 and 3.2.11 releases, a default limit of 50 message attachments is enforced. This is configurable via the message property \"attachment-max-count\".", "title": "Vulnerability description" }, { "category": "summary", "text": "cxf: does not restrict the number of message attachments", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-12406" }, { "category": "external", "summary": "RHBZ#1816170", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816170" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-12406", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12406" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-12406", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12406" } ], "release_date": "2019-11-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "cxf: does not restrict the number of message attachments" }, { "cve": "CVE-2019-12419", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2020-03-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816175" } ], "notes": [ { "category": "description", "text": "A flaw was found in cxf in versions prior to 3.2.11 and 3.3.4. The access token services do not properly validate that an authenticated principal is equal to that of the supplied clientId parameter allowing a malicious client to use an authorization code that has been issued to a different client as their own. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "cxf: OpenId Connect token service does not properly validate the clientId", "title": "Vulnerability summary" }, { "category": "other", "text": "In OpenShift Logging the openshift-logging/elasticsearch6-rhel8 container bundles the vulnerable version of apache-cxf, but the vulnerable class is not shipped, hence this component is not affected by this vulnerability.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-12419" }, { "category": "external", "summary": "RHBZ#1816175", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816175" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-12419", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12419" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-12419", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12419" } ], "release_date": "2019-11-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "cxf: OpenId Connect token service does not properly validate the clientId" }, { "cve": "CVE-2019-14540", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1755849" } ], "notes": [ { "category": "description", "text": "A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to com.zaxxer.hikari.HikariConfig.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nSatellite 6 does not enable polymorphic unmarshmalling, which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14540" }, { "category": "external", "summary": "RHBZ#1755849", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755849" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14540", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14540" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14540", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14540" } ], "release_date": "2019-09-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "This vulnerability relies on com.zaxxer.hikari.HikariConfig being present in the application\u0027s ClassPath. Hikari is not packaged as an RPM for Red Hat Enterprise Linux or Red Hat Software Collections. Applications using jackson-databind that do not also use com.zaxxer.hikari are not impacted by this vulnerability.\n\nA mitigation to this class of problem in jackson-databind is to not trigger polymorphic desrialization globally by using: objectMapper.enableDefaultTyping() and rather use @JsonTypeInfo on the class property to explicitly define the type information. For more information on this issue please refer to https://www.github.com/mbechler/marshalsec/blob/master/marshalsec.pdf?raw=true", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig" }, { "cve": "CVE-2019-14820", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-11-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1649870" } ], "notes": [ { "category": "description", "text": "It was found that keycloak exposes internal adapter endpoints in org.keycloak.constants.AdapterConstants, which can be invoked via a specially-crafted URL. This vulnerability could allow an attacker to access unauthorized information.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak: adapter endpoints are exposed via arbitrary URLs", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14820" }, { "category": "external", "summary": "RHBZ#1649870", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1649870" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14820", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14820" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14820", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14820" } ], "release_date": "2019-10-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "keycloak: adapter endpoints are exposed via arbitrary URLs" }, { "cve": "CVE-2019-14832", "cwe": { "id": "CWE-863", "name": "Incorrect Authorization" }, "discovery_date": "2019-07-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1749487" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Keycloak REST API where it would permit user access from a realm the user was not configured. An authenticated attacker with knowledge of a user id could use this flaw to access unauthorized information or to carry out further attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak: cross-realm user access auth bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14832" }, { "category": "external", "summary": "RHBZ#1749487", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1749487" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14832", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14832" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14832", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14832" } ], "release_date": "2019-10-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "keycloak: cross-realm user access auth bypass" }, { "acknowledgments": [ { "names": [ "F\u00e1bio Magalh\u00e3es de Andrade" ], "organization": "Sonda Ativas" }, { "names": [ "Juliano de Castro Santos", "Leonard Lunardi" ], "organization": "UnimedBH" } ], "cve": "CVE-2019-14838", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2019-08-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1751227" } ], "notes": [ { "category": "description", "text": "It was found that Wildfly users had default user permissions set incorrectly. A malicious user could use this flaw to access unauthorized controls for the application server.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14838" }, { "category": "external", "summary": "RHBZ#1751227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751227" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14838", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14838" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14838", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14838" }, { "category": "external", "summary": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14838", "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14838" } ], "release_date": "2019-10-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default" }, { "cve": "CVE-2019-14887", "cwe": { "id": "CWE-757", "name": "Selection of Less-Secure Algorithm During Negotiation (\u0027Algorithm Downgrade\u0027)" }, "discovery_date": "2019-11-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1772008" } ], "notes": [ { "category": "description", "text": "A flaw was found when an OpenSSL security provider is used with Wildfly, the \u0027enabled-protocols\u0027 value in the Wildfly configuration isn\u0027t honored. An attacker could target the traffic sent from Wildfly and downgrade the connection to a weaker version of TLS, potentially breaking the encryption. This could lead to a leak of the data being passed over the network.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly: The \u0027enabled-protocols\u0027 value in legacy security is not respected if OpenSSL security provider is in use", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14887" }, { "category": "external", "summary": "RHBZ#1772008", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772008" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14887", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14887" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14887", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14887" } ], "release_date": "2020-03-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "Avoid using an OpenSSL security provider and instead use the default configuration or regular JSSE provider with \u0027TLS\u0027.", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wildfly: The \u0027enabled-protocols\u0027 value in legacy security is not respected if OpenSSL security provider is in use" }, { "acknowledgments": [ { "names": [ "Henning Baldersheim", "H\u00e5vard Pettersen" ], "organization": "Verizon Media" } ], "cve": "CVE-2019-14888", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-10-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1772464" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the Undertow HTTP server listening on HTTPS. An attacker can target the HTTPS port to carry out a Denial Of Service (DOS) to make the service unavailable on SSL.", "title": "Vulnerability description" }, { "category": "summary", "text": "undertow: possible Denial Of Service (DOS) in Undertow HTTP server listening on HTTPS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14888" }, { "category": "external", "summary": "RHBZ#1772464", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772464" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14888", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14888" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14888", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14888" } ], "release_date": "2020-01-20T12:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "Enable HTTP2 (enable-http2=\"true\") in the undertow\u0027s HTTPS settings.", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "undertow: possible Denial Of Service (DOS) in Undertow HTTP server listening on HTTPS" }, { "cve": "CVE-2019-14892", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-09-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1758171" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in jackson-databind in versions before 2.9.10, 2.8.11.5 and 2.6.7.3, where it would permit polymorphic deserialization of a malicious object using commons-configuration 1 and 2 JNDI classes. An attacker could use this flaw to execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in classes of the commons-configuration package", "title": "Vulnerability summary" }, { "category": "other", "text": "Satellite 6 does not enable polymorphic unmarshmalling, which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14892" }, { "category": "external", "summary": "RHBZ#1758171", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758171" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14892", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14892" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14892", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14892" } ], "release_date": "2019-09-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in classes of the commons-configuration package" }, { "cve": "CVE-2019-14893", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-09-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1758182" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in FasterXML jackson-databind in all versions before 2.9.10 and 2.10.0, where it would permit polymorphic deserialization of malicious objects using the xalan JNDI gadget when used in conjunction with polymorphic type handling methods such as `enableDefaultTyping()` or when @JsonTypeInfo is using `Id.CLASS` or `Id.MINIMAL_CLASS` or in any other way which ObjectMapper.readValue might instantiate objects from unsafe sources. An attacker could use this flaw to execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in classes of the xalan package", "title": "Vulnerability summary" }, { "category": "other", "text": "Satellite 6 does not enable polymorphic unmarshmalling, which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14893" }, { "category": "external", "summary": "RHBZ#1758182", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758182" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14893", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14893" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14893", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14893" } ], "release_date": "2019-09-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in classes of the xalan package" }, { "cve": "CVE-2019-16335", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1755831" } ], "notes": [ { "category": "description", "text": "A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to com.zaxxer.hikari.HikariDataSource. This is a different vulnerability than CVE-2019-14540.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nSatellite 6 does not enable polymorphic unmarshmalling, which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-16335" }, { "category": "external", "summary": "RHBZ#1755831", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755831" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16335", "url": "https://www.cve.org/CVERecord?id=CVE-2019-16335" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16335", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16335" } ], "release_date": "2019-09-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "This vulnerability relies on com.zaxxer.hikari.HikariDataSource being present in the application\u0027s ClassPath. Hikari is not packaged as an RPM for Red Hat Enterprise Linux or Red Hat Software Collections. Applications using jackson-databind that do not also use com.zaxxer.hikari are not impacted by this vulnerability.\n\nA mitigation to this class of problem in jackson-databind is to not trigger polymorphic desrialization globally by using: objectMapper.enableDefaultTyping() and rather use @JsonTypeInfo on the class property to explicitly define the type information. For more information on this issue please refer to https://www.github.com/mbechler/marshalsec/blob/master/marshalsec.pdf?raw=true", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource" }, { "cve": "CVE-2019-16942", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-09-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1758187" } ], "notes": [ { "category": "description", "text": "A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the commons-dbcp (1.4) jar in the classpath, and an attacker can find an RMI service endpoint to access, it is possible to make the service execute a malicious payload. This issue exists because of org.apache.commons.dbcp.datasources.SharedPoolDataSource and org.apache.commons.dbcp.datasources.PerUserPoolDataSource mishandling.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.*", "title": "Vulnerability summary" }, { "category": "other", "text": "Satellite 6 does not enable polymorphic unmarshmalling, which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-16942" }, { "category": "external", "summary": "RHBZ#1758187", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758187" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16942", "url": "https://www.cve.org/CVERecord?id=CVE-2019-16942" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16942", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16942" } ], "release_date": "2019-09-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.*" }, { "cve": "CVE-2019-16943", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-09-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1758191" } ], "notes": [ { "category": "description", "text": "A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the p6spy (3.8.6) jar in the classpath, and an attacker can find an RMI service endpoint to access, it is possible to make the service execute a malicious payload. This issue exists because of com.p6spy.engine.spy.P6DataSource mishandling.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource", "title": "Vulnerability summary" }, { "category": "other", "text": "Satellite 6 does not enable polymorphic unmarshmalling, which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-16943" }, { "category": "external", "summary": "RHBZ#1758191", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758191" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16943", "url": "https://www.cve.org/CVERecord?id=CVE-2019-16943" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16943", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16943" } ], "release_date": "2019-09-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource" }, { "cve": "CVE-2019-17267", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-09-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1758167" } ], "notes": [ { "category": "description", "text": "A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to net.sf.ehcache.hibernate.EhcacheJtaTransactionManagerLookup.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in classes of the ehcache package", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nRed Hat OpenShift Container Platform does ship the vulnerable component, but does not enable the unsafe conditions needed to exploit, lowering their vulnerability impact.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-17267" }, { "category": "external", "summary": "RHBZ#1758167", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758167" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-17267", "url": "https://www.cve.org/CVERecord?id=CVE-2019-17267" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-17267", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17267" } ], "release_date": "2019-09-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in classes of the ehcache package" }, { "cve": "CVE-2019-17531", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2019-11-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1775293" } ], "notes": [ { "category": "description", "text": "A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the apache-log4j-extra (version 1.2.x) jar in the classpath, and an attacker can provide a JNDI service to access, it is possible to make the service execute a malicious payload.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.*", "title": "Vulnerability summary" }, { "category": "other", "text": "Satellite 6 does not enable polymorphic unmarshmalling, which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenShift Container Platform does ship the vulnerable component, but does not enable the unsafe conditions needed to exploit, lowering their vulnerability impact.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-17531" }, { "category": "external", "summary": "RHBZ#1775293", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775293" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-17531", "url": "https://www.cve.org/CVERecord?id=CVE-2019-17531" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-17531", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17531" } ], "release_date": "2019-10-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.*" }, { "cve": "CVE-2019-20330", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-01-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1793154" } ], "notes": [ { "category": "description", "text": "FasterXML jackson-databind 2.x before 2.9.10.2 lacks certain net.sf.ehcache blocking.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: lacks certain net.sf.ehcache blocking", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20330" }, { "category": "external", "summary": "RHBZ#1793154", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793154" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20330", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20330" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20330", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20330" } ], "release_date": "2020-01-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: lacks certain net.sf.ehcache blocking" }, { "acknowledgments": [ { "names": [ "Darran Lofthouse" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2020-1729", "cwe": { "id": "CWE-863", "name": "Incorrect Authorization" }, "discovery_date": "2019-09-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1802444" } ], "notes": [ { "category": "description", "text": "A flaw was found in SmallRye\u0027s API through version 1.6.1. The API can allow other code running within the application server to potentially obtain the ClassLoader, bypassing any permissions checks that should have been applied. The largest threat from this vulnerability is a threat to data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "SmallRye: SecuritySupport class is incorrectly public and contains a static method to access the current threads context class loader", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-1729" }, { "category": "external", "summary": "RHBZ#1802444", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802444" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-1729", "url": "https://www.cve.org/CVERecord?id=CVE-2020-1729" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1729", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1729" } ], "release_date": "2020-02-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "SmallRye: SecuritySupport class is incorrectly public and contains a static method to access the current threads context class loader" }, { "cve": "CVE-2020-7238", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1796225" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty, where it mishandles Transfer-Encoding whitespace. This flaw allows HTTP Request Smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that the previous vulnerability, CVE-2019-16869, does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit both these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships vulnerable netty version embedded in Candlepin, however, is not directly vulnerable since HTTP requests are handled by Tomcat and not netty.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-7238" }, { "category": "external", "summary": "RHBZ#1796225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796225" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-7238", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7238" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7238", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7238" }, { "category": "external", "summary": "https://netty.io/news/2019/12/18/4-1-44-Final.html", "url": "https://netty.io/news/2019/12/18/4-1-44-Final.html" } ], "release_date": "2020-01-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling" }, { "cve": "CVE-2020-8840", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816330" } ], "notes": [ { "category": "description", "text": "A flaw was found in FasterXML jackson-databind in versions 2.0.0 through 2.9.10.2. A \"gadget\" exploit is possible due to a lack of a Java object being blocking from being deserialized. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Lacks certain xbean-reflect/JNDI blocking", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8840" }, { "category": "external", "summary": "RHBZ#1816330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816330" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8840", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8840" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8840", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8840" } ], "release_date": "2020-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: Lacks certain xbean-reflect/JNDI blocking" }, { "cve": "CVE-2020-9546", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816332" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in shaded-hikari-config", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9546" }, { "category": "external", "summary": "RHBZ#1816332", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816332" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9546", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9546" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9546", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9546" } ], "release_date": "2020-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: Serialization gadgets in shaded-hikari-config" }, { "cve": "CVE-2020-9547", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816337" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in ibatis-sqlmap", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9547" }, { "category": "external", "summary": "RHBZ#1816337", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816337" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9547", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9547" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9547", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9547" } ], "release_date": "2020-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: Serialization gadgets in ibatis-sqlmap" }, { "cve": "CVE-2020-9548", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816340" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in anteros-core", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9548" }, { "category": "external", "summary": "RHBZ#1816340", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816340" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9548", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9548" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9548", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9548" } ], "release_date": "2020-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: Serialization gadgets in anteros-core" }, { "cve": "CVE-2020-10672", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2020-03-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1815495" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10672" }, { "category": "external", "summary": "RHBZ#1815495", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1815495" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10672", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10672" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10672", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10672" } ], "release_date": "2020-03-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution" }, { "cve": "CVE-2020-10673", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2020-03-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1815470" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time. Additionally, the gadget is not available within Red Hat Openstack Platform\u0027s OpenDaylight.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10673" }, { "category": "external", "summary": "RHBZ#1815470", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1815470" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10673", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10673" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10673", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10673" } ], "release_date": "2020-03-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution" }, { "cve": "CVE-2020-10968", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1819208" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x prior to version 2.9.10.4. The interaction between serialization gadgets and typing is mishandled in the bus-proxy. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10968" }, { "category": "external", "summary": "RHBZ#1819208", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819208" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10968", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10968" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10968", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10968" } ], "release_date": "2020-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider" }, { "cve": "CVE-2020-10969", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1819212" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in javax.swing.JEditorPane", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10969" }, { "category": "external", "summary": "RHBZ#1819212", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819212" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10969", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10969" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10969", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10969" } ], "release_date": "2020-03-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: Serialization gadgets in javax.swing.JEditorPane" }, { "cve": "CVE-2020-11111", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2020-03-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1821304" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.apache.activemq.jms.pool.XaPooledConnectionFactory", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11111" }, { "category": "external", "summary": "RHBZ#1821304", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821304" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11111", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11111" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11111", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11111" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/2664", "url": "https://github.com/FasterXML/jackson-databind/issues/2664" } ], "release_date": "2020-03-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: Serialization gadgets in org.apache.activemq.jms.pool.XaPooledConnectionFactory" }, { "cve": "CVE-2020-11112", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2020-03-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1821311" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.apache.commons.proxy.provider.remoting.RmiProvider", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11112" }, { "category": "external", "summary": "RHBZ#1821311", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821311" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11112", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11112" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11112", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11112" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/2666", "url": "https://github.com/FasterXML/jackson-databind/issues/2666" } ], "release_date": "2020-03-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: Serialization gadgets in org.apache.commons.proxy.provider.remoting.RmiProvider" }, { "cve": "CVE-2020-11113", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2020-03-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1821315" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11113" }, { "category": "external", "summary": "RHBZ#1821315", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821315" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11113", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11113" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11113", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11113" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/2670", "url": "https://github.com/FasterXML/jackson-databind/issues/2670" } ], "release_date": "2020-03-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime" }, { "cve": "CVE-2020-11619", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-04-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1826805" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.springframework:spring-aop", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11619" }, { "category": "external", "summary": "RHBZ#1826805", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1826805" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11619", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11619" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11619", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11619" } ], "release_date": "2020-04-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: Serialization gadgets in org.springframework:spring-aop" }, { "cve": "CVE-2020-11620", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-04-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1826798" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in commons-jelly:commons-jelly", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11620" }, { "category": "external", "summary": "RHBZ#1826798", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1826798" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11620", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11620" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11620", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11620" } ], "release_date": "2020-04-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: Serialization gadgets in commons-jelly:commons-jelly" } ] }
rhsa-2019:4352
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat JBoss Fuse 6.3 and Red Hat JBoss A-MQ 6.3.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Fuse provides a small-footprint, flexible, open source enterprise service bus and integration platform. Red Hat A-MQ is a standards compliant messaging system that is tailored for use in mission critical applications.\n\nThis patch is an update to Red Hat Fuse 6.3 and Red Hat A-MQ 6.3. It includes bug fixes, which are documented in the patch notes accompanying the package on the download page. See the download link given in the references section below.\n\nSecurity fix(es):\n\n* zookeeper: Information disclosure in Apache ZooKeeper (CVE-2019-0201)\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515) \n\n* HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)\n\n* xstream: remote code execution due to insecure XML deserialization (CVE-2019-10173)\n\n* jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution (CVE-2019-12384)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:4352", "url": "https://access.redhat.com/errata/RHSA-2019:4352" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=jboss.amq.broker\u0026downloadType=securityPatches\u0026version=6.3.0", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=jboss.amq.broker\u0026downloadType=securityPatches\u0026version=6.3.0" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=jboss.fuse\u0026downloadType=securityPatches\u0026version=6.3", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=jboss.fuse\u0026downloadType=securityPatches\u0026version=6.3" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_fuse/6.3/html/release_notes/index", "url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_fuse/6.3/html/release_notes/index" }, { "category": "external", "summary": "1715197", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1715197" }, { "category": "external", "summary": "1722971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1722971" }, { "category": "external", "summary": "1725807", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1725807" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_4352.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Fuse/A-MQ 6.3 R14 security and bug fix update", "tracking": { "current_release_date": "2025-04-09T17:26:18+00:00", "generator": { "date": "2025-04-09T17:26:18+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.2" } }, "id": "RHSA-2019:4352", "initial_release_date": "2019-12-19T17:37:50+00:00", "revision_history": [ { "date": "2019-12-19T17:37:50+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-12-19T17:37:50+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-04-09T17:26:18+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Fuse 6.3", "product": { "name": "Red Hat Fuse 6.3", "product_id": "Red Hat Fuse 6.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_amq:6.3" } } } ], "category": "product_family", "name": "Red Hat JBoss Fuse" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-0201", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "discovery_date": "2019-05-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1715197" } ], "notes": [ { "category": "description", "text": "A flaw was found in Apache ZooKeeper. A lack of permission checks while retrieving ACLs allows unsalted hash values to be disclosed for unauthenticated or unprivileged users.", "title": "Vulnerability description" }, { "category": "summary", "text": "zookeeper: Information disclosure in Apache ZooKeeper", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 6.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-0201" }, { "category": "external", "summary": "RHBZ#1715197", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1715197" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0201", "url": "https://www.cve.org/CVERecord?id=CVE-2019-0201" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0201", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0201" } ], "release_date": "2019-05-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-19T17:37:50+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are located in the download section of the customer portal.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Fuse 6.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4352" }, { "category": "workaround", "details": "Use an authentication method other than Digest (e.g. Kerberos) or upgrade to zookeeper 3.4.14 or later (3.5.5 or later if on the 3.5 branch). [https://zookeeper.apache.org/security.html#CVE-2019-0201]", "product_ids": [ "Red Hat Fuse 6.3" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 6.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "zookeeper: Information disclosure in Apache ZooKeeper" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 6.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-19T17:37:50+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are located in the download section of the customer portal.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Fuse 6.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4352" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 6.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 6.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-19T17:37:50+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are located in the download section of the customer portal.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Fuse 6.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4352" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 6.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 6.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-19T17:37:50+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are located in the download section of the customer portal.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Fuse 6.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4352" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 6.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9518", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735749" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using frames with an empty payload, a flood could occur that results in excessive CPU usage and starvation of other clients. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using empty frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 6.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9518" }, { "category": "external", "summary": "RHBZ#1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9518", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-19T17:37:50+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are located in the download section of the customer portal.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Fuse 6.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4352" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 6.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using empty frames results in excessive resource consumption" }, { "cve": "CVE-2019-10173", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "discovery_date": "2019-06-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1722971" } ], "notes": [ { "category": "description", "text": "It was found that xstream API version 1.4.10 introduced a regression for a previous deserialization flaw. If the security framework has not been initialized, it may allow a remote attacker to run arbitrary shell commands when unmarshalling XML or any supported format. This a regression of CVE-2013-7285 fixed in 1.4.7 (fixed) as of BPMS 6.0.1, the regression was introduced with xstream-1.4.10 implemented in RHPAM.", "title": "Vulnerability description" }, { "category": "summary", "text": "xstream: remote code execution due to insecure XML deserialization (regression of CVE-2013-7285)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 6.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10173" }, { "category": "external", "summary": "RHBZ#1722971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1722971" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10173", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10173" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10173", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10173" }, { "category": "external", "summary": "http://x-stream.github.io/changes.html#1.4.11", "url": "http://x-stream.github.io/changes.html#1.4.11" } ], "release_date": "2018-10-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-19T17:37:50+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are located in the download section of the customer portal.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Fuse 6.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4352" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat Fuse 6.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xstream: remote code execution due to insecure XML deserialization (regression of CVE-2013-7285)" }, { "cve": "CVE-2019-12384", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-06-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1725807" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in FasterXML jackson-databind in versions prior to 2.9.9. The vulnerability would permit polymorphic deserialization of malicious objects using the logback-core gadget when used in conjunction with polymorphic type handling methods such as `enableDefaultTyping()` or when @JsonTypeInfo is using `Id.CLASS` or `Id.MINIMAL_CLASS` or in any other way which ObjectMapper.readValue might instantiate objects from unsafe sources. Depending on the classpath content, remote code execution may be possible.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack\u0027s OpenDaylight does not use logback in any supported configuration. Therefore, the prerequisites for this vulnerability are not present and OpenDaylight is not affected.\n\nThis vulnerability relies on logback-core (ch.qos.logback.core) being present in the application\u0027s ClassPath. Logback-core is not packaged as an RPM for Red Hat Enterprise Linux or Red Hat Software Collections. Applications using jackson-databind that do not also use logback-core are not impacted by this vulnerability.\n\nThis issue affects the versions of jackson-databind bundled with candlepin as shipped with Red Hat Satellite 6.x. However the affected code is NOT used at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 6.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-12384" }, { "category": "external", "summary": "RHBZ#1725807", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1725807" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-12384", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12384" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-12384", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12384" } ], "release_date": "2019-06-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-19T17:37:50+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are located in the download section of the customer portal.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Fuse 6.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4352" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Fuse 6.3" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 6.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution" } ] }
rhsa-2020_1445
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat AMQ Broker 7.4.3 is now available from the Red Hat Customer Portal.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "AMQ Broker is a high-performance messaging implementation based on ActiveMQ Artemis. It uses an asynchronous journal for fast message persistence, and supports multiple languages, protocols, and platforms. \n\nThis release of Red Hat AMQ Broker 7.4.3 serves as a replacement for Red Hat AMQ Broker 7.4.2, and includes security and bug fixes, and enhancements. For further information, refer to the release notes linked to in the References section.\n\nSecurity Fix(es):\n\n* jetty: HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511)\n\n* jetty: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* jetty: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* jetty: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* jetty: HTTP/2: 0-length headers lead to denial of service (CVE-2019-9516)\n\n* jetty: HTTP/2: request for large response leads to denial of service (CVE-2019-9517)\n\n* jetty: HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)\n\n* netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers (CVE-2019-16869)\n\n* netty: HTTP request smuggling (CVE-2019-20444)\n\n* netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header (CVE-2019-20445)\n\n* netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling (CVE-2020-7238)\n\n* mqtt-client: activemq: Corrupt MQTT frame can cause broker shutdown (CVE-2019-0222)\n\n* jetty: using specially formatted URL against DefaultServlet or ResourceHandler leads to XSS conditions (CVE-2019-10241)\n\n* jetty: error path information disclosure (CVE-2019-10247)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:1445", "url": "https://access.redhat.com/errata/RHSA-2020:1445" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=jboss.amq.broker\u0026version=7.4.3", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=jboss.amq.broker\u0026version=7.4.3" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_amq/7.4/", "url": "https://access.redhat.com/documentation/en-us/red_hat_amq/7.4/" }, { "category": "external", "summary": "1696012", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1696012" }, { "category": "external", "summary": "1705924", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705924" }, { "category": "external", "summary": "1705993", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705993" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "external", "summary": "1758619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758619" }, { "category": "external", "summary": "1796225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796225" }, { "category": "external", "summary": "1798509", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798509" }, { "category": "external", "summary": "1798524", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798524" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_1445.json" } ], "title": "Red Hat Security Advisory: Red Hat AMQ Broker 7.4.3 release and security update", "tracking": { "current_release_date": "2024-12-29T18:37:44+00:00", "generator": { "date": "2024-12-29T18:37:44+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.4" } }, "id": "RHSA-2020:1445", "initial_release_date": "2020-04-14T13:04:37+00:00", "revision_history": [ { "date": "2020-04-14T13:04:37+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-04-14T13:04:37+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-29T18:37:44+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat AMQ 7.4.3", "product": { "name": "Red Hat AMQ 7.4.3", "product_id": "Red Hat AMQ 7.4.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:amq_broker:7" } } } ], "category": "product_family", "name": "Red Hat JBoss AMQ" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-0222", "discovery_date": "2019-03-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1696012" } ], "notes": [ { "category": "description", "text": "In Apache ActiveMQ 5.0.0 - 5.15.8, unmarshalling corrupt MQTT frame can lead to broker Out of Memory exception making it unresponsive.", "title": "Vulnerability description" }, { "category": "summary", "text": "activemq: Corrupt MQTT frame can cause broker shutdown", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-0222" }, { "category": "external", "summary": "RHBZ#1696012", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1696012" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0222", "url": "https://www.cve.org/CVERecord?id=CVE-2019-0222" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0222", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0222" } ], "release_date": "2019-03-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "activemq: Corrupt MQTT frame can cause broker shutdown" }, { "cve": "CVE-2019-9511", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741860" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker can request a large amount of data by manipulating window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this queue can consume excess CPU, memory, or both, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: large amount of data requests leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "There are no mitigations available for nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "RHBZ#1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9511", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "Red Hat AMQ 7.4.3" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: large amount of data requests leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "cve": "CVE-2019-9516", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741864" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker, sending a stream of header with a 0-length header name and a 0-length header value, could cause some implementations to allocate memory for these headers and keep the allocations alive until the session dies. The can consume excess memory, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: 0-length headers lead to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9516" }, { "category": "external", "summary": "RHBZ#1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9516", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9516" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://github.com/nghttp2/nghttp2/issues/1382#", "url": "https://github.com/nghttp2/nghttp2/issues/1382#" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "Red Hat AMQ 7.4.3" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: 0-length headers lead to denial of service" }, { "cve": "CVE-2019-9517", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741868" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in HTTP/2. An attacker can open a HTTP/2 window so the peer can send without constraint. The TCP window remains closed so the peer cannot write the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the server\u0027s queue is setup, the responses can consume excess memory, CPU, or both, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: request for large response leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "The package httpd versions as shipped with Red Hat Enterprise Linux 5, 6 and 7 are not affected by this issue as HTTP/2 support is not provided.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9517" }, { "category": "external", "summary": "RHBZ#1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9517", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9517" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" }, { "category": "workaround", "details": "The httpd version shipped with Red Hat Enterprise Linux 8 provides HTTP/2 support through mod_http2 package. While mod_http2 package is not updated, users can disable HTTP/2 support as mitigation action by executing the following steps:\n\n1. Stop httpd service:\n$ systemctl stop httpd\n\n2. Remove http/2 protocol support from configuration files:\n$ sed -i \u0027s/\\(h2\\)\\|\\(h2c\\)//g\u0027 \u003chttpd_config_file\u003e\n\n3. Validate configuration files to make sure all syntax is valid:\n$ apachectl configtest\n\n4. Restart httpd service:\n$ systemctl start httpd", "product_ids": [ "Red Hat AMQ 7.4.3" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: request for large response leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9518", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735749" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using frames with an empty payload, a flood could occur that results in excessive CPU usage and starvation of other clients. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using empty frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9518" }, { "category": "external", "summary": "RHBZ#1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9518", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: flood using empty frames results in excessive resource consumption" }, { "cve": "CVE-2019-10241", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2019-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1705924" } ], "notes": [ { "category": "description", "text": "In Eclipse Jetty version 9.2.26 and older, 9.3.25 and older, and 9.4.15 and older, the server is vulnerable to XSS conditions if a remote client USES a specially formatted URL against the DefaultServlet or ResourceHandler that is configured for showing a Listing of directory contents.", "title": "Vulnerability description" }, { "category": "summary", "text": "jetty: using specially formatted URL against DefaultServlet or ResourceHandler leads to XSS conditions", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of jetty which is embedded in the nutch package as shipped with Red Hat Satellite 5. The jetty server is not exposed, as such exploitation is difficult, Red Hat Product Security has rated this issue as having security impact of Low in the context of Red Hat Satellite 5. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10241" }, { "category": "external", "summary": "RHBZ#1705924", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705924" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10241", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10241" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10241", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10241" } ], "release_date": "2019-04-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jetty: using specially formatted URL against DefaultServlet or ResourceHandler leads to XSS conditions" }, { "cve": "CVE-2019-10247", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1705993" } ], "notes": [ { "category": "description", "text": "In Eclipse Jetty version 7.x, 8.x, 9.2.27 and older, 9.3.26 and older, and 9.4.16 and older, the server running on any OS and Jetty version combination will reveal the configured fully qualified directory base resource location on the output of the 404 error for not finding a Context that matches the requested path. The default server behavior on jetty-distribution and jetty-home will include at the end of the Handler tree a DefaultHandler, which is responsible for reporting this 404 error, it presents the various configured contexts as HTML for users to click through to. This produced HTML includes output that contains the configured fully qualified directory base resource location for each context.", "title": "Vulnerability description" }, { "category": "summary", "text": "jetty: error path information disclosure", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of jetty which is embedded in the nutch package as shipped with Red Hat Satellite 5. The jetty server is not exposed, as such exploitation is difficult, Red Hat Product Security has rated this issue as having security impact of Low in the context of Red Hat Satellite 5. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10247" }, { "category": "external", "summary": "RHBZ#1705993", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705993" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10247", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10247" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10247", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10247" } ], "release_date": "2019-04-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "jetty: error path information disclosure" }, { "cve": "CVE-2019-16869", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2019-09-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1758619" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty, where whitespace before the colon in HTTP headers is mishandled. This flaw allows an attacker to cause HTTP request smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that this vulnerability does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships vulnerable netty version embedded in Candlepin, however, is not directly vulnerable since HTTP requests are handled by Tomcat and not netty.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-16869" }, { "category": "external", "summary": "RHBZ#1758619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758619" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16869", "url": "https://www.cve.org/CVERecord?id=CVE-2019-16869" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16869", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16869" } ], "release_date": "2019-09-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat AMQ 7.4.3" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers" }, { "cve": "CVE-2019-20444", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1798524" } ], "notes": [ { "category": "description", "text": "A HTTP smuggling flaw was found in HttpObjectDecoder.java in Netty in versions prior to version 4.1.44. HTTP headers with an invalid fold, in this case CRLF (carriage return, line feed) without being followed by SP (space) or HTAB (horizontal tab), result in situations where headers can be misread. Data integrity is the highest threat with this vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP request smuggling", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that the previous vulnerability, CVE-2019-16869, does not pose a substantial practical threat to ElasticSearch 6. We agree that these issues would be difficult to exploit on OpenShift Container Platform so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships a vulnerable version of netty embedded in Candlepin. However, the flaw can not be triggered in that context, because HTTP requests are handled by Tomcat, not by netty. A future release may fix this.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20444" }, { "category": "external", "summary": "RHBZ#1798524", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798524" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20444", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20444" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20444", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20444" }, { "category": "external", "summary": "https://github.com/elastic/elasticsearch/issues/49396", "url": "https://github.com/elastic/elasticsearch/issues/49396" } ], "release_date": "2020-01-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat AMQ 7.4.3" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP request smuggling" }, { "cve": "CVE-2019-20445", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1798509" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty before version 4.1.44, where it accepted multiple Content-Length headers and also accepted both Transfer-Encoding, as well as Content-Length headers where it should reject the message under such circumstances. In circumstances where Netty is used in the context of a server, it could result in a viable HTTP smuggling vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that the previous vulnerability, CVE-2019-16869, does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit both these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships a vulnerable version of netty embedded in Candlepin. However, the flaw can not be triggered in that context, because HTTP requests are handled by Tomcat, not by netty. A future release may fix this.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20445" }, { "category": "external", "summary": "RHBZ#1798509", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798509" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20445", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20445" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20445", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20445" } ], "release_date": "2020-01-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat AMQ 7.4.3" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header" }, { "cve": "CVE-2020-7238", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1796225" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty, where it mishandles Transfer-Encoding whitespace. This flaw allows HTTP Request Smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that the previous vulnerability, CVE-2019-16869, does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit both these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships vulnerable netty version embedded in Candlepin, however, is not directly vulnerable since HTTP requests are handled by Tomcat and not netty.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-7238" }, { "category": "external", "summary": "RHBZ#1796225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796225" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-7238", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7238" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7238", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7238" }, { "category": "external", "summary": "https://netty.io/news/2019/12/18/4-1-44-Final.html", "url": "https://netty.io/news/2019/12/18/4-1-44-Final.html" } ], "release_date": "2020-01-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat AMQ 7.4.3" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling" } ] }
rhsa-2024:5856
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "A security update is now available for Red Hat JBoss Enterprise Application Platform 7.1 for Red Hat Enterprise Linux 7.\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 7.1.7 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.1.6, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.1.7 Release Notes for information about the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* undertow: EAP: field-name is not parsed in accordance to RFC7230 [eap-7.1.z] (CVE-2020-1710)\n\n* commons-beanutils: apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default [eap-7.1.z] (CVE-2019-10086)\n\n* log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink [eap-7.1.z] (CVE-2022-23302)\n\n* jackson-databind: default typing mishandling leading to remote code execution [eap-7.1.z] (CVE-2019-14379)\n\n* undertow: HTTP/2: flood using HEADERS frames results in unbounded memory growth [eap-7.1.z] (CVE-2019-9514)\n\n* undertow: AJP File Read/Inclusion Vulnerability [eap-7.1.z] (CVE-2020-1745)\n\n* undertow: HTTP/2: large amount of data requests leads to denial of service [eap-7.1.z] (CVE-2019-9511)\n\n* undertow: servletPath in normalized incorrectly leading to dangerous application mapping which could result in security bypass [eap-7.1.z] (CVE-2020-1757)\n\n* undertow: possible Denial Of Service (DOS) in Undertow HTTP server listening on HTTPS [eap-7.1.z] (CVE-2019-14888)\n\n* log4j: Unsafe deserialization flaw in Chainsaw log viewer [eap-7.1.z] (CVE-2022-23307)\n\n* netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header [eap-7.1.z] (CVE-2019-20445)\n\n* log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender [eap-7.1.z] (CVE-2021-4104)\n\n* undertow: HTTP/2: flood using SETTINGS frames results in unbounded memory growth [eap-7.1.z] (CVE-2019-9515)\n\n* infinispan-core: infinispan: invokeAccessibly method from ReflectionUtil class allows to invoke private methods [eap-7.1.z] (CVE-2019-10174)\n\n* log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender [eap-7.1.z] (CVE-2022-23305)\n\n* jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution [eap-7.1.z] (CVE-2019-12384)\n\n* wildfly-security-manager: security manager authorization bypass (CVE-2019-14843)\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers (CVE-2019-16869)\n\n* jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.* (CVE-2019-17531)\n\n* netty: HTTP request smuggling (CVE-2019-20444)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:5856", "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.1", "url": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.1" }, { "category": "external", "summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.1/html-single/installation_guide/index", "url": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.1/html-single/installation_guide/index" }, { "category": "external", "summary": "1703469", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1703469" }, { "category": "external", "summary": "1725807", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1725807" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1737517", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1737517" }, { "category": "external", "summary": "1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "1752770", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752770" }, { "category": "external", "summary": "1752980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752980" }, { "category": "external", "summary": "1758619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758619" }, { "category": "external", "summary": "1767483", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767483" }, { "category": "external", "summary": "1772464", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772464" }, { "category": "external", "summary": "1775293", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775293" }, { "category": "external", "summary": "1793970", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793970" }, { "category": "external", "summary": "1798509", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798509" }, { "category": "external", "summary": "1798524", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798524" }, { "category": "external", "summary": "1807305", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1807305" }, { "category": "external", "summary": "2031667", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031667" }, { "category": "external", "summary": "2041949", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041949" }, { "category": "external", "summary": "2041959", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041959" }, { "category": "external", "summary": "2041967", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041967" }, { "category": "external", "summary": "JBEAP-24826", "url": "https://issues.redhat.com/browse/JBEAP-24826" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_5856.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.1.7 on RHEL 7 security update", "tracking": { "current_release_date": "2025-04-09T17:34:33+00:00", "generator": { "date": "2025-04-09T17:34:33+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.2" } }, "id": "RHSA-2024:5856", "initial_release_date": "2024-08-26T11:05:47+00:00", "revision_history": [ { "date": "2024-08-26T11:05:47+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-08-26T11:05:47+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-04-09T17:34:33+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product": { "name": "Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform_eus:7.1::el7" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" }, { "branches": [ { "category": "product_version", "name": "eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "product": { "name": "eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "product_id": "eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.ep7.el7?arch=src" } } }, { "category": "product_version", "name": "eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "product": { "name": "eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "product_id": "eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.ep7.el7?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "product": { "name": "eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "product_id": "eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.ep7.el7?arch=src" } } }, { "category": "product_version", "name": "eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "product": { "name": "eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "product_id": "eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00002.1.ep7.el7?arch=src" } } }, { "category": "product_version", "name": "eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "product": { "name": "eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "product_id": "eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.ep7.el7?arch=src" } } }, { "category": "product_version", "name": "eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "product": { "name": "eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "product_id": "eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00001.1.ep7.el7?arch=src" } } }, { "category": "product_version", "name": "eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "product": { "name": "eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "product_id": "eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00002.1.ep7.el7?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "product": { "name": "eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "product_id": "eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00002.1.ep7.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "product": { "name": "eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "product_id": "eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "product": { "name": "eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "product_id": "eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "product": { "name": "eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "product_id": "eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "product": { "name": "eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "product_id": "eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "product": { "name": "eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "product_id": "eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00002.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "product": { "name": "eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "product_id": "eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "product": { "name": "eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "product_id": "eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "product": { "name": "eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "product_id": "eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "product": { "name": "eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "product_id": "eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "product": { "name": "eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "product_id": "eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "product": { "name": "eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "product_id": "eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "product": { "name": "eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "product_id": "eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00001.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "product": { "name": "eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "product_id": "eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00002.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "product": { "name": "eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "product_id": "eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00002.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "product": { "name": "eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "product_id": "eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00002.1.ep7.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch" }, "product_reference": "eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src" }, "product_reference": "eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch" }, "product_reference": "eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src" }, "product_reference": "eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch" }, "product_reference": "eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch" }, "product_reference": "eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch" }, "product_reference": "eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch" }, "product_reference": "eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch" }, "product_reference": "eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch" }, "product_reference": "eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src" }, "product_reference": "eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch" }, "product_reference": "eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src" }, "product_reference": "eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch" }, "product_reference": "eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src" }, "product_reference": "eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch" }, "product_reference": "eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch" }, "product_reference": "eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src" }, "product_reference": "eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" }, "product_reference": "eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src" }, "product_reference": "eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch" }, "product_reference": "eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src" }, "product_reference": "eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" }, "product_reference": "eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-9511", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741860" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker can request a large amount of data by manipulating window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this queue can consume excess CPU, memory, or both, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: large amount of data requests leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "There are no mitigations available for nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "RHBZ#1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9511", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: large amount of data requests leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "cve": "CVE-2019-10086", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-10-31T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1767483" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Apache Commons BeanUtils, where the class property in PropertyUtilsBean is not suppressed by default. This flaw allows an attacker to access the classloader.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src" ], "known_not_affected": [ "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10086" }, { "category": "external", "summary": "RHBZ#1767483", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767483" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10086", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10086" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10086", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10086" }, { "category": "external", "summary": "https://commons.apache.org/proper/commons-beanutils/javadocs/v1.9.4/RELEASE-NOTES.txt", "url": "https://commons.apache.org/proper/commons-beanutils/javadocs/v1.9.4/RELEASE-NOTES.txt" } ], "release_date": "2019-08-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "category": "workaround", "details": "There is no currently known mitigation for this flaw.", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default" }, { "cve": "CVE-2019-10174", "cwe": { "id": "CWE-470", "name": "Use of Externally-Controlled Input to Select Classes or Code (\u0027Unsafe Reflection\u0027)" }, "discovery_date": "2018-10-25T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1703469" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Infinispan such that the invokeAccessibly method from the public class ReflectionUtil allows any application class to invoke private methods in any class with Infinispan\u0027s privileges. The attacker can use reflection to introduce new, malicious behavior into the application.", "title": "Vulnerability description" }, { "category": "summary", "text": "infinispan: invokeAccessibly method from ReflectionUtil class allows to invoke private methods", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform\u0027s OpenDaylight contains the vulnerable library. This library is a requirement of other dependencies (Karaf and Hibernate). Under supported deployments, the vulnerable functionality is not utilized. Based on this, no OpenDaylight versions will not be fixed.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch" ], "known_not_affected": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10174" }, { "category": "external", "summary": "RHBZ#1703469", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1703469" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10174", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10174" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10174", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10174" } ], "release_date": "2019-11-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "category": "workaround", "details": "There is no known mitigation for this issue.", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "infinispan: invokeAccessibly method from ReflectionUtil class allows to invoke private methods" }, { "cve": "CVE-2019-12384", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-06-25T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1725807" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in FasterXML jackson-databind in versions prior to 2.9.9. The vulnerability would permit polymorphic deserialization of malicious objects using the logback-core gadget when used in conjunction with polymorphic type handling methods such as `enableDefaultTyping()` or when @JsonTypeInfo is using `Id.CLASS` or `Id.MINIMAL_CLASS` or in any other way which ObjectMapper.readValue might instantiate objects from unsafe sources. Depending on the classpath content, remote code execution may be possible.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack\u0027s OpenDaylight does not use logback in any supported configuration. Therefore, the prerequisites for this vulnerability are not present and OpenDaylight is not affected.\n\nThis vulnerability relies on logback-core (ch.qos.logback.core) being present in the application\u0027s ClassPath. Logback-core is not packaged as an RPM for Red Hat Enterprise Linux or Red Hat Software Collections. Applications using jackson-databind that do not also use logback-core are not impacted by this vulnerability.\n\nThis issue affects the versions of jackson-databind bundled with candlepin as shipped with Red Hat Satellite 6.x. However the affected code is NOT used at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src" ], "known_not_affected": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-12384" }, { "category": "external", "summary": "RHBZ#1725807", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1725807" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-12384", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12384" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-12384", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12384" } ], "release_date": "2019-06-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution" }, { "cve": "CVE-2019-14379", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-07-29T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1737517" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in FasterXML jackson-databind, where it would permit polymorphic deserialization of malicious objects using the ehcache and logback JNDI gadgets when used in conjunction with polymorphic type handling methods such as `enableDefaultTyping()` or when @JsonTypeInfo is using `Id.CLASS` or `Id.MINIMAL_CLASS` or in any other way which ObjectMapper.readValue might instantiate objects from unsafe sources. An attacker could use this flaw to execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: default typing mishandling leading to remote code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nSimilarly, Satellite 6 does not enable polymorphic unmarshmalling, which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src" ], "known_not_affected": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14379" }, { "category": "external", "summary": "RHBZ#1737517", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1737517" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14379", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14379" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14379", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14379" } ], "release_date": "2019-07-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: default typing mishandling leading to remote code execution" }, { "cve": "CVE-2019-14843", "cwe": { "id": "CWE-592", "name": "CWE-592" }, "discovery_date": "2019-09-17T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1752980" } ], "notes": [ { "category": "description", "text": "A flaw was found in Wildfly Security Manager, running under JDK 11 or 8, that authorized requests for any requester. This flaw could be used by a malicious app deployed on the app server to access unauthorized information and possibly conduct further attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-security-manager: security manager authorization bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ], "known_not_affected": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14843" }, { "category": "external", "summary": "RHBZ#1752980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752980" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14843", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14843" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14843", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14843" } ], "release_date": "2019-09-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "category": "workaround", "details": "This flaw only affects the Security Manager running under JDK 11 or 8. To mitigate exposure to this flaw, do not run under those JDK versions.", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "wildfly-security-manager: security manager authorization bypass" }, { "acknowledgments": [ { "names": [ "Henning Baldersheim", "H\u00e5vard Pettersen" ], "organization": "Verizon Media" } ], "cve": "CVE-2019-14888", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-10-25T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1772464" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the Undertow HTTP server listening on HTTPS. An attacker can target the HTTPS port to carry out a Denial Of Service (DOS) to make the service unavailable on SSL.", "title": "Vulnerability description" }, { "category": "summary", "text": "undertow: possible Denial Of Service (DOS) in Undertow HTTP server listening on HTTPS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src" ], "known_not_affected": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14888" }, { "category": "external", "summary": "RHBZ#1772464", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772464" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14888", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14888" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14888", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14888" } ], "release_date": "2020-01-20T12:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "category": "workaround", "details": "Enable HTTP2 (enable-http2=\"true\") in the undertow\u0027s HTTPS settings.", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "undertow: possible Denial Of Service (DOS) in Undertow HTTP server listening on HTTPS" }, { "cve": "CVE-2019-16869", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2019-09-26T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1758619" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty, where whitespace before the colon in HTTP headers is mishandled. This flaw allows an attacker to cause HTTP request smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that this vulnerability does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships vulnerable netty version embedded in Candlepin, however, is not directly vulnerable since HTTP requests are handled by Tomcat and not netty.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch" ], "known_not_affected": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-16869" }, { "category": "external", "summary": "RHBZ#1758619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758619" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16869", "url": "https://www.cve.org/CVERecord?id=CVE-2019-16869" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16869", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16869" } ], "release_date": "2019-09-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers" }, { "cve": "CVE-2019-17531", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2019-11-21T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1775293" } ], "notes": [ { "category": "description", "text": "A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the apache-log4j-extra (version 1.2.x) jar in the classpath, and an attacker can provide a JNDI service to access, it is possible to make the service execute a malicious payload.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.*", "title": "Vulnerability summary" }, { "category": "other", "text": "Satellite 6 does not enable polymorphic unmarshmalling, which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenShift Container Platform does ship the vulnerable component, but does not enable the unsafe conditions needed to exploit, lowering their vulnerability impact.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src" ], "known_not_affected": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-17531" }, { "category": "external", "summary": "RHBZ#1775293", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775293" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-17531", "url": "https://www.cve.org/CVERecord?id=CVE-2019-17531" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-17531", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17531" } ], "release_date": "2019-10-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.*" }, { "cve": "CVE-2019-20444", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-30T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1798524" } ], "notes": [ { "category": "description", "text": "A HTTP smuggling flaw was found in HttpObjectDecoder.java in Netty in versions prior to version 4.1.44. HTTP headers with an invalid fold, in this case CRLF (carriage return, line feed) without being followed by SP (space) or HTAB (horizontal tab), result in situations where headers can be misread. Data integrity is the highest threat with this vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP request smuggling", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that the previous vulnerability, CVE-2019-16869, does not pose a substantial practical threat to ElasticSearch 6. We agree that these issues would be difficult to exploit on OpenShift Container Platform so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships a vulnerable version of netty embedded in Candlepin. However, the flaw can not be triggered in that context, because HTTP requests are handled by Tomcat, not by netty. A future release may fix this.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch" ], "known_not_affected": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20444" }, { "category": "external", "summary": "RHBZ#1798524", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798524" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20444", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20444" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20444", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20444" }, { "category": "external", "summary": "https://github.com/elastic/elasticsearch/issues/49396", "url": "https://github.com/elastic/elasticsearch/issues/49396" } ], "release_date": "2020-01-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP request smuggling" }, { "cve": "CVE-2019-20445", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-20T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1798509" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty before version 4.1.44, where it accepted multiple Content-Length headers and also accepted both Transfer-Encoding, as well as Content-Length headers where it should reject the message under such circumstances. In circumstances where Netty is used in the context of a server, it could result in a viable HTTP smuggling vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that the previous vulnerability, CVE-2019-16869, does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit both these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships a vulnerable version of netty embedded in Candlepin. However, the flaw can not be triggered in that context, because HTTP requests are handled by Tomcat, not by netty. A future release may fix this.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch" ], "known_not_affected": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20445" }, { "category": "external", "summary": "RHBZ#1798509", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798509" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20445", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20445" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20445", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20445" } ], "release_date": "2020-01-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header" }, { "cve": "CVE-2020-1710", "cwe": { "id": "CWE-113", "name": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)" }, "discovery_date": "2019-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1793970" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in JBoss EAP, where it does not process the header field-name in accordance with RFC7230. Whitespace between the header field-name and colon is processed, resulting in an HTTP response code of 200 instead of a bad request of 400.", "title": "Vulnerability description" }, { "category": "summary", "text": "EAP: field-name is not parsed in accordance to RFC7230", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-1710" }, { "category": "external", "summary": "RHBZ#1793970", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793970" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-1710", "url": "https://www.cve.org/CVERecord?id=CVE-2020-1710" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1710", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1710" } ], "release_date": "2020-08-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "category": "workaround", "details": "There is currently no known mitigation for this issue.", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "EAP: field-name is not parsed in accordance to RFC7230" }, { "acknowledgments": [ { "names": [ "Steve Zapantis", "Robert Roberson", "taktakdb4g" ] } ], "cve": "CVE-2020-1745", "cwe": { "id": "CWE-285", "name": "Improper Authorization" }, "discovery_date": "2020-02-24T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1807305" } ], "notes": [ { "category": "description", "text": "A file inclusion vulnerability was found in the AJP connector enabled with a default AJP configuration port of 8009 in Undertow version 2.0.29.Final and before. A remote, unauthenticated attacker could exploit this vulnerability to read web application files from a vulnerable server. In instances where the vulnerable server allows file uploads, an attacker could upload malicious JavaServer Pages (JSP) code within a variety of file types and trigger this vulnerability to gain remote code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "undertow: AJP File Read/Inclusion Vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "Please refer to the Red Hat knowledgebase article: https://access.redhat.com/solutions/4851251 and CVE page https://access.redhat.com/security/cve/cve-2020-1938", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src" ], "known_not_affected": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-1745" }, { "category": "external", "summary": "RHBZ#1807305", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1807305" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-1745", "url": "https://www.cve.org/CVERecord?id=CVE-2020-1745" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1745", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1745" }, { "category": "external", "summary": "https://meterpreter.org/cve-2020-1938-apache-tomcat-ajp-connector-remote-code-execution-vulnerability-alert/", "url": "https://meterpreter.org/cve-2020-1938-apache-tomcat-ajp-connector-remote-code-execution-vulnerability-alert/" }, { "category": "external", "summary": "https://www.cnvd.org.cn/webinfo/show/5415", "url": "https://www.cnvd.org.cn/webinfo/show/5415" }, { "category": "external", "summary": "https://www.tenable.com/blog/cve-2020-1938-ghostcat-apache-tomcat-ajp-file-readinclusion-vulnerability-cnvd-2020-10487", "url": "https://www.tenable.com/blog/cve-2020-1938-ghostcat-apache-tomcat-ajp-file-readinclusion-vulnerability-cnvd-2020-10487" } ], "release_date": "2020-02-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "category": "workaround", "details": "Please refer to the Red Hat knowledgebase article: https://access.redhat.com/solutions/4851251", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", "version": "3.1" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "undertow: AJP File Read/Inclusion Vulnerability" }, { "acknowledgments": [ { "names": [ "Fedorov Oleksii", "Keitaro Yamazaki", "Shiga Ryota" ], "organization": "LINE Corporation" } ], "cve": "CVE-2020-1757", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-09-09T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1752770" } ], "notes": [ { "category": "description", "text": "A flaw was found in Undertow, where the servlet container causes the servletPath to normalize incorrectly by truncating the path after the semicolon. The flaw may lead to application mapping, resulting in a security bypass.", "title": "Vulnerability description" }, { "category": "summary", "text": "undertow: servletPath is normalized incorrectly leading to dangerous application mapping which could result in security bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src" ], "known_not_affected": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-1757" }, { "category": "external", "summary": "RHBZ#1752770", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752770" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-1757", "url": "https://www.cve.org/CVERecord?id=CVE-2020-1757" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1757", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1757" } ], "release_date": "2018-12-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "category": "workaround", "details": "The issue can be mitigated by configuring UrlPathHelper to ignore the servletPath via setting \"alwaysUseFullPath\".", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "undertow: servletPath is normalized incorrectly leading to dangerous application mapping which could result in security bypass" }, { "cve": "CVE-2021-4104", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-12-13T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2031667" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Java logging library Apache Log4j in version 1.x. JMSAppender in Log4j 1.x is vulnerable to deserialization of untrusted data. This allows a remote attacker to execute code on the server if the deployed application is configured to use JMSAppender and to the attacker\u0027s JNDI LDAP endpoint.", "title": "Vulnerability description" }, { "category": "summary", "text": "log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender", "title": "Vulnerability summary" }, { "category": "other", "text": "Based on the conditions to be exploitable (see details below), the risk is much lower than Log4j 2.x and Red Hat has assessed this to be Moderate severity. This flaw has been filed for Log4j 1.x, and the corresponding flaw information for Log4j 2.x is available at: https://access.redhat.com/security/cve/CVE-2021-44228\n\nNote this flaw ONLY affects applications which are specifically configured to use JMSAppender, which is not the default, or when the attacker has write access to the Log4j configuration for adding JMSAppender to the attacker\u0027s JNDI LDAP endpoint. \n\nIf the Log4j configuration is set TopicBindingName or TopicConnectionFactoryBindingName configurations allowing JMSAppender to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-44228 Log4j 2.x, Log4j 1.x is vulnerable. However, the attack vector is reduced as it depends on having write access, which is not a standard configuration rather than untrusted user input. These are sufficient factors beyond the attacker\u0027s control.\n\nThe tomcat package shipped with Red Hat Enterprise Linux does not include log4j but it does include a default configuration for log4j, log4j.properties, which could be used with tomcat if users choose to install and configure the library. The JMSAppender is not enabled by default, and the permissions of the file can only be modified as root.\n\nRed Hat Virtualization ships log4j12-1.2.17, but it is used and configured in a way which makes this flaw not possible to exploit. Therefore impact is rated Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src" ], "known_not_affected": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-4104" }, { "category": "external", "summary": "RHBZ#2031667", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031667" }, { "category": "external", "summary": "RHSB-2021-009", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-009" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4104", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4104" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4104", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4104" }, { "category": "external", "summary": "https://github.com/apache/logging-log4j2/pull/608#issuecomment-990494126", "url": "https://github.com/apache/logging-log4j2/pull/608#issuecomment-990494126" }, { "category": "external", "summary": "https://github.com/apache/logging-log4j2/pull/608#issuecomment-991723301", "url": "https://github.com/apache/logging-log4j2/pull/608#issuecomment-991723301" }, { "category": "external", "summary": "https://lists.apache.org/thread/0x4zvtq92yggdgvwfgsftqrj4xx5w0nx", "url": "https://lists.apache.org/thread/0x4zvtq92yggdgvwfgsftqrj4xx5w0nx" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2021/12/13/1", "url": "https://www.openwall.com/lists/oss-security/2021/12/13/1" } ], "release_date": "2021-12-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "category": "workaround", "details": "These are the possible mitigations for this flaw for releases version 1.x:\n\n- Comment out or remove JMSAppender in the Log4j configuration if it is used\n- Remove the JMSAppender class from the classpath. For example:\n```\nzip -q -d log4j-*.jar org/apache/log4j/net/JMSAppender.class\n```\n- Restrict access for the OS user on the platform running the application to prevent modifying the Log4j configuration by the attacker.", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender" }, { "cve": "CVE-2022-23302", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2022-01-18T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2041949" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Java logging library Apache Log4j in version 1.x. JMSSink in Log4j 1.x is vulnerable to deserialization of untrusted data. This allows a remote attacker to execute code on the server if JMSSink is deployed and has been configured to perform JNDI requests.", "title": "Vulnerability description" }, { "category": "summary", "text": "log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink", "title": "Vulnerability summary" }, { "category": "other", "text": "Note this flaw ONLY affects applications which are specifically configured to use JMSSink, which is not the default, or when the attacker has write access to the Log4j configuration for adding JMSSink to the attacker\u0027s JNDI LDAP endpoint.\n\nRed Hat Satellite bundles log4j-over-slf4j with Candlepin, however, product is not affected as it uses logback framework for logging.\n\nRed Hat Virtualization and OpenShift Container Platform in the OCP Metering stack (the Hive/Presto/Hadoop components) ship a vulnerable version of the log4j package, however JMSSink is not used. Therefore the impact of this vulnerability for these products is rated Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src" ], "known_not_affected": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-23302" }, { "category": "external", "summary": "RHBZ#2041949", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041949" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23302", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23302" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23302", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23302" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2022/01/18/3", "url": "https://www.openwall.com/lists/oss-security/2022/01/18/3" } ], "release_date": "2022-01-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "category": "workaround", "details": "These are the possible mitigations for this flaw for releases version 1.x:\n\n- Comment out or remove JMSSink in the Log4j configuration if it is used\n- Remove the JMSSink class from the server\u0027s jar files. For example:\n```\nzip -q -d log4j-*.jar org/apache/log4j/net/JMSSink.class\n```\n- Restrict access for the OS user on the platform running the application to prevent modifying the Log4j configuration by the attacker.", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink" }, { "cve": "CVE-2022-23305", "cwe": { "id": "CWE-89", "name": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)" }, "discovery_date": "2022-01-18T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2041959" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Java logging library Apache Log4j in version 1.x. JDBCAppender in Log4j 1.x is vulnerable to SQL injection in untrusted data. This allows a remote attacker to run SQL statements in the database if the deployed application is configured to use JDBCAppender with certain interpolation tokens.", "title": "Vulnerability description" }, { "category": "summary", "text": "log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender", "title": "Vulnerability summary" }, { "category": "other", "text": "Note this issue only affects Log4j 1.x when specifically configured to use the JDBCAppender, which is not the default.\n\nRed Hat Satellite bundles log4j-over-slf4j with Candlepin, however, product is not affected as it uses logback framework for logging.\n\nRed Hat Virtualization and OpenShift Container Platform in the OCP Metering stack (the Hive/Presto/Hadoop components) ship a vulnerable version of the log4j package, however JDBCAppender is not used. Therefore the impact of this vulnerability for these products is rated Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src" ], "known_not_affected": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-23305" }, { "category": "external", "summary": "RHBZ#2041959", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041959" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23305", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23305" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23305", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23305" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2022/01/18/4", "url": "https://www.openwall.com/lists/oss-security/2022/01/18/4" } ], "release_date": "2022-01-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "category": "workaround", "details": "These are the possible mitigations for this flaw for releases version 1.x:\n\n- Comment out or remove JDBCAppender in the Log4j configuration if it is used\n- Remove the JDBCAppender class from the server\u0027s jar files. For example:\n```\nzip -q -d log4j-*.jar org/apache/log4j/jdbc/JDBCAppender.class\n```", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender" }, { "cve": "CVE-2022-23307", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2022-01-18T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2041967" } ], "notes": [ { "category": "description", "text": "A flaw was found in the log4j 1.x chainsaw component, where the contents of certain log entries are deserialized and possibly permit code execution. This flaw allows an attacker to send a malicious request with serialized data to the server to be deserialized when the chainsaw component is run.", "title": "Vulnerability description" }, { "category": "summary", "text": "log4j: Unsafe deserialization flaw in Chainsaw log viewer", "title": "Vulnerability summary" }, { "category": "other", "text": "Chainsaw is a standalone graphical user interface for viewing log entries in log4j. This flaw may be bypassed by using other available means to access log entries.\n\nRed Hat Satellite bundles log4j-over-slf4j with Candlepin, however, product is not affected as it uses logback framework for logging.\n\nRed Hat Virtualization ships a vulnerable version of the log4j package, however chainsaw is not part of typical use cases. An attacker looking to exploit this would need to not only be able to generate a malicious log entry, but also have the necessary access and permissions to start chainsaw on the engine node. Therefore the impact of this vulnerability for Red Hat Virtualization is rated Low.\n\nSimilar to Red Hat Virtualization in OpenShift Container Platform (OCP), the Hive/Presto/Hadoop components that comprise the OCP Metering stack, ship the vulnerable version of log4j package, however vulnerable chainsaw component is not used by default. Therefore the impact to OCP is reduced to Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src" ], "known_not_affected": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-23307" }, { "category": "external", "summary": "RHBZ#2041967", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041967" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23307", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23307" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23307", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23307" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2022/01/18/5", "url": "https://www.openwall.com/lists/oss-security/2022/01/18/5" } ], "release_date": "2022-01-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "category": "workaround", "details": "These are the mitigations available for this flaw for log4j 1.x:\n- Avoid using Chainsaw to view logs, and instead use some other utility, especially if there is a log view available within the product itself.\n- Remove the Chainsaw classes from the log4j jar files. For example:\n```\nzip -q -d log4j-*.jar org/apache/log4j/chainsaw/*\n```\n(log4j jars may be nested in zip archives within product)", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "log4j: Unsafe deserialization flaw in Chainsaw log viewer" } ] }
rhsa-2019:2939
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for rh-nodejs10-nodejs is now available for Red Hat Software Collections.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.\n\nThe following packages have been upgraded to a later upstream version: rh-nodejs10-nodejs (10.16.3).\n\nSecurity Fix(es):\n\n* HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511)\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using PRIORITY frames results in excessive resource consumption (CVE-2019-9513)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* HTTP/2: 0-length headers lead to denial of service (CVE-2019-9516)\n\n* HTTP/2: request for large response leads to denial of service (CVE-2019-9517)\n\n* HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:2939", "url": "https://access.redhat.com/errata/RHSA-2019:2939" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735741" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2939.json" } ], "title": "Red Hat Security Advisory: rh-nodejs10-nodejs security update", "tracking": { "current_release_date": "2025-03-17T01:36:58+00:00", "generator": { "date": "2025-03-17T01:36:58+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.1" } }, "id": "RHSA-2019:2939", "initial_release_date": "2019-10-01T10:03:49+00:00", "revision_history": [ { "date": "2019-10-01T10:03:49+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-10-01T10:03:49+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-03-17T01:36:58+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } } ], "category": "product_family", "name": "Red Hat Software Collections" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "product": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "product_id": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "product": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "product_id": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "product": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "product_id": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "product": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "product_id": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs10-0:3.2-3.el7.ppc64le", "product": { "name": "rh-nodejs10-0:3.2-3.el7.ppc64le", "product_id": "rh-nodejs10-0:3.2-3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "product": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "product_id": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "product": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "product_id": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "product": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "product_id": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "product": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "product_id": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "product": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "product_id": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "product": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "product_id": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs10-0:3.2-3.el7.s390x", "product": { "name": "rh-nodejs10-0:3.2-3.el7.s390x", "product_id": "rh-nodejs10-0:3.2-3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs10-runtime-0:3.2-3.el7.s390x", "product": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.s390x", "product_id": "rh-nodejs10-runtime-0:3.2-3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "product": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "product_id": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "product": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "product_id": "rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=aarch64" } } }, { "category": "product_version", "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "product": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "product_id": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=aarch64" } } }, { "category": "product_version", "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "product": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "product_id": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=aarch64" } } }, { "category": "product_version", "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "product": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "product_id": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=aarch64" } } }, { "category": "product_version", "name": "rh-nodejs10-0:3.2-3.el7.aarch64", "product": { "name": "rh-nodejs10-0:3.2-3.el7.aarch64", "product_id": "rh-nodejs10-0:3.2-3.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=aarch64" } } }, { "category": "product_version", "name": "rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "product": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "product_id": "rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=aarch64" } } }, { "category": "product_version", "name": "rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "product": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "product_id": "rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "product": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "product_id": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "rh-nodejs10-0:3.2-3.el7.src", "product": { "name": "rh-nodejs10-0:3.2-3.el7.src", "product_id": "rh-nodejs10-0:3.2-3.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "product": { "name": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "product_id": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "product": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "product_id": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "product": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "product_id": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "product": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "product_id": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "product": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "product_id": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs10-0:3.2-3.el7.x86_64", "product": { "name": "rh-nodejs10-0:3.2-3.el7.x86_64", "product_id": "rh-nodejs10-0:3.2-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "product": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "product_id": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "product": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "product_id": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.src", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch" }, "product_reference": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch" }, "product_reference": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch" }, "product_reference": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch" }, "product_reference": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch" }, "product_reference": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.src", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch" }, "product_reference": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-12121", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2018-11-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1661002" } ], "notes": [ { "category": "description", "text": "Node.js: All versions prior to Node.js 6.15.0, 8.14.0, 10.14.0 and 11.3.0: Denial of Service with large HTTP headers: By using a combination of many requests with maximum sized headers (almost 80 KB per connection), and carefully timed completion of the headers, it is possible to cause the HTTP server to abort from heap allocation failure. Attack potential is mitigated by the use of a load balancer or other proxy layer.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Denial of Service with large HTTP headers", "title": "Vulnerability summary" }, { "category": "other", "text": "The nodejs RPMs shipped in Red Hat OpenShift Container Platform (OCP) versions 3.6 through 3.10 are vulnerable to this flaw because they contain the affected code. Later versions of OCP used nodejs RPMs delivered from Red Hat Software Collections and Red Hat Enterprise Linux channels.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-12121" }, { "category": "external", "summary": "RHBZ#1661002", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1661002" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-12121", "url": "https://www.cve.org/CVERecord?id=CVE-2018-12121" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12121", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12121" } ], "release_date": "2018-11-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-01T10:03:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2939" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs: Denial of Service with large HTTP headers" }, { "cve": "CVE-2018-12122", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2018-11-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1661005" } ], "notes": [ { "category": "description", "text": "It was found that Node.js HTTP server was vulnerable to a Slowloris type attack. An attacker could make long lived connections by sending bytes very slowly to the server, saturating its resource and possibly resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Slowloris HTTP Denial of Service", "title": "Vulnerability summary" }, { "category": "other", "text": "The nodejs RPMs shipped in Red Hat OpenShift Container Platform (OCP) versions 3.6 through 3.10 are vulnerable to this flaw because they contain the affected code. Later versions of OCP used nodejs RPMs delivered from Red Hat Software Collections and Red Hat Enterprise Linux channels.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-12122" }, { "category": "external", "summary": "RHBZ#1661005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1661005" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-12122", "url": "https://www.cve.org/CVERecord?id=CVE-2018-12122" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12122", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12122" } ], "release_date": "2018-11-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-01T10:03:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2939" }, { "category": "workaround", "details": "The use of a Load Balancer or a Reverse Proxy will increase the difficulty of the attack.", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs: Slowloris HTTP Denial of Service" }, { "cve": "CVE-2018-12123", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2018-11-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1661010" } ], "notes": [ { "category": "description", "text": "Node.js: All versions prior to Node.js 6.15.0, 8.14.0, 10.14.0 and 11.3.0: Hostname spoofing in URL parser for javascript protocol: If a Node.js application is using url.parse() to determine the URL hostname, that hostname can be spoofed by using a mixed case \"javascript:\" (e.g. \"javAscript:\") protocol (other protocols are not affected). If security decisions are made about the URL based on the hostname, they may be incorrect.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Hostname spoofing in URL parser for javascript protocol", "title": "Vulnerability summary" }, { "category": "other", "text": "The nodejs RPMs shipped in Red Hat OpenShift Container Platform (OCP) versions 3.6 through 3.10 are vulnerable to this flaw because they contain the affected code. Later versions of OCP used nodejs RPMs delivered from Red Hat Software Collections and Red Hat Enterprise Linux channels.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-12123" }, { "category": "external", "summary": "RHBZ#1661010", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1661010" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-12123", "url": "https://www.cve.org/CVERecord?id=CVE-2018-12123" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12123", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12123" } ], "release_date": "2018-11-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-01T10:03:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2939" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs: Hostname spoofing in URL parser for javascript protocol" }, { "cve": "CVE-2019-5737", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-03-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1690808" } ], "notes": [ { "category": "description", "text": "It was found that the original fix for Slowloris, CVE-2018-12122, was insufficient. It is possible to bypass the server\u0027s headersTimeout by sending two specially crafted HTTP requests in the same connection. An attacker could use this flaw to bypass Slowloris protection, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Insufficient Slowloris fix causing DoS via server.headersTimeout bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-5737" }, { "category": "external", "summary": "RHBZ#1690808", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1690808" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-5737", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5737" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5737", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5737" }, { "category": "external", "summary": "https://nodejs.org/ja/blog/vulnerability/february-2019-security-releases/", "url": "https://nodejs.org/ja/blog/vulnerability/february-2019-security-releases/" } ], "release_date": "2019-02-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-01T10:03:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2939" }, { "category": "workaround", "details": "The use of a Load Balancer or a Reverse Proxy will increase the difficulty of the attack.", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs: Insufficient Slowloris fix causing DoS via server.headersTimeout bypass" }, { "cve": "CVE-2019-9511", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741860" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker can request a large amount of data by manipulating window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this queue can consume excess CPU, memory, or both, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: large amount of data requests leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "There are no mitigations available for nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "RHBZ#1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9511", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-01T10:03:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2939" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: large amount of data requests leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-01T10:03:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2939" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9513", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735741" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker, using PRIORITY frames to flood the system, could cause excessive CPU usage and starvation of other clients. The largest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PRIORITY frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for packages nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9513" }, { "category": "external", "summary": "RHBZ#1735741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735741" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9513", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9513" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9513", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9513" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nghttp2.org/blog/2019/08/19/nghttp2-v1-39-2/", "url": "https://nghttp2.org/blog/2019/08/19/nghttp2-v1-39-2/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-01T10:03:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2939" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PRIORITY frames results in excessive resource consumption" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-01T10:03:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2939" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-01T10:03:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2939" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "cve": "CVE-2019-9516", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741864" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker, sending a stream of header with a 0-length header name and a 0-length header value, could cause some implementations to allocate memory for these headers and keep the allocations alive until the session dies. The can consume excess memory, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: 0-length headers lead to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9516" }, { "category": "external", "summary": "RHBZ#1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9516", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9516" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://github.com/nghttp2/nghttp2/issues/1382#", "url": "https://github.com/nghttp2/nghttp2/issues/1382#" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-01T10:03:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2939" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: 0-length headers lead to denial of service" }, { "cve": "CVE-2019-9517", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741868" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in HTTP/2. An attacker can open a HTTP/2 window so the peer can send without constraint. The TCP window remains closed so the peer cannot write the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the server\u0027s queue is setup, the responses can consume excess memory, CPU, or both, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: request for large response leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "The package httpd versions as shipped with Red Hat Enterprise Linux 5, 6 and 7 are not affected by this issue as HTTP/2 support is not provided.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9517" }, { "category": "external", "summary": "RHBZ#1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9517", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9517" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-01T10:03:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2939" }, { "category": "workaround", "details": "The httpd version shipped with Red Hat Enterprise Linux 8 provides HTTP/2 support through mod_http2 package. While mod_http2 package is not updated, users can disable HTTP/2 support as mitigation action by executing the following steps:\n\n1. Stop httpd service:\n$ systemctl stop httpd\n\n2. Remove http/2 protocol support from configuration files:\n$ sed -i \u0027s/\\(h2\\)\\|\\(h2c\\)//g\u0027 \u003chttpd_config_file\u003e\n\n3. Validate configuration files to make sure all syntax is valid:\n$ apachectl configtest\n\n4. Restart httpd service:\n$ systemctl start httpd", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: request for large response leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9518", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735749" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using frames with an empty payload, a flood could occur that results in excessive CPU usage and starvation of other clients. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using empty frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9518" }, { "category": "external", "summary": "RHBZ#1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9518", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-01T10:03:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2939" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using empty frames results in excessive resource consumption" } ] }
RHSA-2019:3892
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "A minor version update (from 7.4 to 7.5) is now available for Red Hat Fuse. The purpose of this text-only errata is to inform you about the security issues fixed in this release.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.\n\n[2020-04-17 update: descriptions for mutiple components fixed for the same CVE added]", "title": "Topic" }, { "category": "general", "text": "This release of Red Hat Fuse 7.5.0 serves as a replacement for Red Hat Fuse 7.4, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-7525) (CVE-2017-15095)\n\n* jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-15095) (CVE-2017-17485)\n\n* infinispan: deserialization of data in XML and JSON transcoders (CVE-2018-1131)\n\n* hadoop: arbitrary file write vulnerability / arbitrary code execution using a specially crafted zip file (CVE-2018-8009)\n\n* jackson-databind: Potential information exfiltration with default typing, serialization gadget from MyBatis (CVE-2018-11307)\n\n* jackson-databind: improper polymorphic deserialization of types from Jodd-db library (CVE-2018-12022)\n\n* jackson-databind: improper polymorphic deserialization of types from Oracle JDBC driver (CVE-2018-12023)\n\n* jackson-databind: arbitrary code execution in slf4j-ext class (CVE-2018-14718)\n\n* jackson-databind: arbitrary code execution in blaze-ds-opt and blaze-ds-core classes (CVE-2018-14719)\n\n* jackson-databind: exfiltration/XXE in some JDK classes (CVE-2018-14720)\n\n* jackson-databind: improper polymorphic deserialization in axis2-transport-jms class (CVE-2018-19360)\n\n* jackson-databind: improper polymorphic deserialization in openjpa class (CVE-2018-19361)\n\n* jackson-databind: improper polymorphic deserialization in jboss-common-core class (CVE-2018-19362)\n\n* retrofit: Directory traversal in RequestBuilder allows manipulation of resources (CVE-2018-1000850)\n\n* zookeeper: Information disclosure in Apache ZooKeeper (CVE-2019-0201)\n\n* mesos: docker image code execution (CVE-2019-0204)\n\n* netty: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* grpc: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* netty: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* grpc: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* netty: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* grpc: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* netty: HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)\n\n* xstream: remote code execution due to insecure XML deserialization (regression of CVE-2013-7285) (CVE-2019-10173)\n\n* syndesis: default CORS configuration is allow all (CVE-2019-14860)\n\n* netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers (CVE-2019-16869)\n\n* activemq: ActiveMQ Client Missing TLS Hostname Verification (CVE-2018-11775)\n\n* tika: Incomplete fix allows for XML entity expansion resulting in denial of service (CVE-2018-11796)\n\n* jackson-databind: server-side request forgery (SSRF) in axis2-jaxws class (CVE-2018-14721)\n\n* tomcat: Host name verification missing in WebSocket client (CVE-2018-8034)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:3892", "url": "https://access.redhat.com/errata/RHSA-2019:3892" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=jboss.fuse\u0026version=7.5.0", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=jboss.fuse\u0026version=7.5.0" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "url": "https://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/" }, { "category": "external", "summary": "1506612", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1506612" }, { "category": "external", "summary": "1528565", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1528565" }, { "category": "external", "summary": "1576492", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1576492" }, { "category": "external", "summary": "1593018", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1593018" }, { "category": "external", "summary": "1607580", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1607580" }, { "category": "external", "summary": "1629083", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1629083" }, { "category": "external", "summary": "1639090", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1639090" }, { "category": "external", "summary": "1663904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1663904" }, { "category": "external", "summary": "1666415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666415" }, { "category": "external", "summary": "1666418", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666418" }, { "category": "external", "summary": "1666423", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666423" }, { "category": "external", "summary": "1666428", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666428" }, { "category": "external", "summary": "1666482", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666482" }, { "category": "external", "summary": "1666484", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666484" }, { "category": "external", "summary": "1666489", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666489" }, { "category": "external", "summary": "1671096", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1671096" }, { "category": "external", "summary": "1671097", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1671097" }, { "category": "external", "summary": "1677341", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1677341" }, { "category": "external", "summary": "1692755", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1692755" }, { "category": "external", "summary": "1715197", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1715197" }, { "category": "external", "summary": "1722971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1722971" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "1758619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758619" }, { "category": "external", "summary": "1761912", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1761912" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3892.json" } ], "title": "Red Hat Security Advisory: Red Hat Fuse 7.5.0 security update", "tracking": { "current_release_date": "2025-04-10T05:23:12+00:00", "generator": { "date": "2025-04-10T05:23:12+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.2" } }, "id": "RHSA-2019:3892", "initial_release_date": "2019-11-14T21:17:38+00:00", "revision_history": [ { "date": "2019-11-14T21:17:38+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-04-20T07:18:57+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-04-10T05:23:12+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Fuse 7.5.0", "product": { "name": "Red Hat Fuse 7.5.0", "product_id": "Red Hat Fuse 7.5.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_fuse:7" } } } ], "category": "product_family", "name": "Red Hat JBoss Fuse" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Liao Xinxi" ], "organization": "NSFOCUS" } ], "cve": "CVE-2017-15095", "cwe": { "id": "CWE-184", "name": "Incomplete List of Disallowed Inputs" }, "discovery_date": "2017-10-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1506612" } ], "notes": [ { "category": "description", "text": "A deserialization flaw was discovered in the jackson-databind which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readValue method of the ObjectMapper. This issue extends the previous flaw CVE-2017-7525 by blacklisting more classes that could be used maliciously.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-7525)", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of jackson-databind (in Satellite 6.0 and 6.1) and candlepin (which embeds a copy of jackson-databind in Satellite 6.2) as shipped with Red Hat Satellite 6.x. However the affected code is NOT used at this time:\n\nCandlepin currently uses the default type resolution configuration for the ObjectMappers it creates/uses. Nowhere in candlepin do we enable global polymorphic deserialization via enableDefaultTyping(...), therefore based on the documentation sited BZ 1462702 , candlepin should not be affected.\n\nHowever as the vulnerable software ships with the product we have marked them as vulnerable to ensure the issue is tracked.\n\nJBoss EAP 7.x only uses the vulnerable Jackson Databind library for marshalling and unmarshalling of JSON objects passed to JAX-RS webservices. Some advise about how to remain safe when using JAX-RS webservices on JBoss EAP 7.x is available here: \n\nhttps://access.redhat.com/solutions/3279231", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-15095" }, { "category": "external", "summary": "RHBZ#1506612", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1506612" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-15095", "url": "https://www.cve.org/CVERecord?id=CVE-2017-15095" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-15095", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15095" }, { "category": "external", "summary": "https://access.redhat.com/solutions/3442891", "url": "https://access.redhat.com/solutions/3442891" } ], "release_date": "2017-11-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" }, { "category": "workaround", "details": "Mitigation to this problem is to not trigger polymorphic desrialization globally by using: objectMapper.enableDefaultTyping() and rather use @JsonTypeInfo on the class property to explicitly define the type information. For more information on this issue please refer to https://www.github.com/mbechler/marshalsec/blob/master/marshalsec.pdf?raw=true", "product_ids": [ "Red Hat Fuse 7.5.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-7525)" }, { "acknowledgments": [ { "names": [ "0c0c0f from 360\u89c2\u661f\u5b9e\u9a8c\u5ba4" ] } ], "cve": "CVE-2017-17485", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2017-12-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1528565" } ], "notes": [ { "category": "description", "text": "A deserialization flaw was discovered in the jackson-databind which could allow an unauthenticated user to perform code execution by sending maliciously crafted input to the readValue method of ObjectMapper. This issue extends upon the previous flaws CVE-2017-7525 and CVE-2017-15095 by blacklisting more classes that could be used maliciously.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-15095)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-17485" }, { "category": "external", "summary": "RHBZ#1528565", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1528565" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-17485", "url": "https://www.cve.org/CVERecord?id=CVE-2017-17485" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-17485", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-17485" }, { "category": "external", "summary": "https://access.redhat.com/solutions/3442891", "url": "https://access.redhat.com/solutions/3442891" } ], "release_date": "2017-12-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-15095)" }, { "cve": "CVE-2018-1131", "cwe": { "id": "CWE-349", "name": "Acceptance of Extraneous Untrusted Data With Trusted Data" }, "discovery_date": "2018-05-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1576492" } ], "notes": [ { "category": "description", "text": "Infinispan permits improper deserialization of trusted data via XML and JSON transcoders under certain server configurations. A user with authenticated access to the server could send a malicious object to a cache configured to accept certain types of objects, achieving code execution and possible further attacks. Versions 9.0.3.Final, 9.1.7.Final, 8.2.10.Final, 9.2.2.Final, 9.3.0.Alpha1 are believed to be affected.", "title": "Vulnerability description" }, { "category": "summary", "text": "infinispan: deserialization of data in XML and JSON transcoders", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1131" }, { "category": "external", "summary": "RHBZ#1576492", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1576492" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1131", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1131" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1131", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1131" } ], "release_date": "2018-05-14T14:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "infinispan: deserialization of data in XML and JSON transcoders" }, { "cve": "CVE-2018-8009", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2018-06-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1593018" } ], "notes": [ { "category": "description", "text": "Apache Hadoop 3.1.0, 3.0.0-alpha to 3.0.2, 2.9.0 to 2.9.1, 2.8.0 to 2.8.4, 2.0.0-alpha to 2.7.6, 0.23.0 to 0.23.11 is exploitable via the zip slip vulnerability in places that accept a zip file.", "title": "Vulnerability description" }, { "category": "summary", "text": "hadoop: arbitrary file write vulnerability / arbitrary code execution using a specially crafted zip file", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of rhs-hadoop as shipped with Red Hat Gluster Storage 3. For JBoss Fuse 6.3 and 7 standalone, while they ship vulnerable artifact via camel-hbase, camel-hdfs2 (fuse 6.3) and camel-hdfs2 (fuse 7), there\u0027s no invocation on the flawed code that could lead to an unzip operation. So fuse 6.3, 7 standalone are not affected. However FIS 2.0 and Fuse 7 on OpenShift ship vulnerable artifact via maven BOM, so setting fuse as affected for this reason.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-8009" }, { "category": "external", "summary": "RHBZ#1593018", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1593018" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-8009", "url": "https://www.cve.org/CVERecord?id=CVE-2018-8009" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-8009", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-8009" } ], "release_date": "2018-06-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "hadoop: arbitrary file write vulnerability / arbitrary code execution using a specially crafted zip file" }, { "cve": "CVE-2018-8034", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2018-07-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1607580" } ], "notes": [ { "category": "description", "text": "The host name verification when using TLS with the WebSocket client was missing. It is now enabled by default. Versions Affected: Apache Tomcat 9.0.0.M1 to 9.0.9, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, and 7.0.35 to 7.0.88.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Host name verification missing in WebSocket client", "title": "Vulnerability summary" }, { "category": "other", "text": "Tomcat 6, and Red Hat products shipping it, are not affected by this CVE. Tomcat 7, 8, and 9, as well as Red Hat Products shipping them, are affected. Affected products, including Red Hat JBoss Web Server 3 and 5, Enterprise Application Server 6, and Fuse 7, may provide fixes for this issue in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-8034" }, { "category": "external", "summary": "RHBZ#1607580", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1607580" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-8034", "url": "https://www.cve.org/CVERecord?id=CVE-2018-8034" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-8034", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-8034" } ], "release_date": "2018-07-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "tomcat: Host name verification missing in WebSocket client" }, { "cve": "CVE-2018-11307", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-02-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1677341" } ], "notes": [ { "category": "description", "text": "A vulnerability was discovered in jackson-databind where it would permit deserialization of a malicious object using MyBatis classes when using DefaultTyping. An attacker could use this flaw to achieve content exfiltration and possibly conduct further attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Potential information exfiltration with default typing, serialization gadget from MyBatis", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 is not affected by this issue, since Candlepin\u0027s java runtime environment does not load MyBatis classes.\n\nRed Hat Virtualization 4 is not affected by this issue, since it does not include MyBatis classes.\n\nRed Hat Fuse 6 and 7 are not directly affected by this issue, as although they do ship the vulnerable jackson-databind component, they do not enable polymorphic deserialization or default typing which are required for exploitability. Their impacts have correspondingly been reduced to Moderate. Future updates may address this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-11307" }, { "category": "external", "summary": "RHBZ#1677341", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1677341" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-11307", "url": "https://www.cve.org/CVERecord?id=CVE-2018-11307" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-11307", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11307" } ], "release_date": "2018-05-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Potential information exfiltration with default typing, serialization gadget from MyBatis" }, { "cve": "CVE-2018-11775", "discovery_date": "2018-09-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1629083" } ], "notes": [ { "category": "description", "text": "TLS hostname verification when using the Apache ActiveMQ Client before 5.15.6 was missing which could make the client vulnerable to a MITM attack between a Java application using the ActiveMQ client and the ActiveMQ server. This is now enabled by default.", "title": "Vulnerability description" }, { "category": "summary", "text": "activemq: ActiveMQ Client Missing TLS Hostname Verification", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-11775" }, { "category": "external", "summary": "RHBZ#1629083", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1629083" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-11775", "url": "https://www.cve.org/CVERecord?id=CVE-2018-11775" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-11775", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11775" } ], "release_date": "2018-09-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "activemq: ActiveMQ Client Missing TLS Hostname Verification" }, { "cve": "CVE-2018-11796", "cwe": { "id": "CWE-776", "name": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)" }, "discovery_date": "2018-10-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1639090" } ], "notes": [ { "category": "description", "text": "In Apache Tika 1.19 (CVE-2018-11761), we added an entity expansion limit for XML parsing. However, Tika reuses SAXParsers and calls reset() after each parse, which, for Xerces2 parsers, as per the documentation, removes the user-specified SecurityManager and thus removes entity expansion limits after the first parse. Apache Tika versions from 0.1 to 1.19 are therefore still vulnerable to entity expansions which can lead to a denial of service attack. Users should upgrade to 1.19.1 or later.", "title": "Vulnerability description" }, { "category": "summary", "text": "tika: Incomplete fix allows for XML entity expansion resulting in denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of tika which is embedded in the nutch package as shipped with Red Hat Satellite 5. The tika server is not exposed, as such exploitation is difficult, Red Hat Product Security has rated this issue as having security impact of Low. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-11796" }, { "category": "external", "summary": "RHBZ#1639090", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1639090" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-11796", "url": "https://www.cve.org/CVERecord?id=CVE-2018-11796" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-11796", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11796" }, { "category": "external", "summary": "https://lists.apache.org/thread.html/88de8350cda9b184888ec294c813c5bd8a2081de8fd3666f8904bc05@%3Cdev.tika.apache.org%3E", "url": "https://lists.apache.org/thread.html/88de8350cda9b184888ec294c813c5bd8a2081de8fd3666f8904bc05@%3Cdev.tika.apache.org%3E" } ], "release_date": "2018-10-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "tika: Incomplete fix allows for XML entity expansion resulting in denial of service" }, { "cve": "CVE-2018-12022", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-01-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1671097" } ], "notes": [ { "category": "description", "text": "A vulnerability was discovered in jackson-databind where it would permit deserialization of a malicious object using Jodd DB connection classes when using DefaultTyping. An attacker could use this flaw to achieve remote code execution under certain circumstances.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: improper polymorphic deserialization of types from Jodd-db library", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 is not affected by this issue, since Candlepin\u0027s java runtime environment does not load Jodd classes.\n\nRed Hat Virtualization 4 is not affected by this issue, since it does not load Jodd classes.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-12022" }, { "category": "external", "summary": "RHBZ#1671097", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1671097" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-12022", "url": "https://www.cve.org/CVERecord?id=CVE-2018-12022" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12022", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12022" } ], "release_date": "2018-05-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: improper polymorphic deserialization of types from Jodd-db library" }, { "cve": "CVE-2018-12023", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-01-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1671096" } ], "notes": [ { "category": "description", "text": "A vulnerability was discovered in jackson-databind where it would permit deserialization of a malicious object using Oracle JDBC classes when using DefaultTyping. An attacker could use this flaw to achieve remote code execution under certain circumstances.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: improper polymorphic deserialization of types from Oracle JDBC driver", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 is not affected by this issue, since Candlepin\u0027s java runtime environment does not load Oracle\u0027s JDBC classes.\n\nRed Hat Virtualization 4 is not affected by this issue, since it does not load Oracle\u0027s JDBC classes.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-12023" }, { "category": "external", "summary": "RHBZ#1671096", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1671096" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-12023", "url": "https://www.cve.org/CVERecord?id=CVE-2018-12023" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12023", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12023" } ], "release_date": "2018-06-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: improper polymorphic deserialization of types from Oracle JDBC driver" }, { "cve": "CVE-2018-14718", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1666415" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in jackson-databind, where it would permit polymorphic deserialization of a malicious object using slf4j classes. An attacker could use this flaw to execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: arbitrary code execution in slf4j-ext class", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability in jackson-databind involves exploiting CVE-2018-1088 against slf4j, which was fixed in Red Hat products through the errata referenced at https://access.redhat.com/security/cve/cve-2018-8088. Applications that link only slf4j versions including that fix are not vulnerable to this vulnerability.\n\nRed Hat Satellite 6 is not affected by this issue, since its candlepin component doesn\u0027t bundle slf4j-ext jar.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-14718" }, { "category": "external", "summary": "RHBZ#1666415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666415" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-14718", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14718" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14718", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14718" } ], "release_date": "2018-07-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: arbitrary code execution in slf4j-ext class" }, { "cve": "CVE-2018-14719", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1666418" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in jackson-databind, where it would permit polymorphic deserialization of a malicious object using blaze classes. An attacker could use this flaw to execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: arbitrary code execution in blaze-ds-opt and blaze-ds-core classes", "title": "Vulnerability summary" }, { "category": "other", "text": "The following Red Hat products are not affected by this issue as they do not bundle or provide the requisite gadget jars to exploit this vulnerability:\nRed Hat Satellite 6\nRed Hat Enterprise Virtualization 4\nRed Hat Fuse 6, 7, and Fuse Integration Services 2\nRed Hat A-MQ 6", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-14719" }, { "category": "external", "summary": "RHBZ#1666418", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666418" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-14719", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14719" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14719", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14719" } ], "release_date": "2018-07-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: arbitrary code execution in blaze-ds-opt and blaze-ds-core classes" }, { "cve": "CVE-2018-14720", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "discovery_date": "2019-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1666423" } ], "notes": [ { "category": "description", "text": "FasterXML jackson-databind 2.x before 2.9.7 might allow attackers to conduct external XML entity (XXE) attacks by leveraging failure to block unspecified JDK classes from polymorphic deserialization.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: exfiltration/XXE in some JDK classes", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 is not affected by this issue, since its only supported Java runtime (openJDK) doesn\u0027t bundle the com.sun.deploy.security.ruleset.DRSHelper class.\n\nRed Hat Enterprise Virtualization 4 is not affected by this issue, since its only supported Java runtime (openJDK) doesn\u0027t bundle the com.sun.deploy.security.ruleset.DRSHelper class.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-14720" }, { "category": "external", "summary": "RHBZ#1666423", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666423" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-14720", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14720" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14720", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14720" } ], "release_date": "2018-07-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible \n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Fuse 7.5.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: exfiltration/XXE in some JDK classes" }, { "cve": "CVE-2018-14721", "cwe": { "id": "CWE-352", "name": "Cross-Site Request Forgery (CSRF)" }, "discovery_date": "2019-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1666428" } ], "notes": [ { "category": "description", "text": "FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to conduct server-side request forgery (SSRF) attacks by leveraging failure to block the axis2-jaxws class from polymorphic deserialization.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: server-side request forgery (SSRF) in axis2-jaxws class", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 is not affected by this issue, since its candlepin component doesn\u0027t bundle axis2-jaxws jar.\n\nRed Hat Virtualization is not affected by this issue, since its does not bundle axis2-jaxws jar.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-14721" }, { "category": "external", "summary": "RHBZ#1666428", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666428" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-14721", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14721" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14721", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14721" } ], "release_date": "2018-07-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: server-side request forgery (SSRF) in axis2-jaxws class" }, { "cve": "CVE-2018-19360", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1666482" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in jackson-databind, where it would permit polymorphic deserialization of a malicious object using the axis2-transport-jms class. An attacker could use this flaw to execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: improper polymorphic deserialization in axis2-transport-jms class", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 is not affected by this issue, since its candlepin component doesn\u0027t include axis2-transport-jms jar.\n\nRed Hat Virtualization 4 is not affected by this issue, since it does not include axis2-transport-jms jar.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-19360" }, { "category": "external", "summary": "RHBZ#1666482", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666482" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-19360", "url": "https://www.cve.org/CVERecord?id=CVE-2018-19360" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-19360", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-19360" } ], "release_date": "2018-11-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: improper polymorphic deserialization in axis2-transport-jms class" }, { "cve": "CVE-2018-19361", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1666484" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in jackson-databind, where it would permit polymorphic deserialization of a malicious object using the OpenJPA class. An attacker could use this flaw to execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: improper polymorphic deserialization in openjpa class", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 is not affected by this issue, since its candlepin component doesn\u0027t bundle openjpa jar.\n\nRed Hat Virtualization 4 is not affected by this issue, since its candlepin component doesn\u0027t bundle openjpa jar.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-19361" }, { "category": "external", "summary": "RHBZ#1666484", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666484" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-19361", "url": "https://www.cve.org/CVERecord?id=CVE-2018-19361" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-19361", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-19361" } ], "release_date": "2018-11-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: improper polymorphic deserialization in openjpa class" }, { "cve": "CVE-2018-19362", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1666489" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in jackson-databind, where it would permit polymorphic deserialization of a malicious object using the jboss-common-core class. An attacker could use this flaw to execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: improper polymorphic deserialization in jboss-common-core class", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 is not affected by this issue, since its candlepin component doesn\u0027t bundle jboss-common-core jar.\n\nRed Hat Virtualization 4 is not affected by this issue, since its candlepin component doesn\u0027t bundle jboss-common-core jar.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-19362" }, { "category": "external", "summary": "RHBZ#1666489", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666489" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-19362", "url": "https://www.cve.org/CVERecord?id=CVE-2018-19362" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-19362", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-19362" } ], "release_date": "2018-11-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: improper polymorphic deserialization in jboss-common-core class" }, { "cve": "CVE-2018-1000850", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2018-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1663904" } ], "notes": [ { "category": "description", "text": "A flaw was found in Retrofit, where it allowed directory traversal via its RequestBuilder class. An attacker could use this flaw to access information or commands outside of its set permissions.", "title": "Vulnerability description" }, { "category": "summary", "text": "retrofit: Directory traversal in RequestBuilder allows manipulation of resources", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1000850" }, { "category": "external", "summary": "RHBZ#1663904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1663904" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1000850", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1000850" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000850", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000850" } ], "release_date": "2018-10-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "retrofit: Directory traversal in RequestBuilder allows manipulation of resources" }, { "cve": "CVE-2019-0201", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "discovery_date": "2019-05-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1715197" } ], "notes": [ { "category": "description", "text": "A flaw was found in Apache ZooKeeper. A lack of permission checks while retrieving ACLs allows unsalted hash values to be disclosed for unauthenticated or unprivileged users.", "title": "Vulnerability description" }, { "category": "summary", "text": "zookeeper: Information disclosure in Apache ZooKeeper", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-0201" }, { "category": "external", "summary": "RHBZ#1715197", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1715197" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0201", "url": "https://www.cve.org/CVERecord?id=CVE-2019-0201" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0201", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0201" } ], "release_date": "2019-05-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" }, { "category": "workaround", "details": "Use an authentication method other than Digest (e.g. Kerberos) or upgrade to zookeeper 3.4.14 or later (3.5.5 or later if on the 3.5 branch). [https://zookeeper.apache.org/security.html#CVE-2019-0201]", "product_ids": [ "Red Hat Fuse 7.5.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "zookeeper: Information disclosure in Apache ZooKeeper" }, { "cve": "CVE-2019-0204", "cwe": { "id": "CWE-250", "name": "Execution with Unnecessary Privileges" }, "discovery_date": "2019-03-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1692755" } ], "notes": [ { "category": "description", "text": "A flaw was found in Docker image running under root user, where it is possible to overwrite the init helper binary of the container runtime or the command executor in Apache Mesos. A malicious user could use this flaw to gain root-level code execution on the host.", "title": "Vulnerability description" }, { "category": "summary", "text": "mesos: docker image code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-0204" }, { "category": "external", "summary": "RHBZ#1692755", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1692755" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0204", "url": "https://www.cve.org/CVERecord?id=CVE-2019-0204" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0204", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0204" } ], "release_date": "2019-03-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "mesos: docker image code execution" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9518", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735749" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using frames with an empty payload, a flood could occur that results in excessive CPU usage and starvation of other clients. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using empty frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9518" }, { "category": "external", "summary": "RHBZ#1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9518", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using empty frames results in excessive resource consumption" }, { "cve": "CVE-2019-10173", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "discovery_date": "2019-06-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1722971" } ], "notes": [ { "category": "description", "text": "It was found that xstream API version 1.4.10 introduced a regression for a previous deserialization flaw. If the security framework has not been initialized, it may allow a remote attacker to run arbitrary shell commands when unmarshalling XML or any supported format. This a regression of CVE-2013-7285 fixed in 1.4.7 (fixed) as of BPMS 6.0.1, the regression was introduced with xstream-1.4.10 implemented in RHPAM.", "title": "Vulnerability description" }, { "category": "summary", "text": "xstream: remote code execution due to insecure XML deserialization (regression of CVE-2013-7285)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10173" }, { "category": "external", "summary": "RHBZ#1722971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1722971" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10173", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10173" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10173", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10173" }, { "category": "external", "summary": "http://x-stream.github.io/changes.html#1.4.11", "url": "http://x-stream.github.io/changes.html#1.4.11" } ], "release_date": "2018-10-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xstream: remote code execution due to insecure XML deserialization (regression of CVE-2013-7285)" }, { "acknowledgments": [ { "names": [ "Jeremy Choi" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2019-14860", "cwe": { "id": "CWE-942", "name": "Permissive Cross-domain Policy with Untrusted Domains" }, "discovery_date": "2019-10-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1761912" } ], "notes": [ { "category": "description", "text": "It was found that the Syndesis configuration for Cross-Origin Resource Sharing was set to allow all origins. An attacker could use this lack of protection to conduct phishing attacks and further access unauthorized information.", "title": "Vulnerability description" }, { "category": "summary", "text": "syndesis: default CORS configuration is allow all", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14860" }, { "category": "external", "summary": "RHBZ#1761912", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1761912" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14860", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14860" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14860", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14860" } ], "release_date": "2019-10-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "syndesis: default CORS configuration is allow all" }, { "cve": "CVE-2019-16869", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2019-09-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1758619" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty, where whitespace before the colon in HTTP headers is mishandled. This flaw allows an attacker to cause HTTP request smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that this vulnerability does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships vulnerable netty version embedded in Candlepin, however, is not directly vulnerable since HTTP requests are handled by Tomcat and not netty.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-16869" }, { "category": "external", "summary": "RHBZ#1758619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758619" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16869", "url": "https://www.cve.org/CVERecord?id=CVE-2019-16869" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16869", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16869" } ], "release_date": "2019-09-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat Fuse 7.5.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers" } ] }
RHSA-2019:4019
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat JBoss Enterprise Application Platform 7.2 for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime.\n\nThis release of Red Hat JBoss Enterprise Application Platform 7.2.5 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.2.4, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.2.5 Release Notes for information about the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* undertow: HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511)\n\n* undertow: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* undertow: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* undertow: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default (CVE-2019-14838)\n\n* wildfly: wildfly-security-manager: security manager authorization bypass (CVE-2019-14843)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:4019", "url": "https://access.redhat.com/errata/RHSA-2019:4019" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/", "url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/html-single/installation_guide/", "url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/html-single/installation_guide/" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "1751227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751227" }, { "category": "external", "summary": "1752980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752980" }, { "category": "external", "summary": "JBEAP-17075", "url": "https://issues.redhat.com/browse/JBEAP-17075" }, { "category": "external", "summary": "JBEAP-17220", "url": "https://issues.redhat.com/browse/JBEAP-17220" }, { "category": "external", "summary": "JBEAP-17365", "url": "https://issues.redhat.com/browse/JBEAP-17365" }, { "category": "external", "summary": "JBEAP-17476", "url": "https://issues.redhat.com/browse/JBEAP-17476" }, { "category": "external", "summary": "JBEAP-17478", "url": "https://issues.redhat.com/browse/JBEAP-17478" }, { "category": "external", "summary": "JBEAP-17483", "url": "https://issues.redhat.com/browse/JBEAP-17483" }, { "category": "external", "summary": "JBEAP-17495", "url": "https://issues.redhat.com/browse/JBEAP-17495" }, { "category": "external", "summary": "JBEAP-17496", "url": "https://issues.redhat.com/browse/JBEAP-17496" }, { "category": "external", "summary": "JBEAP-17513", "url": "https://issues.redhat.com/browse/JBEAP-17513" }, { "category": "external", "summary": "JBEAP-17521", "url": "https://issues.redhat.com/browse/JBEAP-17521" }, { "category": "external", "summary": "JBEAP-17523", "url": "https://issues.redhat.com/browse/JBEAP-17523" }, { "category": "external", "summary": "JBEAP-17547", "url": "https://issues.redhat.com/browse/JBEAP-17547" }, { "category": "external", "summary": "JBEAP-17548", "url": "https://issues.redhat.com/browse/JBEAP-17548" }, { "category": "external", "summary": "JBEAP-17560", "url": "https://issues.redhat.com/browse/JBEAP-17560" }, { "category": "external", "summary": "JBEAP-17579", "url": "https://issues.redhat.com/browse/JBEAP-17579" }, { "category": "external", "summary": "JBEAP-17582", "url": "https://issues.redhat.com/browse/JBEAP-17582" }, { "category": "external", "summary": "JBEAP-17604", "url": "https://issues.redhat.com/browse/JBEAP-17604" }, { "category": "external", "summary": "JBEAP-17631", "url": "https://issues.redhat.com/browse/JBEAP-17631" }, { "category": "external", "summary": "JBEAP-17647", "url": "https://issues.redhat.com/browse/JBEAP-17647" }, { "category": "external", "summary": "JBEAP-17665", "url": "https://issues.redhat.com/browse/JBEAP-17665" }, { "category": "external", "summary": "JBEAP-17722", "url": "https://issues.redhat.com/browse/JBEAP-17722" }, { "category": "external", "summary": "JBEAP-17874", "url": "https://issues.redhat.com/browse/JBEAP-17874" }, { "category": "external", "summary": "JBEAP-17880", "url": "https://issues.redhat.com/browse/JBEAP-17880" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_4019.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update", "tracking": { "current_release_date": "2025-03-19T15:00:36+00:00", "generator": { "date": "2025-03-19T15:00:36+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.1" } }, "id": "RHSA-2019:4019", "initial_release_date": "2019-11-26T20:01:24+00:00", "revision_history": [ { "date": "2019-11-26T20:01:24+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-11-26T20:01:24+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-03-19T15:00:36+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product": { "name": "Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el7" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" }, { "branches": [ { "category": "product_version", "name": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "product": { "name": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "product_id": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00005.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "product": { "name": "eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "product_id": "eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00005.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "product_id": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "product_id": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "product_id": "eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "product_id": "eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "product_id": "eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "product": { "name": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "product_id": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00003.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "product": { "name": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "product_id": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00002.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product": { "name": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product_id": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product": { "name": "eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product_id": "eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product": { "name": "eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product_id": "eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product": { "name": "eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product_id": "eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product": { "name": "eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product_id": "eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product": { "name": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product_id": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product": { "name": "eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product_id": "eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product": { "name": "eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product_id": "eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product": { "name": "eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product_id": "eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product": { "name": "eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product_id": "eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "product_id": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "product_id": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "product": { "name": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "product_id": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00002.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "product": { "name": "eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "product_id": "eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00002.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "product": { "name": "eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "product_id": "eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00002.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "product": { "name": "eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "product_id": "eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00002.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "product": { "name": "eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "product_id": "eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00002.1.el7eap?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "product": { "name": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "product_id": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00005.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "product": { "name": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "product_id": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "product": { "name": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "product_id": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "product": { "name": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "product_id": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00003.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "product": { "name": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "product_id": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00002.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "product": { "name": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "product_id": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "product": { "name": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "product_id": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "product": { "name": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "product_id": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "product": { "name": "eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "product_id": "eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "product": { "name": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "product_id": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "product": { "name": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "product_id": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "product": { "name": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "product_id": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "product": { "name": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "product_id": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "product": { "name": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "product_id": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "product": { "name": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "product_id": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "product": { "name": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "product_id": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "product": { "name": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "product_id": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "product": { "name": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "product_id": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src", "product": { "name": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src", "product_id": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "product": { "name": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "product_id": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "product": { "name": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "product_id": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "product": { "name": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "product_id": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00002.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "product": { "name": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "product_id": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "product": { "name": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "product_id": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=x86_64" } } }, { "category": "product_version", "name": "eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "product": { "name": "eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "product_id": "eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7eap?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src" }, "product_reference": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch" }, "product_reference": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src" }, "product_reference": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch" }, "product_reference": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src" }, "product_reference": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src" }, "product_reference": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src" }, "product_reference": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src" }, "product_reference": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src" }, "product_reference": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src" }, "product_reference": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src" }, "product_reference": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src" }, "product_reference": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src" }, "product_reference": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch" }, "product_reference": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src" }, "product_reference": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch" }, "product_reference": "eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch" }, "product_reference": "eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch" }, "product_reference": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src" }, "product_reference": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch" }, "product_reference": "eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch" }, "product_reference": "eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch" }, "product_reference": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src" }, "product_reference": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch" }, "product_reference": "eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch" }, "product_reference": "eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch" }, "product_reference": "eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch" }, "product_reference": "eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch" }, "product_reference": "eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src" }, "product_reference": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src" }, "product_reference": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch" }, "product_reference": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src" }, "product_reference": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src" }, "product_reference": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src" }, "product_reference": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src" }, "product_reference": "eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch" }, "product_reference": "eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch" }, "product_reference": "eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch" }, "product_reference": "eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch" }, "product_reference": "eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src" }, "product_reference": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src" }, "product_reference": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64 as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64" }, "product_reference": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64 as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64" }, "product_reference": "eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" }, "product_reference": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-9511", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741860" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker can request a large amount of data by manipulating window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this queue can consume excess CPU, memory, or both, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: large amount of data requests leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "There are no mitigations available for nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "RHBZ#1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9511", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T20:01:24+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4019" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: large amount of data requests leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T20:01:24+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4019" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T20:01:24+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4019" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T20:01:24+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4019" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "F\u00e1bio Magalh\u00e3es de Andrade" ], "organization": "Sonda Ativas" }, { "names": [ "Juliano de Castro Santos", "Leonard Lunardi" ], "organization": "UnimedBH" } ], "cve": "CVE-2019-14838", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2019-08-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1751227" } ], "notes": [ { "category": "description", "text": "It was found that Wildfly users had default user permissions set incorrectly. A malicious user could use this flaw to access unauthorized controls for the application server.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14838" }, { "category": "external", "summary": "RHBZ#1751227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751227" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14838", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14838" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14838", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14838" }, { "category": "external", "summary": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14838", "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14838" } ], "release_date": "2019-10-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T20:01:24+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4019" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default" }, { "cve": "CVE-2019-14843", "cwe": { "id": "CWE-592", "name": "CWE-592" }, "discovery_date": "2019-09-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1752980" } ], "notes": [ { "category": "description", "text": "A flaw was found in Wildfly Security Manager, running under JDK 11 or 8, that authorized requests for any requester. This flaw could be used by a malicious app deployed on the app server to access unauthorized information and possibly conduct further attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-security-manager: security manager authorization bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14843" }, { "category": "external", "summary": "RHBZ#1752980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752980" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14843", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14843" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14843", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14843" } ], "release_date": "2019-09-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T20:01:24+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4019" }, { "category": "workaround", "details": "This flaw only affects the Security Manager running under JDK 11 or 8. To mitigate exposure to this flaw, do not run under those JDK versions.", "product_ids": [ "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "wildfly-security-manager: security manager authorization bypass" } ] }
RHSA-2019:2766
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for gRPC, included in multus-cni-container, operator-lifecycle-manager-container, and operator-registry-container is now available for Red Hat OpenShift Container Platform 4.1.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains updated container images for multus-cni, operator-lifecycle-manager, and operator-registry in Red Hat OpenShift Container Platform 4.1.15. Each of these container images includes gRPC, which has been updated with the below fixes.\n\nSecurity Fix(es):\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:2766", "url": "https://access.redhat.com/errata/RHSA-2019:2766" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2766.json" } ], "title": "Red Hat Security Advisory: Red Hat OpenShift Enterprise 4.1.15 gRPC security update", "tracking": { "current_release_date": "2025-03-15T19:43:53+00:00", "generator": { "date": "2025-03-15T19:43:53+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.1" } }, "id": "RHSA-2019:2766", "initial_release_date": "2019-09-12T18:32:52+00:00", "revision_history": [ { "date": "2019-09-12T18:32:52+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-09-12T18:32:52+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-03-15T19:43:53+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.1", "product": { "name": "Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.1::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "openshift4/ose-multus-cni@sha256:38bc93888a2577e90168a0d4f7996d43f38878e11db255b26e58f5aa50b9df56_amd64", "product": { "name": "openshift4/ose-multus-cni@sha256:38bc93888a2577e90168a0d4f7996d43f38878e11db255b26e58f5aa50b9df56_amd64", "product_id": "openshift4/ose-multus-cni@sha256:38bc93888a2577e90168a0d4f7996d43f38878e11db255b26e58f5aa50b9df56_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-multus-cni@sha256:38bc93888a2577e90168a0d4f7996d43f38878e11db255b26e58f5aa50b9df56?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-cni\u0026tag=v4.1.15-201909041605" } } }, { "category": "product_version", "name": "openshift4/ose-operator-lifecycle-manager@sha256:0eca3cf5068a4c366f8f8a0fd4891d9cd86fe239764d189d37b8938196e323a1_amd64", "product": { "name": "openshift4/ose-operator-lifecycle-manager@sha256:0eca3cf5068a4c366f8f8a0fd4891d9cd86fe239764d189d37b8938196e323a1_amd64", "product_id": "openshift4/ose-operator-lifecycle-manager@sha256:0eca3cf5068a4c366f8f8a0fd4891d9cd86fe239764d189d37b8938196e323a1_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-operator-lifecycle-manager@sha256:0eca3cf5068a4c366f8f8a0fd4891d9cd86fe239764d189d37b8938196e323a1?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-lifecycle-manager\u0026tag=v4.1.15-201909041605" } } }, { "category": "product_version", "name": "openshift4/ose-operator-registry@sha256:79a386249506345846398f6bb26963f2d1e19dde1242003f42332718847be9c5_amd64", "product": { "name": "openshift4/ose-operator-registry@sha256:79a386249506345846398f6bb26963f2d1e19dde1242003f42332718847be9c5_amd64", "product_id": "openshift4/ose-operator-registry@sha256:79a386249506345846398f6bb26963f2d1e19dde1242003f42332718847be9c5_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-operator-registry@sha256:79a386249506345846398f6bb26963f2d1e19dde1242003f42332718847be9c5?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-registry\u0026tag=v4.1.15-201909041605" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-cni@sha256:38bc93888a2577e90168a0d4f7996d43f38878e11db255b26e58f5aa50b9df56_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-cni@sha256:38bc93888a2577e90168a0d4f7996d43f38878e11db255b26e58f5aa50b9df56_amd64" }, "product_reference": "openshift4/ose-multus-cni@sha256:38bc93888a2577e90168a0d4f7996d43f38878e11db255b26e58f5aa50b9df56_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-lifecycle-manager@sha256:0eca3cf5068a4c366f8f8a0fd4891d9cd86fe239764d189d37b8938196e323a1_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-lifecycle-manager@sha256:0eca3cf5068a4c366f8f8a0fd4891d9cd86fe239764d189d37b8938196e323a1_amd64" }, "product_reference": "openshift4/ose-operator-lifecycle-manager@sha256:0eca3cf5068a4c366f8f8a0fd4891d9cd86fe239764d189d37b8938196e323a1_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-registry@sha256:79a386249506345846398f6bb26963f2d1e19dde1242003f42332718847be9c5_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-registry@sha256:79a386249506345846398f6bb26963f2d1e19dde1242003f42332718847be9c5_amd64" }, "product_reference": "openshift4/ose-operator-registry@sha256:79a386249506345846398f6bb26963f2d1e19dde1242003f42332718847be9c5_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-cni@sha256:38bc93888a2577e90168a0d4f7996d43f38878e11db255b26e58f5aa50b9df56_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-lifecycle-manager@sha256:0eca3cf5068a4c366f8f8a0fd4891d9cd86fe239764d189d37b8938196e323a1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-registry@sha256:79a386249506345846398f6bb26963f2d1e19dde1242003f42332718847be9c5_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-12T18:32:52+00:00", "details": "For OpenShift Container Platform 4.1 see the following documentation, which\nwill be updated shortly for release 4.1.z, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-release-notes.html", "product_ids": [ "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-cni@sha256:38bc93888a2577e90168a0d4f7996d43f38878e11db255b26e58f5aa50b9df56_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-lifecycle-manager@sha256:0eca3cf5068a4c366f8f8a0fd4891d9cd86fe239764d189d37b8938196e323a1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-registry@sha256:79a386249506345846398f6bb26963f2d1e19dde1242003f42332718847be9c5_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2766" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-cni@sha256:38bc93888a2577e90168a0d4f7996d43f38878e11db255b26e58f5aa50b9df56_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-lifecycle-manager@sha256:0eca3cf5068a4c366f8f8a0fd4891d9cd86fe239764d189d37b8938196e323a1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-registry@sha256:79a386249506345846398f6bb26963f2d1e19dde1242003f42332718847be9c5_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-cni@sha256:38bc93888a2577e90168a0d4f7996d43f38878e11db255b26e58f5aa50b9df56_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-lifecycle-manager@sha256:0eca3cf5068a4c366f8f8a0fd4891d9cd86fe239764d189d37b8938196e323a1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-registry@sha256:79a386249506345846398f6bb26963f2d1e19dde1242003f42332718847be9c5_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-12T18:32:52+00:00", "details": "For OpenShift Container Platform 4.1 see the following documentation, which\nwill be updated shortly for release 4.1.z, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-release-notes.html", "product_ids": [ "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-cni@sha256:38bc93888a2577e90168a0d4f7996d43f38878e11db255b26e58f5aa50b9df56_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-lifecycle-manager@sha256:0eca3cf5068a4c366f8f8a0fd4891d9cd86fe239764d189d37b8938196e323a1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-registry@sha256:79a386249506345846398f6bb26963f2d1e19dde1242003f42332718847be9c5_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2766" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-cni@sha256:38bc93888a2577e90168a0d4f7996d43f38878e11db255b26e58f5aa50b9df56_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-lifecycle-manager@sha256:0eca3cf5068a4c366f8f8a0fd4891d9cd86fe239764d189d37b8938196e323a1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-registry@sha256:79a386249506345846398f6bb26963f2d1e19dde1242003f42332718847be9c5_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-cni@sha256:38bc93888a2577e90168a0d4f7996d43f38878e11db255b26e58f5aa50b9df56_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-lifecycle-manager@sha256:0eca3cf5068a4c366f8f8a0fd4891d9cd86fe239764d189d37b8938196e323a1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-registry@sha256:79a386249506345846398f6bb26963f2d1e19dde1242003f42332718847be9c5_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-12T18:32:52+00:00", "details": "For OpenShift Container Platform 4.1 see the following documentation, which\nwill be updated shortly for release 4.1.z, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-release-notes.html", "product_ids": [ "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-cni@sha256:38bc93888a2577e90168a0d4f7996d43f38878e11db255b26e58f5aa50b9df56_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-lifecycle-manager@sha256:0eca3cf5068a4c366f8f8a0fd4891d9cd86fe239764d189d37b8938196e323a1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-registry@sha256:79a386249506345846398f6bb26963f2d1e19dde1242003f42332718847be9c5_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2766" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-cni@sha256:38bc93888a2577e90168a0d4f7996d43f38878e11db255b26e58f5aa50b9df56_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-lifecycle-manager@sha256:0eca3cf5068a4c366f8f8a0fd4891d9cd86fe239764d189d37b8938196e323a1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-registry@sha256:79a386249506345846398f6bb26963f2d1e19dde1242003f42332718847be9c5_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" } ] }
rhsa-2020:2067
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat build of Thorntail.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability. For more information, see the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "This release of Red Hat build of Thorntail 2.5.1 includes security updates, bug fixes, and enhancements. For more information, see the release notes page listed in the References section.\n\nSecurity Fix(es):\n\n* apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default (CVE-2019-10086)\n\n* cxf: does not restrict the number of message attachments (CVE-2019-12406)\n\n* cxf: OpenId Connect token service does not properly validate the clientId (CVE-2019-12419)\n\n* hibernate-validator: safeHTML validator allows XSS (CVE-2019-10219)\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511)\n\n* jackson-databind: Multiple serialization gadgets (CVE-2019-17531, CVE-2019-16943, CVE-2019-16942, CVE-2019-17267, CVE-2019-14540, CVE-2019-16335, CVE-2019-14893, CVE-2019-14892, CVE-2020-9546, CVE-2020-9547, CVE-2020-9548, CVE-2020-10969, CVE-2020-10968, CVE-2020-11111, CVE-2020-11112, CVE-2020-11113, CVE-2020-11619, CVE-2020-11620, CVE-2019-20330, CVE-2020-8840)\n\n* jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command \nexecution (CVE-2020-10672, CVE-2020-10673)\n\n* keycloak: adapter endpoints are exposed via arbitrary URLs (CVE-2019-14820)\n\n* keycloak: missing signatures validation on CRL used to verify client certificates (CVE-2019-3875)\n\n* keycloak: SAML broker does not check existence of signature on document allowing any user impersonation (CVE-2019-10201)\n\n* keycloak: CSRF check missing in My Resources functionality in the Account Console (CVE-2019-10199)\n\n* keycloak: cross-realm user access auth bypass (CVE-2019-14832)\n\n* netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling (CVE-2020-7238)\n\n* SmallRye: SecuritySupport class is incorrectly public and contains a static method to access the current threads context class loader (CVE-2020-1729)\n\n* thrift: Out-of-bounds read related to TJSONProtocol or TSimpleJSONProtocol (CVE-2019-0210)\n\n* thrift: Endless loop when feed with specific input data (CVE-2019-0205)\n\n* undertow: possible Denial Of Service (DOS) in Undertow HTTP server listening on HTTPS (CVE-2019-14888)\n\n* wildfly: The \u0027enabled-protocols\u0027 value in legacy security is not respected if OpenSSL security provider is in use (CVE-2019-14887)\n\n* wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default (CVE-2019-14838)\n\n* xml-security: Apache Santuario potentially loads XML parsing code from an untrusted source (CVE-2019-12400)\n\nFor more details about the security issues and their impact, the CVSS score, acknowledgements, and other related information, see the CVE pages listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:2067", "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=catRhoar.thorntail\u0026version=2.5.1", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=catRhoar.thorntail\u0026version=2.5.1" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_build_of_thorntail/2.5/html/release_notes_for_thorntail_2.5/", "url": "https://access.redhat.com/documentation/en-us/red_hat_build_of_thorntail/2.5/html/release_notes_for_thorntail_2.5/" }, { "category": "external", "summary": "1649870", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1649870" }, { "category": "external", "summary": "1690628", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1690628" }, { "category": "external", "summary": "1728609", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1728609" }, { "category": "external", "summary": "1729261", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1729261" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1738673", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1738673" }, { "category": "external", "summary": "1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "1749487", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1749487" }, { "category": "external", "summary": "1751227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751227" }, { "category": "external", "summary": "1755831", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755831" }, { "category": "external", "summary": "1755849", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755849" }, { "category": "external", "summary": "1758167", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758167" }, { "category": "external", "summary": "1758171", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758171" }, { "category": "external", "summary": "1758182", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758182" }, { "category": "external", "summary": "1758187", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758187" }, { "category": "external", "summary": "1758191", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758191" }, { "category": "external", "summary": "1764607", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764607" }, { "category": "external", "summary": "1764612", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764612" }, { "category": "external", "summary": "1764658", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764658" }, { "category": "external", "summary": "1767483", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767483" }, { "category": "external", "summary": "1772008", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772008" }, { "category": "external", "summary": "1772464", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772464" }, { "category": "external", "summary": "1775293", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775293" }, { "category": "external", "summary": "1793154", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793154" }, { "category": "external", "summary": "1796225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796225" }, { "category": "external", "summary": "1802444", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802444" }, { "category": "external", "summary": "1815470", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1815470" }, { "category": "external", "summary": "1815495", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1815495" }, { "category": "external", "summary": "1816170", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816170" }, { "category": "external", "summary": "1816175", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816175" }, { "category": "external", "summary": "1816330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816330" }, { "category": "external", "summary": "1816332", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816332" }, { "category": "external", "summary": "1816337", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816337" }, { "category": "external", "summary": "1816340", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816340" }, { "category": "external", "summary": "1819208", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819208" }, { "category": "external", "summary": "1819212", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819212" }, { "category": "external", "summary": "1821304", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821304" }, { "category": "external", "summary": "1821311", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821311" }, { "category": "external", "summary": "1821315", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821315" }, { "category": "external", "summary": "1826798", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1826798" }, { "category": "external", "summary": "1826805", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1826805" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_2067.json" } ], "title": "Red Hat Security Advisory: Red Hat build of Thorntail 2.5.1 security and bug fix update", "tracking": { "current_release_date": "2025-04-09T17:53:03+00:00", "generator": { "date": "2025-04-09T17:53:03+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.2" } }, "id": "RHSA-2020:2067", "initial_release_date": "2020-05-18T10:24:57+00:00", "revision_history": [ { "date": "2020-05-18T10:24:57+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-05-18T10:24:57+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-04-09T17:53:03+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Text-Only RHOAR", "product": { "name": "Text-Only RHOAR", "product_id": "Text-Only RHOAR", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift_application_runtimes:1.0" } } } ], "category": "product_family", "name": "Red Hat OpenShift Application Runtimes" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-0205", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-10-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1764612" } ], "notes": [ { "category": "description", "text": "In Apache Thrift all versions up to and including 0.12.0, a server or client may run into an endless loop when feed with specific input data. Because the issue had already been partially fixed in version 0.11.0, depending on the installed version it affects only certain language bindings.", "title": "Vulnerability description" }, { "category": "summary", "text": "thrift: Endless loop when feed with specific input data", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains a vulnerable version of libthrift. However, OpenDaylight does not expose libthrift in a vulnerable way, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe thrift package in OpenShift Container Platform is installed only in Curator images in the Logging stack. The affected code is included in this package, it\u0027s functionality is not used. This vulnerability is therefore rated Low for OpenShift Container Platform.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-0205" }, { "category": "external", "summary": "RHBZ#1764612", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764612" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0205", "url": "https://www.cve.org/CVERecord?id=CVE-2019-0205" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0205", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0205" } ], "release_date": "2019-10-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "thrift: Endless loop when feed with specific input data" }, { "cve": "CVE-2019-0210", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2019-10-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1764607" } ], "notes": [ { "category": "description", "text": "In Apache Thrift 0.9.3 to 0.12.0, a server implemented in Go using TJSONProtocol or TSimpleJSONProtocol may panic when feed with invalid input data.", "title": "Vulnerability description" }, { "category": "summary", "text": "thrift: Out-of-bounds read related to TJSONProtocol or TSimpleJSONProtocol", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains a vulnerable version of libthrift. However, OpenDaylight is not affected as this is a Golang specific problem, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe version of thrift delivered in OpenShift Container Platform is not affected by this vulnerability as it does not contain the affected code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-0210" }, { "category": "external", "summary": "RHBZ#1764607", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764607" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0210", "url": "https://www.cve.org/CVERecord?id=CVE-2019-0210" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0210", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0210" } ], "release_date": "2019-10-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "thrift: Out-of-bounds read related to TJSONProtocol or TSimpleJSONProtocol" }, { "acknowledgments": [ { "names": [ "Marek Posolda" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2019-3875", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "discovery_date": "2019-03-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1690628" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in keycloak before 6.0.2. The X.509 authenticator supports the verification of client certificates through the CRL, where the CRL list can be obtained from the URL provided in the certificate itself (CDP) or through the separately configured path. The CRL are often available over the network through unsecured protocols (\u0027http\u0027 or \u0027ldap\u0027) and hence the caller should verify the signature and possibly the certification path. Keycloak currently doesn\u0027t validate signatures on CRL, which can result in a possibility of various attacks like man-in-the-middle.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak: missing signatures validation on CRL used to verify client certificates", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-3875" }, { "category": "external", "summary": "RHBZ#1690628", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1690628" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-3875", "url": "https://www.cve.org/CVERecord?id=CVE-2019-3875" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3875", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3875" } ], "release_date": "2019-06-11T14:22:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "keycloak: missing signatures validation on CRL used to verify client certificates" }, { "cve": "CVE-2019-9511", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741860" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker can request a large amount of data by manipulating window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this queue can consume excess CPU, memory, or both, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: large amount of data requests leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "There are no mitigations available for nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "RHBZ#1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9511", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: large amount of data requests leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "cve": "CVE-2019-10086", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-10-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1767483" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Apache Commons BeanUtils, where the class property in PropertyUtilsBean is not suppressed by default. This flaw allows an attacker to access the classloader.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10086" }, { "category": "external", "summary": "RHBZ#1767483", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767483" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10086", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10086" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10086", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10086" }, { "category": "external", "summary": "https://commons.apache.org/proper/commons-beanutils/javadocs/v1.9.4/RELEASE-NOTES.txt", "url": "https://commons.apache.org/proper/commons-beanutils/javadocs/v1.9.4/RELEASE-NOTES.txt" } ], "release_date": "2019-08-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "There is no currently known mitigation for this flaw.", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default" }, { "cve": "CVE-2019-10199", "cwe": { "id": "CWE-352", "name": "Cross-Site Request Forgery (CSRF)" }, "discovery_date": "2019-07-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1729261" } ], "notes": [ { "category": "description", "text": "It was found that Keycloak\u0027s account console did not perform adequate header checks in some requests. An attacker could use this flaw to trick an authenticated user into performing operations via request from an untrusted domain.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak: CSRF check missing in My Resources functionality in the Account Console", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10199" }, { "category": "external", "summary": "RHBZ#1729261", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1729261" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10199", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10199" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10199", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10199" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "keycloak: CSRF check missing in My Resources functionality in the Account Console" }, { "cve": "CVE-2019-10201", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2019-07-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1728609" } ], "notes": [ { "category": "description", "text": "It was found that Keycloak\u0027s SAML broker did not verify missing message signatures. If an attacker modifies the SAML Response and removes the \u003cSignature\u003e sections, the message is still accepted, and the message can be modified. An attacker could use this flaw to impersonate other users and gain access to sensitive information.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak: SAML broker does not check existence of signature on document allowing any user impersonation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10201" }, { "category": "external", "summary": "RHBZ#1728609", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1728609" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10201", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10201" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10201", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10201" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "Administrator can prevent this issue for POST binding by requiring signed assertions.", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "keycloak: SAML broker does not check existence of signature on document allowing any user impersonation" }, { "acknowledgments": [ { "names": [ "Dominik Mizyn" ], "organization": "Samsung R\u0026D Institute Poland" } ], "cve": "CVE-2019-10219", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2019-05-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1738673" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Hibernate-Validator. The SafeHtml validator annotation fails to properly sanitize payloads consisting of potentially malicious code in HTML comments and instructions. This vulnerability can result in an XSS attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "hibernate-validator: safeHTML validator allows XSS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform\u0027s OpenDaylight will not be updated for this flaw because it is being deprecated and is only receiving security fixes for Important and Critical flaws.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10219" }, { "category": "external", "summary": "RHBZ#1738673", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1738673" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10219", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10219" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10219", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10219" } ], "release_date": "2019-08-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hibernate-validator: safeHTML validator allows XSS" }, { "cve": "CVE-2019-12400", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2019-08-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1764658" } ], "notes": [ { "category": "description", "text": "In version 2.0.3 Apache Santuario XML Security for Java, a caching mechanism was introduced to speed up creating new XML documents using a static pool of DocumentBuilders. However, if some untrusted code can register a malicious implementation with the thread context class loader first, then this implementation might be cached and re-used by Apache Santuario - XML Security for Java, leading to potential security flaws when validating signed documents, etc. The vulnerability affects Apache Santuario - XML Security for Java 2.0.x releases from 2.0.3 and all 2.1.x releases before 2.1.4.", "title": "Vulnerability description" }, { "category": "summary", "text": "xml-security: Apache Santuario potentially loads XML parsing code from an untrusted source", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-12400" }, { "category": "external", "summary": "RHBZ#1764658", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764658" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-12400", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12400" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-12400", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12400" } ], "release_date": "2019-08-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xml-security: Apache Santuario potentially loads XML parsing code from an untrusted source" }, { "cve": "CVE-2019-12406", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-03-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816170" } ], "notes": [ { "category": "description", "text": "Apache CXF before 3.3.4 and 3.2.11 does not restrict the number of message attachments present in a given message. This leaves open the possibility of a denial of service type attack, where a malicious user crafts a message containing a very large number of message attachments. From the 3.3.4 and 3.2.11 releases, a default limit of 50 message attachments is enforced. This is configurable via the message property \"attachment-max-count\".", "title": "Vulnerability description" }, { "category": "summary", "text": "cxf: does not restrict the number of message attachments", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-12406" }, { "category": "external", "summary": "RHBZ#1816170", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816170" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-12406", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12406" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-12406", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12406" } ], "release_date": "2019-11-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "cxf: does not restrict the number of message attachments" }, { "cve": "CVE-2019-12419", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2020-03-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816175" } ], "notes": [ { "category": "description", "text": "A flaw was found in cxf in versions prior to 3.2.11 and 3.3.4. The access token services do not properly validate that an authenticated principal is equal to that of the supplied clientId parameter allowing a malicious client to use an authorization code that has been issued to a different client as their own. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "cxf: OpenId Connect token service does not properly validate the clientId", "title": "Vulnerability summary" }, { "category": "other", "text": "In OpenShift Logging the openshift-logging/elasticsearch6-rhel8 container bundles the vulnerable version of apache-cxf, but the vulnerable class is not shipped, hence this component is not affected by this vulnerability.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-12419" }, { "category": "external", "summary": "RHBZ#1816175", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816175" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-12419", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12419" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-12419", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12419" } ], "release_date": "2019-11-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "cxf: OpenId Connect token service does not properly validate the clientId" }, { "cve": "CVE-2019-14540", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1755849" } ], "notes": [ { "category": "description", "text": "A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to com.zaxxer.hikari.HikariConfig.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nSatellite 6 does not enable polymorphic unmarshmalling, which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14540" }, { "category": "external", "summary": "RHBZ#1755849", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755849" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14540", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14540" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14540", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14540" } ], "release_date": "2019-09-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "This vulnerability relies on com.zaxxer.hikari.HikariConfig being present in the application\u0027s ClassPath. Hikari is not packaged as an RPM for Red Hat Enterprise Linux or Red Hat Software Collections. Applications using jackson-databind that do not also use com.zaxxer.hikari are not impacted by this vulnerability.\n\nA mitigation to this class of problem in jackson-databind is to not trigger polymorphic desrialization globally by using: objectMapper.enableDefaultTyping() and rather use @JsonTypeInfo on the class property to explicitly define the type information. For more information on this issue please refer to https://www.github.com/mbechler/marshalsec/blob/master/marshalsec.pdf?raw=true", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig" }, { "cve": "CVE-2019-14820", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-11-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1649870" } ], "notes": [ { "category": "description", "text": "It was found that keycloak exposes internal adapter endpoints in org.keycloak.constants.AdapterConstants, which can be invoked via a specially-crafted URL. This vulnerability could allow an attacker to access unauthorized information.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak: adapter endpoints are exposed via arbitrary URLs", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14820" }, { "category": "external", "summary": "RHBZ#1649870", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1649870" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14820", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14820" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14820", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14820" } ], "release_date": "2019-10-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "keycloak: adapter endpoints are exposed via arbitrary URLs" }, { "cve": "CVE-2019-14832", "cwe": { "id": "CWE-863", "name": "Incorrect Authorization" }, "discovery_date": "2019-07-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1749487" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Keycloak REST API where it would permit user access from a realm the user was not configured. An authenticated attacker with knowledge of a user id could use this flaw to access unauthorized information or to carry out further attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak: cross-realm user access auth bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14832" }, { "category": "external", "summary": "RHBZ#1749487", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1749487" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14832", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14832" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14832", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14832" } ], "release_date": "2019-10-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "keycloak: cross-realm user access auth bypass" }, { "acknowledgments": [ { "names": [ "F\u00e1bio Magalh\u00e3es de Andrade" ], "organization": "Sonda Ativas" }, { "names": [ "Juliano de Castro Santos", "Leonard Lunardi" ], "organization": "UnimedBH" } ], "cve": "CVE-2019-14838", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2019-08-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1751227" } ], "notes": [ { "category": "description", "text": "It was found that Wildfly users had default user permissions set incorrectly. A malicious user could use this flaw to access unauthorized controls for the application server.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14838" }, { "category": "external", "summary": "RHBZ#1751227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751227" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14838", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14838" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14838", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14838" }, { "category": "external", "summary": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14838", "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14838" } ], "release_date": "2019-10-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default" }, { "cve": "CVE-2019-14887", "cwe": { "id": "CWE-757", "name": "Selection of Less-Secure Algorithm During Negotiation (\u0027Algorithm Downgrade\u0027)" }, "discovery_date": "2019-11-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1772008" } ], "notes": [ { "category": "description", "text": "A flaw was found when an OpenSSL security provider is used with Wildfly, the \u0027enabled-protocols\u0027 value in the Wildfly configuration isn\u0027t honored. An attacker could target the traffic sent from Wildfly and downgrade the connection to a weaker version of TLS, potentially breaking the encryption. This could lead to a leak of the data being passed over the network.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly: The \u0027enabled-protocols\u0027 value in legacy security is not respected if OpenSSL security provider is in use", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14887" }, { "category": "external", "summary": "RHBZ#1772008", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772008" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14887", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14887" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14887", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14887" } ], "release_date": "2020-03-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "Avoid using an OpenSSL security provider and instead use the default configuration or regular JSSE provider with \u0027TLS\u0027.", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wildfly: The \u0027enabled-protocols\u0027 value in legacy security is not respected if OpenSSL security provider is in use" }, { "acknowledgments": [ { "names": [ "Henning Baldersheim", "H\u00e5vard Pettersen" ], "organization": "Verizon Media" } ], "cve": "CVE-2019-14888", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-10-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1772464" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the Undertow HTTP server listening on HTTPS. An attacker can target the HTTPS port to carry out a Denial Of Service (DOS) to make the service unavailable on SSL.", "title": "Vulnerability description" }, { "category": "summary", "text": "undertow: possible Denial Of Service (DOS) in Undertow HTTP server listening on HTTPS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14888" }, { "category": "external", "summary": "RHBZ#1772464", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772464" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14888", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14888" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14888", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14888" } ], "release_date": "2020-01-20T12:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "Enable HTTP2 (enable-http2=\"true\") in the undertow\u0027s HTTPS settings.", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "undertow: possible Denial Of Service (DOS) in Undertow HTTP server listening on HTTPS" }, { "cve": "CVE-2019-14892", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-09-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1758171" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in jackson-databind in versions before 2.9.10, 2.8.11.5 and 2.6.7.3, where it would permit polymorphic deserialization of a malicious object using commons-configuration 1 and 2 JNDI classes. An attacker could use this flaw to execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in classes of the commons-configuration package", "title": "Vulnerability summary" }, { "category": "other", "text": "Satellite 6 does not enable polymorphic unmarshmalling, which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14892" }, { "category": "external", "summary": "RHBZ#1758171", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758171" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14892", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14892" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14892", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14892" } ], "release_date": "2019-09-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in classes of the commons-configuration package" }, { "cve": "CVE-2019-14893", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-09-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1758182" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in FasterXML jackson-databind in all versions before 2.9.10 and 2.10.0, where it would permit polymorphic deserialization of malicious objects using the xalan JNDI gadget when used in conjunction with polymorphic type handling methods such as `enableDefaultTyping()` or when @JsonTypeInfo is using `Id.CLASS` or `Id.MINIMAL_CLASS` or in any other way which ObjectMapper.readValue might instantiate objects from unsafe sources. An attacker could use this flaw to execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in classes of the xalan package", "title": "Vulnerability summary" }, { "category": "other", "text": "Satellite 6 does not enable polymorphic unmarshmalling, which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14893" }, { "category": "external", "summary": "RHBZ#1758182", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758182" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14893", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14893" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14893", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14893" } ], "release_date": "2019-09-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in classes of the xalan package" }, { "cve": "CVE-2019-16335", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1755831" } ], "notes": [ { "category": "description", "text": "A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to com.zaxxer.hikari.HikariDataSource. This is a different vulnerability than CVE-2019-14540.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nSatellite 6 does not enable polymorphic unmarshmalling, which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-16335" }, { "category": "external", "summary": "RHBZ#1755831", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755831" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16335", "url": "https://www.cve.org/CVERecord?id=CVE-2019-16335" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16335", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16335" } ], "release_date": "2019-09-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "This vulnerability relies on com.zaxxer.hikari.HikariDataSource being present in the application\u0027s ClassPath. Hikari is not packaged as an RPM for Red Hat Enterprise Linux or Red Hat Software Collections. Applications using jackson-databind that do not also use com.zaxxer.hikari are not impacted by this vulnerability.\n\nA mitigation to this class of problem in jackson-databind is to not trigger polymorphic desrialization globally by using: objectMapper.enableDefaultTyping() and rather use @JsonTypeInfo on the class property to explicitly define the type information. For more information on this issue please refer to https://www.github.com/mbechler/marshalsec/blob/master/marshalsec.pdf?raw=true", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource" }, { "cve": "CVE-2019-16942", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-09-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1758187" } ], "notes": [ { "category": "description", "text": "A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the commons-dbcp (1.4) jar in the classpath, and an attacker can find an RMI service endpoint to access, it is possible to make the service execute a malicious payload. This issue exists because of org.apache.commons.dbcp.datasources.SharedPoolDataSource and org.apache.commons.dbcp.datasources.PerUserPoolDataSource mishandling.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.*", "title": "Vulnerability summary" }, { "category": "other", "text": "Satellite 6 does not enable polymorphic unmarshmalling, which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-16942" }, { "category": "external", "summary": "RHBZ#1758187", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758187" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16942", "url": "https://www.cve.org/CVERecord?id=CVE-2019-16942" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16942", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16942" } ], "release_date": "2019-09-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.*" }, { "cve": "CVE-2019-16943", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-09-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1758191" } ], "notes": [ { "category": "description", "text": "A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the p6spy (3.8.6) jar in the classpath, and an attacker can find an RMI service endpoint to access, it is possible to make the service execute a malicious payload. This issue exists because of com.p6spy.engine.spy.P6DataSource mishandling.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource", "title": "Vulnerability summary" }, { "category": "other", "text": "Satellite 6 does not enable polymorphic unmarshmalling, which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-16943" }, { "category": "external", "summary": "RHBZ#1758191", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758191" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16943", "url": "https://www.cve.org/CVERecord?id=CVE-2019-16943" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16943", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16943" } ], "release_date": "2019-09-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource" }, { "cve": "CVE-2019-17267", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-09-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1758167" } ], "notes": [ { "category": "description", "text": "A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to net.sf.ehcache.hibernate.EhcacheJtaTransactionManagerLookup.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in classes of the ehcache package", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nRed Hat OpenShift Container Platform does ship the vulnerable component, but does not enable the unsafe conditions needed to exploit, lowering their vulnerability impact.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-17267" }, { "category": "external", "summary": "RHBZ#1758167", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758167" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-17267", "url": "https://www.cve.org/CVERecord?id=CVE-2019-17267" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-17267", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17267" } ], "release_date": "2019-09-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in classes of the ehcache package" }, { "cve": "CVE-2019-17531", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2019-11-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1775293" } ], "notes": [ { "category": "description", "text": "A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the apache-log4j-extra (version 1.2.x) jar in the classpath, and an attacker can provide a JNDI service to access, it is possible to make the service execute a malicious payload.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.*", "title": "Vulnerability summary" }, { "category": "other", "text": "Satellite 6 does not enable polymorphic unmarshmalling, which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenShift Container Platform does ship the vulnerable component, but does not enable the unsafe conditions needed to exploit, lowering their vulnerability impact.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-17531" }, { "category": "external", "summary": "RHBZ#1775293", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775293" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-17531", "url": "https://www.cve.org/CVERecord?id=CVE-2019-17531" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-17531", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17531" } ], "release_date": "2019-10-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.*" }, { "cve": "CVE-2019-20330", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-01-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1793154" } ], "notes": [ { "category": "description", "text": "FasterXML jackson-databind 2.x before 2.9.10.2 lacks certain net.sf.ehcache blocking.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: lacks certain net.sf.ehcache blocking", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20330" }, { "category": "external", "summary": "RHBZ#1793154", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793154" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20330", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20330" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20330", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20330" } ], "release_date": "2020-01-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: lacks certain net.sf.ehcache blocking" }, { "acknowledgments": [ { "names": [ "Darran Lofthouse" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2020-1729", "cwe": { "id": "CWE-863", "name": "Incorrect Authorization" }, "discovery_date": "2019-09-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1802444" } ], "notes": [ { "category": "description", "text": "A flaw was found in SmallRye\u0027s API through version 1.6.1. The API can allow other code running within the application server to potentially obtain the ClassLoader, bypassing any permissions checks that should have been applied. The largest threat from this vulnerability is a threat to data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "SmallRye: SecuritySupport class is incorrectly public and contains a static method to access the current threads context class loader", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-1729" }, { "category": "external", "summary": "RHBZ#1802444", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802444" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-1729", "url": "https://www.cve.org/CVERecord?id=CVE-2020-1729" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1729", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1729" } ], "release_date": "2020-02-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "SmallRye: SecuritySupport class is incorrectly public and contains a static method to access the current threads context class loader" }, { "cve": "CVE-2020-7238", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1796225" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty, where it mishandles Transfer-Encoding whitespace. This flaw allows HTTP Request Smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that the previous vulnerability, CVE-2019-16869, does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit both these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships vulnerable netty version embedded in Candlepin, however, is not directly vulnerable since HTTP requests are handled by Tomcat and not netty.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-7238" }, { "category": "external", "summary": "RHBZ#1796225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796225" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-7238", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7238" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7238", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7238" }, { "category": "external", "summary": "https://netty.io/news/2019/12/18/4-1-44-Final.html", "url": "https://netty.io/news/2019/12/18/4-1-44-Final.html" } ], "release_date": "2020-01-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling" }, { "cve": "CVE-2020-8840", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816330" } ], "notes": [ { "category": "description", "text": "A flaw was found in FasterXML jackson-databind in versions 2.0.0 through 2.9.10.2. A \"gadget\" exploit is possible due to a lack of a Java object being blocking from being deserialized. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Lacks certain xbean-reflect/JNDI blocking", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8840" }, { "category": "external", "summary": "RHBZ#1816330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816330" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8840", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8840" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8840", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8840" } ], "release_date": "2020-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: Lacks certain xbean-reflect/JNDI blocking" }, { "cve": "CVE-2020-9546", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816332" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in shaded-hikari-config", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9546" }, { "category": "external", "summary": "RHBZ#1816332", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816332" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9546", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9546" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9546", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9546" } ], "release_date": "2020-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: Serialization gadgets in shaded-hikari-config" }, { "cve": "CVE-2020-9547", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816337" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in ibatis-sqlmap", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9547" }, { "category": "external", "summary": "RHBZ#1816337", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816337" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9547", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9547" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9547", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9547" } ], "release_date": "2020-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: Serialization gadgets in ibatis-sqlmap" }, { "cve": "CVE-2020-9548", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816340" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in anteros-core", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9548" }, { "category": "external", "summary": "RHBZ#1816340", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816340" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9548", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9548" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9548", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9548" } ], "release_date": "2020-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: Serialization gadgets in anteros-core" }, { "cve": "CVE-2020-10672", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2020-03-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1815495" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10672" }, { "category": "external", "summary": "RHBZ#1815495", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1815495" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10672", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10672" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10672", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10672" } ], "release_date": "2020-03-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution" }, { "cve": "CVE-2020-10673", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2020-03-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1815470" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time. Additionally, the gadget is not available within Red Hat Openstack Platform\u0027s OpenDaylight.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10673" }, { "category": "external", "summary": "RHBZ#1815470", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1815470" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10673", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10673" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10673", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10673" } ], "release_date": "2020-03-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution" }, { "cve": "CVE-2020-10968", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1819208" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x prior to version 2.9.10.4. The interaction between serialization gadgets and typing is mishandled in the bus-proxy. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10968" }, { "category": "external", "summary": "RHBZ#1819208", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819208" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10968", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10968" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10968", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10968" } ], "release_date": "2020-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider" }, { "cve": "CVE-2020-10969", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1819212" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in javax.swing.JEditorPane", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10969" }, { "category": "external", "summary": "RHBZ#1819212", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819212" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10969", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10969" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10969", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10969" } ], "release_date": "2020-03-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: Serialization gadgets in javax.swing.JEditorPane" }, { "cve": "CVE-2020-11111", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2020-03-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1821304" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.apache.activemq.jms.pool.XaPooledConnectionFactory", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11111" }, { "category": "external", "summary": "RHBZ#1821304", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821304" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11111", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11111" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11111", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11111" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/2664", "url": "https://github.com/FasterXML/jackson-databind/issues/2664" } ], "release_date": "2020-03-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: Serialization gadgets in org.apache.activemq.jms.pool.XaPooledConnectionFactory" }, { "cve": "CVE-2020-11112", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2020-03-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1821311" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.apache.commons.proxy.provider.remoting.RmiProvider", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11112" }, { "category": "external", "summary": "RHBZ#1821311", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821311" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11112", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11112" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11112", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11112" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/2666", "url": "https://github.com/FasterXML/jackson-databind/issues/2666" } ], "release_date": "2020-03-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: Serialization gadgets in org.apache.commons.proxy.provider.remoting.RmiProvider" }, { "cve": "CVE-2020-11113", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2020-03-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1821315" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11113" }, { "category": "external", "summary": "RHBZ#1821315", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821315" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11113", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11113" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11113", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11113" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/2670", "url": "https://github.com/FasterXML/jackson-databind/issues/2670" } ], "release_date": "2020-03-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime" }, { "cve": "CVE-2020-11619", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-04-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1826805" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.springframework:spring-aop", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11619" }, { "category": "external", "summary": "RHBZ#1826805", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1826805" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11619", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11619" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11619", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11619" } ], "release_date": "2020-04-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: Serialization gadgets in org.springframework:spring-aop" }, { "cve": "CVE-2020-11620", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-04-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1826798" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in commons-jelly:commons-jelly", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11620" }, { "category": "external", "summary": "RHBZ#1826798", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1826798" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11620", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11620" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11620", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11620" } ], "release_date": "2020-04-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: Serialization gadgets in commons-jelly:commons-jelly" } ] }
rhsa-2019_2861
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for gRPC, included in sriov-network-device-plugin-container, is now available for Red Hat OpenShift Container Platform 4.1.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains updates gRPC in the sriov-network-device-plugin container in Red Hat OpenShift Container Platform 4.1.18.\n\nSecurity Fix(es):\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:2861", "url": "https://access.redhat.com/errata/RHSA-2019:2861" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2861.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 4.1.18 gRPC security update", "tracking": { "current_release_date": "2024-11-13T22:09:05+00:00", "generator": { "date": "2024-11-13T22:09:05+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2019:2861", "initial_release_date": "2019-09-26T17:19:31+00:00", "revision_history": [ { "date": "2019-09-26T17:19:31+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-09-26T17:19:31+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-13T22:09:05+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.1", "product": { "name": "Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.1::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "openshift4/ose-sriov-network-device-plugin@sha256:4493f9c75d46ecfcee81bbb0ca9c2579bac4ffb150b2255f8385eac50a885ca6_amd64", "product": { "name": "openshift4/ose-sriov-network-device-plugin@sha256:4493f9c75d46ecfcee81bbb0ca9c2579bac4ffb150b2255f8385eac50a885ca6_amd64", "product_id": "openshift4/ose-sriov-network-device-plugin@sha256:4493f9c75d46ecfcee81bbb0ca9c2579bac4ffb150b2255f8385eac50a885ca6_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-device-plugin@sha256:4493f9c75d46ecfcee81bbb0ca9c2579bac4ffb150b2255f8385eac50a885ca6?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-device-plugin\u0026tag=v4.1.18-201909201915" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-device-plugin@sha256:4493f9c75d46ecfcee81bbb0ca9c2579bac4ffb150b2255f8385eac50a885ca6_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-network-device-plugin@sha256:4493f9c75d46ecfcee81bbb0ca9c2579bac4ffb150b2255f8385eac50a885ca6_amd64" }, "product_reference": "openshift4/ose-sriov-network-device-plugin@sha256:4493f9c75d46ecfcee81bbb0ca9c2579bac4ffb150b2255f8385eac50a885ca6_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-network-device-plugin@sha256:4493f9c75d46ecfcee81bbb0ca9c2579bac4ffb150b2255f8385eac50a885ca6_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-26T17:19:31+00:00", "details": "For OpenShift Container Platform 4.1 see the following documentation, which\nwill be updated shortly for release 4.1.18, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-release-notes.html", "product_ids": [ "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-network-device-plugin@sha256:4493f9c75d46ecfcee81bbb0ca9c2579bac4ffb150b2255f8385eac50a885ca6_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2861" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-network-device-plugin@sha256:4493f9c75d46ecfcee81bbb0ca9c2579bac4ffb150b2255f8385eac50a885ca6_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-network-device-plugin@sha256:4493f9c75d46ecfcee81bbb0ca9c2579bac4ffb150b2255f8385eac50a885ca6_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-26T17:19:31+00:00", "details": "For OpenShift Container Platform 4.1 see the following documentation, which\nwill be updated shortly for release 4.1.18, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-release-notes.html", "product_ids": [ "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-network-device-plugin@sha256:4493f9c75d46ecfcee81bbb0ca9c2579bac4ffb150b2255f8385eac50a885ca6_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2861" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-network-device-plugin@sha256:4493f9c75d46ecfcee81bbb0ca9c2579bac4ffb150b2255f8385eac50a885ca6_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-network-device-plugin@sha256:4493f9c75d46ecfcee81bbb0ca9c2579bac4ffb150b2255f8385eac50a885ca6_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-26T17:19:31+00:00", "details": "For OpenShift Container Platform 4.1 see the following documentation, which\nwill be updated shortly for release 4.1.18, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-release-notes.html", "product_ids": [ "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-network-device-plugin@sha256:4493f9c75d46ecfcee81bbb0ca9c2579bac4ffb150b2255f8385eac50a885ca6_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2861" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-network-device-plugin@sha256:4493f9c75d46ecfcee81bbb0ca9c2579bac4ffb150b2255f8385eac50a885ca6_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" } ] }
rhsa-2019:2817
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for cri-o is now available for Red Hat OpenShift Container Platform 3.11.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nSecurity Fix(es):\n\n* containers/image: not enforcing TLS when sending username+password credentials to token servers leading to credential disclosure (CVE-2019-10214)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAll OpenShift Container Platform 3.11 users are advised to upgrade to these\nupdated packages and images.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:2817", "url": "https://access.redhat.com/errata/RHSA-2019:2817" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1732508", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1732508" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2817.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 3.11 security update", "tracking": { "current_release_date": "2025-03-15T19:44:16+00:00", "generator": { "date": "2025-03-15T19:44:16+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.1" } }, "id": "RHSA-2019:2817", "initial_release_date": "2019-09-23T20:37:17+00:00", "revision_history": [ { "date": "2019-09-23T20:37:17+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-09-23T20:37:17+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-03-15T19:44:16+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 3.11", "product": { "name": "Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:3.11::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "product": { "name": "cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "product_id": "cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "product": { "name": "cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "product_id": "cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64", "product": { "name": "cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64", "product_id": "cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64", "product": { "name": "cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64", "product_id": "cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.src", "product": { "name": "cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.src", "product_id": "cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le" }, "product_reference": "cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.src" }, "product_reference": "cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64" }, "product_reference": "cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le" }, "product_reference": "cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64" }, "product_reference": "cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.src", "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-23T20:37:17+00:00", "details": "See the following documentation, which will be updated shortly for release\n3.11.146, for important instructions on how to upgrade your cluster and fully\napply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_release_notes.html", "product_ids": [ "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.src", "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2817" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.src", "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.src", "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-23T20:37:17+00:00", "details": "See the following documentation, which will be updated shortly for release\n3.11.146, for important instructions on how to upgrade your cluster and fully\napply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_release_notes.html", "product_ids": [ "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.src", "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2817" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.src", "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "Miloslav Trma\u010d" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2019-10214", "cwe": { "id": "CWE-522", "name": "Insufficiently Protected Credentials" }, "discovery_date": "2019-07-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1732508" } ], "notes": [ { "category": "description", "text": "The containers/image library used by the container tools Podman, Buildah, and Skopeo in Red Hat Enterprise Linux version 8 and CRI-O in OpenShift Container Platform, does not enforce TLS connections to the container registry authorization service. An attacker could use this vulnerability to launch a MiTM attack and steal login credentials or bearer tokens.", "title": "Vulnerability description" }, { "category": "summary", "text": "containers/image: not enforcing TLS when sending username+password credentials to token servers leading to credential disclosure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.src", "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10214" }, { "category": "external", "summary": "RHBZ#1732508", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1732508" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10214", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10214" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10214", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10214" } ], "release_date": "2019-09-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-23T20:37:17+00:00", "details": "See the following documentation, which will be updated shortly for release\n3.11.146, for important instructions on how to upgrade your cluster and fully\napply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_release_notes.html", "product_ids": [ "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.src", "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2817" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.src", "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "containers/image: not enforcing TLS when sending username+password credentials to token servers leading to credential disclosure" } ] }
RHBA-2019:3139
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Container Platform release 3.11.153 is now available with\nupdates to packages and images that fix several bugs and add enhancements.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the RPM packages for Red Hat OpenShift Container\nPlatform 3.11.153. See the following advisory for the container images for\nthis release:\n\nhttps://access.redhat.com/errata/RHBA-2019:3138\n\nThis release fixes the following bugs:\n\n* NSX role templates referenced module output based on previous data structure. Templates were not properly populated. With this bug fix, the templates were updated to use the updated data structure and the templates are now generated with clusterIP as expected. (BZ#1753890)\n\nAll OpenShift Container Platform 3.11 users are advised to upgrade to these\nupdated packages and images.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHBA-2019:3139", "url": "https://access.redhat.com/errata/RHBA-2019:3139" }, { "category": "external", "summary": "1645725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1645725" }, { "category": "external", "summary": "1651583", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1651583" }, { "category": "external", "summary": "1678100", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1678100" }, { "category": "external", "summary": "1720174", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1720174" }, { "category": "external", "summary": "1723924", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1723924" }, { "category": "external", "summary": "1734385", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1734385" }, { "category": "external", "summary": "1741679", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741679" }, { "category": "external", "summary": "1747305", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1747305" }, { "category": "external", "summary": "1751125", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751125" }, { "category": "external", "summary": "1751975", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751975" }, { "category": "external", "summary": "1752532", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752532" }, { "category": "external", "summary": "1753890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753890" }, { "category": "external", "summary": "1754788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1754788" }, { "category": "external", "summary": "1754968", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1754968" }, { "category": "external", "summary": "1758156", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758156" }, { "category": "external", "summary": "1758235", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758235" }, { "category": "external", "summary": "1758267", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758267" }, { "category": "external", "summary": "1759344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759344" }, { "category": "external", "summary": "1759837", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759837" }, { "category": "external", "summary": "1760166", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760166" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhba-2019_3139.json" } ], "title": "Red Hat Bug Fix Advisory: OpenShift Container Platform 3.11 bug fix and enhancement update", "tracking": { "current_release_date": "2025-03-15T19:44:23+00:00", "generator": { "date": "2025-03-15T19:44:23+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.1" } }, "id": "RHBA-2019:3139", "initial_release_date": "2019-10-18T02:02:14+00:00", "revision_history": [ { "date": "2019-10-18T02:02:14+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-10-18T02:02:14+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-03-15T19:44:23+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 3.11", "product": { "name": "Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:3.11::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "apb-0:1.9.8-1.el7.ppc64le", "product": { "name": "apb-0:1.9.8-1.el7.ppc64le", "product_id": "apb-0:1.9.8-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le", "product": { "name": "cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le", "product_id": "cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le", "product": { "name": "cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le", "product_id": "cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.ppc64le", "product": { "name": "openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.ppc64le", "product_id": "openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.ppc64le", "product": { "name": "atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.ppc64le", "product_id": "atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.ppc64le", "product": { "name": "atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.ppc64le", "product_id": "atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog-svcat@3.11.153-1.git.1.e227636.el7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product": { "name": "atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product_id": "atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product": { "name": "atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product_id": "atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product": { "name": "atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product_id": "atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product": { "name": "atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product_id": "atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product": { "name": "atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product_id": "atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product": { "name": "atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product_id": "atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product": { "name": "atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product_id": "atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product": { "name": "atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product_id": "atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product": { "name": "atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product_id": "atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-template-service-broker@3.11.153-1.git.0.aaf3f71.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product": { "name": "atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product_id": "atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.ppc64le", "product": { "name": "atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.ppc64le", "product_id": "atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.ppc64le", "product": { "name": "atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.ppc64le", "product_id": "atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.ppc64le", "product": { "name": "atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.ppc64le", "product_id": "atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.ppc64le", "product": { "name": "atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.ppc64le", "product_id": "atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.ppc64le", "product": { "name": "atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.ppc64le", "product_id": "atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-node-problem-detector@3.11.153-1.git.1.7fbf681.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.ppc64le", "product": { "name": "atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.ppc64le", "product_id": "atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.ppc64le", "product": { "name": "atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.ppc64le", "product_id": "atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.ppc64le", "product": { "name": "golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.ppc64le", "product_id": "golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.ppc64le", "product": { "name": "prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.ppc64le", "product_id": "prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.ppc64le", "product": { "name": "prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.ppc64le", "product_id": "prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "prometheus-0:3.11.153-1.git.1.7a486a2.el7.ppc64le", "product": { "name": "prometheus-0:3.11.153-1.git.1.7a486a2.el7.ppc64le", "product_id": "prometheus-0:3.11.153-1.git.1.7a486a2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.ppc64le", "product": { "name": "openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.ppc64le", "product_id": "openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.ppc64le", "product": { "name": "openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.ppc64le", "product_id": "openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-enterprise-cluster-capacity@3.11.153-1.git.1.5f83714.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "apb-0:1.9.8-1.el7.x86_64", "product": { "name": "apb-0:1.9.8-1.el7.x86_64", "product_id": "apb-0:1.9.8-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64", "product": { "name": "cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64", "product_id": "cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64", "product": { "name": "cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64", "product_id": "cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.x86_64", "product": { "name": "openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.x86_64", "product_id": "openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.x86_64", "product": { "name": "atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.x86_64", "product_id": "atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.x86_64", "product": { "name": "atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.x86_64", "product_id": "atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog-svcat@3.11.153-1.git.1.e227636.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product": { "name": "atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_id": "atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product": { "name": "atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_id": "atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-clients-redistributable-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product": { "name": "atomic-openshift-clients-redistributable-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_id": "atomic-openshift-clients-redistributable-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-clients-redistributable@3.11.153-1.git.0.aaf3f71.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product": { "name": "atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_id": "atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product": { "name": "atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_id": "atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product": { "name": "atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_id": "atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product": { "name": "atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_id": "atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product": { "name": "atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_id": "atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product": { "name": "atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_id": "atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product": { "name": "atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_id": "atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-template-service-broker@3.11.153-1.git.0.aaf3f71.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product": { "name": "atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_id": "atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.x86_64", "product": { "name": "atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.x86_64", "product_id": "atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.x86_64", "product": { "name": "atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.x86_64", "product_id": "atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.x86_64", "product": { "name": "atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.x86_64", "product_id": "atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.x86_64", "product": { "name": "atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.x86_64", "product_id": "atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.x86_64", "product": { "name": "atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.x86_64", "product_id": "atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-node-problem-detector@3.11.153-1.git.1.7fbf681.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.x86_64", "product": { "name": "atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.x86_64", "product_id": "atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.x86_64", "product": { "name": "atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.x86_64", "product_id": "atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.x86_64", "product": { "name": "golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.x86_64", "product_id": "golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.x86_64", "product": { "name": "prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.x86_64", "product_id": "prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.x86_64", "product": { "name": "prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.x86_64", "product_id": "prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "prometheus-0:3.11.153-1.git.1.7a486a2.el7.x86_64", "product": { "name": "prometheus-0:3.11.153-1.git.1.7a486a2.el7.x86_64", "product_id": "prometheus-0:3.11.153-1.git.1.7a486a2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.x86_64", "product": { "name": "openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.x86_64", "product_id": "openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.x86_64", "product": { "name": "openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.x86_64", "product_id": "openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-enterprise-cluster-capacity@3.11.153-1.git.1.5f83714.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "apb-0:1.9.8-1.el7.src", "product": { "name": "apb-0:1.9.8-1.el7.src", "product_id": "apb-0:1.9.8-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.src", "product": { "name": "cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.src", "product_id": "cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "jenkins-2-plugins-0:3.11.1568994366-1.el7.src", "product": { "name": "jenkins-2-plugins-0:3.11.1568994366-1.el7.src", "product_id": "jenkins-2-plugins-0:3.11.1568994366-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "jenkins-0:2.176.3.1569349414-1.el7.src", "product": { "name": "jenkins-0:2.176.3.1569349414-1.el7.src", "product_id": "jenkins-0:2.176.3.1569349414-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.src", "product": { "name": "openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.src", "product_id": "openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "mediawiki-0:1.27.7-1.el7.src", "product": { "name": "mediawiki-0:1.27.7-1.el7.src", "product_id": "mediawiki-0:1.27.7-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.src", "product": { "name": "atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.src", "product_id": "atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.src", "product": { "name": "atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.src", "product_id": "atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.src", "product": { "name": "atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.src", "product_id": "atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.src", "product": { "name": "atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.src", "product_id": "atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.src", "product": { "name": "atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.src", "product_id": "atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.src", "product": { "name": "atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.src", "product_id": "atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.src", "product": { "name": "atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.src", "product_id": "atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-node-problem-detector@3.11.153-1.git.1.7fbf681.el7?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.src", "product": { "name": "atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.src", "product_id": "atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.src", "product": { "name": "atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.src", "product_id": "atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.src", "product": { "name": "golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.src", "product_id": "golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "golang-github-prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.src", "product": { "name": "golang-github-prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.src", "product_id": "golang-github-prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-prometheus-alertmanager@3.11.153-1.git.1.2768abd.el7?arch=src" } } }, { "category": "product_version", "name": "golang-github-prometheus-node_exporter-0:3.11.153-1.git.1.0e8ef36.el7.src", "product": { "name": "golang-github-prometheus-node_exporter-0:3.11.153-1.git.1.0e8ef36.el7.src", "product_id": "golang-github-prometheus-node_exporter-0:3.11.153-1.git.1.0e8ef36.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-prometheus-node_exporter@3.11.153-1.git.1.0e8ef36.el7?arch=src" } } }, { "category": "product_version", "name": "golang-github-prometheus-prometheus-0:3.11.153-1.git.1.7a486a2.el7.src", "product": { "name": "golang-github-prometheus-prometheus-0:3.11.153-1.git.1.7a486a2.el7.src", "product_id": "golang-github-prometheus-prometheus-0:3.11.153-1.git.1.7a486a2.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.src", "product": { "name": "openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.src", "product_id": "openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.src", "product": { "name": "openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.src", "product_id": "openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-enterprise-cluster-capacity@3.11.153-1.git.1.5f83714.el7?arch=src" } } }, { "category": "product_version", "name": "openshift-kuryr-0:3.11.153-1.git.1.073ef06.el7.src", "product": { "name": "openshift-kuryr-0:3.11.153-1.git.1.073ef06.el7.src", "product_id": "openshift-kuryr-0:3.11.153-1.git.1.073ef06.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.src", "product": { "name": "openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.src", "product_id": "openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "apb-container-scripts-0:1.9.8-1.el7.noarch", "product": { "name": "apb-container-scripts-0:1.9.8-1.el7.noarch", "product_id": "apb-container-scripts-0:1.9.8-1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } }, { "category": "product_version", "name": "apb-devel-0:1.9.8-1.el7.noarch", "product": { "name": "apb-devel-0:1.9.8-1.el7.noarch", "product_id": "apb-devel-0:1.9.8-1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } }, { "category": "product_version", "name": "jenkins-2-plugins-0:3.11.1568994366-1.el7.noarch", "product": { "name": "jenkins-2-plugins-0:3.11.1568994366-1.el7.noarch", "product_id": "jenkins-2-plugins-0:3.11.1568994366-1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } }, { "category": "product_version", "name": "jenkins-0:2.176.3.1569349414-1.el7.noarch", "product": { "name": "jenkins-0:2.176.3.1569349414-1.el7.noarch", "product_id": "jenkins-0:2.176.3.1569349414-1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } }, { "category": "product_version", "name": "mediawiki-0:1.27.7-1.el7.noarch", "product": { "name": "mediawiki-0:1.27.7-1.el7.noarch", "product_id": "mediawiki-0:1.27.7-1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } }, { "category": "product_version", "name": "mediawiki-doc-0:1.27.7-1.el7.noarch", "product": { "name": "mediawiki-doc-0:1.27.7-1.el7.noarch", "product_id": "mediawiki-doc-0:1.27.7-1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } }, { "category": "product_version", "name": "atomic-openshift-docker-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch", "product": { "name": "atomic-openshift-docker-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch", "product_id": "atomic-openshift-docker-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } }, { "category": "product_version", "name": "atomic-openshift-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch", "product": { "name": "atomic-openshift-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch", "product_id": "atomic-openshift-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } }, { "category": "product_version", "name": "openshift-kuryr-cni-0:3.11.153-1.git.1.073ef06.el7.noarch", "product": { "name": "openshift-kuryr-cni-0:3.11.153-1.git.1.073ef06.el7.noarch", "product_id": "openshift-kuryr-cni-0:3.11.153-1.git.1.073ef06.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } }, { "category": "product_version", "name": "openshift-kuryr-common-0:3.11.153-1.git.1.073ef06.el7.noarch", "product": { "name": "openshift-kuryr-common-0:3.11.153-1.git.1.073ef06.el7.noarch", "product_id": "openshift-kuryr-common-0:3.11.153-1.git.1.073ef06.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } }, { "category": "product_version", "name": "openshift-kuryr-controller-0:3.11.153-1.git.1.073ef06.el7.noarch", "product": { "name": "openshift-kuryr-controller-0:3.11.153-1.git.1.073ef06.el7.noarch", "product_id": "openshift-kuryr-controller-0:3.11.153-1.git.1.073ef06.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } }, { "category": "product_version", "name": "python2-kuryr-kubernetes-0:3.11.153-1.git.1.073ef06.el7.noarch", "product": { "name": "python2-kuryr-kubernetes-0:3.11.153-1.git.1.073ef06.el7.noarch", "product_id": "python2-kuryr-kubernetes-0:3.11.153-1.git.1.073ef06.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } }, { "category": "product_version", "name": "openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.noarch", "product": { "name": "openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.noarch", "product_id": "openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } }, { "category": "product_version", "name": "openshift-ansible-docs-0:3.11.153-2.git.0.ee699b5.el7.noarch", "product": { "name": "openshift-ansible-docs-0:3.11.153-2.git.0.ee699b5.el7.noarch", "product_id": "openshift-ansible-docs-0:3.11.153-2.git.0.ee699b5.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } }, { "category": "product_version", "name": "openshift-ansible-playbooks-0:3.11.153-2.git.0.ee699b5.el7.noarch", "product": { "name": "openshift-ansible-playbooks-0:3.11.153-2.git.0.ee699b5.el7.noarch", "product_id": "openshift-ansible-playbooks-0:3.11.153-2.git.0.ee699b5.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } }, { "category": "product_version", "name": "openshift-ansible-roles-0:3.11.153-2.git.0.ee699b5.el7.noarch", "product": { "name": "openshift-ansible-roles-0:3.11.153-2.git.0.ee699b5.el7.noarch", "product_id": "openshift-ansible-roles-0:3.11.153-2.git.0.ee699b5.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } }, { "category": "product_version", "name": "openshift-ansible-test-0:3.11.153-2.git.0.ee699b5.el7.noarch", "product": { "name": "openshift-ansible-test-0:3.11.153-2.git.0.ee699b5.el7.noarch", "product_id": "openshift-ansible-test-0:3.11.153-2.git.0.ee699b5.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "apb-0:1.9.8-1.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.ppc64le" }, "product_reference": "apb-0:1.9.8-1.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "apb-0:1.9.8-1.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.src" }, "product_reference": "apb-0:1.9.8-1.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "apb-0:1.9.8-1.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.x86_64" }, "product_reference": "apb-0:1.9.8-1.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "apb-container-scripts-0:1.9.8-1.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:apb-container-scripts-0:1.9.8-1.el7.noarch" }, "product_reference": "apb-container-scripts-0:1.9.8-1.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "apb-devel-0:1.9.8-1.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:apb-devel-0:1.9.8-1.el7.noarch" }, "product_reference": "apb-devel-0:1.9.8-1.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.ppc64le" }, "product_reference": "atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.src" }, "product_reference": "atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.x86_64" }, "product_reference": "atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.ppc64le" }, "product_reference": "atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.x86_64" }, "product_reference": "atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le" }, "product_reference": "atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.src" }, "product_reference": "atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64" }, "product_reference": "atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le" }, "product_reference": "atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.x86_64" }, "product_reference": "atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-clients-redistributable-0:3.11.153-1.git.0.aaf3f71.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-redistributable-0:3.11.153-1.git.0.aaf3f71.el7.x86_64" }, "product_reference": "atomic-openshift-clients-redistributable-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.ppc64le" }, "product_reference": "atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.src" }, "product_reference": "atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.x86_64" }, "product_reference": "atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.ppc64le" }, "product_reference": "atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.src" }, "product_reference": "atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.x86_64" }, "product_reference": "atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-docker-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-docker-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch" }, "product_reference": "atomic-openshift-docker-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.ppc64le" }, "product_reference": "atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.src" }, "product_reference": "atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.x86_64" }, "product_reference": "atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch" }, "product_reference": "atomic-openshift-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le" }, "product_reference": "atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.x86_64" }, "product_reference": "atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le" }, "product_reference": "atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64" }, "product_reference": "atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le" }, "product_reference": "atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.x86_64" }, "product_reference": "atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.ppc64le" }, "product_reference": "atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.src" }, "product_reference": "atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.x86_64" }, "product_reference": "atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le" }, "product_reference": "atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.x86_64" }, "product_reference": "atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.ppc64le" }, "product_reference": "atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.src" }, "product_reference": "atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.x86_64" }, "product_reference": "atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le" }, "product_reference": "atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.x86_64" }, "product_reference": "atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le" }, "product_reference": "atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.x86_64" }, "product_reference": "atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.ppc64le" }, "product_reference": "atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.src" }, "product_reference": "atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.x86_64" }, "product_reference": "atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le" }, "product_reference": "atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.x86_64" }, "product_reference": "atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le" }, "product_reference": "atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.x86_64" }, "product_reference": "atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.ppc64le" }, "product_reference": "atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.src" }, "product_reference": "atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.x86_64" }, "product_reference": "atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le" }, "product_reference": "cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.src" }, "product_reference": "cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64" }, "product_reference": "cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le" }, "product_reference": "cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64" }, "product_reference": "cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.ppc64le" }, "product_reference": "golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.src" }, "product_reference": "golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.x86_64" }, "product_reference": "golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.src" }, "product_reference": "golang-github-prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-node_exporter-0:3.11.153-1.git.1.0e8ef36.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.153-1.git.1.0e8ef36.el7.src" }, "product_reference": "golang-github-prometheus-node_exporter-0:3.11.153-1.git.1.0e8ef36.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-prometheus-0:3.11.153-1.git.1.7a486a2.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.153-1.git.1.7a486a2.el7.src" }, "product_reference": "golang-github-prometheus-prometheus-0:3.11.153-1.git.1.7a486a2.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "jenkins-0:2.176.3.1569349414-1.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:jenkins-0:2.176.3.1569349414-1.el7.noarch" }, "product_reference": "jenkins-0:2.176.3.1569349414-1.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "jenkins-0:2.176.3.1569349414-1.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:jenkins-0:2.176.3.1569349414-1.el7.src" }, "product_reference": "jenkins-0:2.176.3.1569349414-1.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "jenkins-2-plugins-0:3.11.1568994366-1.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1568994366-1.el7.noarch" }, "product_reference": "jenkins-2-plugins-0:3.11.1568994366-1.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "jenkins-2-plugins-0:3.11.1568994366-1.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1568994366-1.el7.src" }, "product_reference": "jenkins-2-plugins-0:3.11.1568994366-1.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "mediawiki-0:1.27.7-1.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.noarch" }, "product_reference": "mediawiki-0:1.27.7-1.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "mediawiki-0:1.27.7-1.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.src" }, "product_reference": "mediawiki-0:1.27.7-1.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "mediawiki-doc-0:1.27.7-1.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:mediawiki-doc-0:1.27.7-1.el7.noarch" }, "product_reference": "mediawiki-doc-0:1.27.7-1.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.noarch" }, "product_reference": "openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.src" }, "product_reference": "openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-docs-0:3.11.153-2.git.0.ee699b5.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-ansible-docs-0:3.11.153-2.git.0.ee699b5.el7.noarch" }, "product_reference": "openshift-ansible-docs-0:3.11.153-2.git.0.ee699b5.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-playbooks-0:3.11.153-2.git.0.ee699b5.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-ansible-playbooks-0:3.11.153-2.git.0.ee699b5.el7.noarch" }, "product_reference": "openshift-ansible-playbooks-0:3.11.153-2.git.0.ee699b5.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-roles-0:3.11.153-2.git.0.ee699b5.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-ansible-roles-0:3.11.153-2.git.0.ee699b5.el7.noarch" }, "product_reference": "openshift-ansible-roles-0:3.11.153-2.git.0.ee699b5.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-test-0:3.11.153-2.git.0.ee699b5.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-ansible-test-0:3.11.153-2.git.0.ee699b5.el7.noarch" }, "product_reference": "openshift-ansible-test-0:3.11.153-2.git.0.ee699b5.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.ppc64le" }, "product_reference": "openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.src" }, "product_reference": "openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.x86_64" }, "product_reference": "openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.ppc64le" }, "product_reference": "openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.src" }, "product_reference": "openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.x86_64" }, "product_reference": "openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-0:3.11.153-1.git.1.073ef06.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-kuryr-0:3.11.153-1.git.1.073ef06.el7.src" }, "product_reference": "openshift-kuryr-0:3.11.153-1.git.1.073ef06.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-cni-0:3.11.153-1.git.1.073ef06.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-kuryr-cni-0:3.11.153-1.git.1.073ef06.el7.noarch" }, "product_reference": "openshift-kuryr-cni-0:3.11.153-1.git.1.073ef06.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-common-0:3.11.153-1.git.1.073ef06.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-kuryr-common-0:3.11.153-1.git.1.073ef06.el7.noarch" }, "product_reference": "openshift-kuryr-common-0:3.11.153-1.git.1.073ef06.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-controller-0:3.11.153-1.git.1.073ef06.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-kuryr-controller-0:3.11.153-1.git.1.073ef06.el7.noarch" }, "product_reference": "openshift-kuryr-controller-0:3.11.153-1.git.1.073ef06.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.ppc64le" }, "product_reference": "openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.src" }, "product_reference": "openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.x86_64" }, "product_reference": "openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-0:3.11.153-1.git.1.7a486a2.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.153-1.git.1.7a486a2.el7.ppc64le" }, "product_reference": "prometheus-0:3.11.153-1.git.1.7a486a2.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-0:3.11.153-1.git.1.7a486a2.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.153-1.git.1.7a486a2.el7.x86_64" }, "product_reference": "prometheus-0:3.11.153-1.git.1.7a486a2.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.ppc64le" }, "product_reference": "prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.x86_64" }, "product_reference": "prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.ppc64le" }, "product_reference": "prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.x86_64" }, "product_reference": "prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "python2-kuryr-kubernetes-0:3.11.153-1.git.1.073ef06.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:python2-kuryr-kubernetes-0:3.11.153-1.git.1.073ef06.el7.noarch" }, "product_reference": "python2-kuryr-kubernetes-0:3.11.153-1.git.1.073ef06.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.153-1.git.1.0e8ef36.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.153-1.git.1.7a486a2.el7.src", "7Server-RH7-RHOSE-3.11:jenkins-0:2.176.3.1569349414-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-0:2.176.3.1569349414-1.el7.src", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1568994366-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1568994366-1.el7.src", "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.src", "7Server-RH7-RHOSE-3.11:mediawiki-doc-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-docs-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-playbooks-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-roles-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-test-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-kuryr-0:3.11.153-1.git.1.073ef06.el7.src", "7Server-RH7-RHOSE-3.11:openshift-kuryr-cni-0:3.11.153-1.git.1.073ef06.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-common-0:3.11.153-1.git.1.073ef06.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-controller-0:3.11.153-1.git.1.073ef06.el7.noarch", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.153-1.git.1.7a486a2.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.153-1.git.1.7a486a2.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.x86_64", "7Server-RH7-RHOSE-3.11:python2-kuryr-kubernetes-0:3.11.153-1.git.1.073ef06.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.src", "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:apb-container-scripts-0:1.9.8-1.el7.noarch", "7Server-RH7-RHOSE-3.11:apb-devel-0:1.9.8-1.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-redistributable-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-docker-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.src", "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.src", "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.153-1.git.1.0e8ef36.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.153-1.git.1.7a486a2.el7.src", "7Server-RH7-RHOSE-3.11:jenkins-0:2.176.3.1569349414-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-0:2.176.3.1569349414-1.el7.src", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1568994366-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1568994366-1.el7.src", "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.src", "7Server-RH7-RHOSE-3.11:mediawiki-doc-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-docs-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-playbooks-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-roles-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-test-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-kuryr-0:3.11.153-1.git.1.073ef06.el7.src", "7Server-RH7-RHOSE-3.11:openshift-kuryr-cni-0:3.11.153-1.git.1.073ef06.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-common-0:3.11.153-1.git.1.073ef06.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-controller-0:3.11.153-1.git.1.073ef06.el7.noarch", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.153-1.git.1.7a486a2.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.153-1.git.1.7a486a2.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.x86_64", "7Server-RH7-RHOSE-3.11:python2-kuryr-kubernetes-0:3.11.153-1.git.1.073ef06.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-18T02:02:14+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system is applied.\n\nSee the following documentation, which will be updated shortly for release 3.11.153, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_release_notes.html\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at https://access.redhat.com/articles/11258.", "product_ids": [ "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.src", "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:apb-container-scripts-0:1.9.8-1.el7.noarch", "7Server-RH7-RHOSE-3.11:apb-devel-0:1.9.8-1.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-redistributable-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-docker-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.src", "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.src", "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHBA-2019:3139" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.src", "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:apb-container-scripts-0:1.9.8-1.el7.noarch", "7Server-RH7-RHOSE-3.11:apb-devel-0:1.9.8-1.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-redistributable-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-docker-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.src", "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.153-1.git.1.0e8ef36.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.153-1.git.1.7a486a2.el7.src", "7Server-RH7-RHOSE-3.11:jenkins-0:2.176.3.1569349414-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-0:2.176.3.1569349414-1.el7.src", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1568994366-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1568994366-1.el7.src", "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.src", "7Server-RH7-RHOSE-3.11:mediawiki-doc-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-docs-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-playbooks-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-roles-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-test-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-kuryr-0:3.11.153-1.git.1.073ef06.el7.src", "7Server-RH7-RHOSE-3.11:openshift-kuryr-cni-0:3.11.153-1.git.1.073ef06.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-common-0:3.11.153-1.git.1.073ef06.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-controller-0:3.11.153-1.git.1.073ef06.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.src", "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.153-1.git.1.7a486a2.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.153-1.git.1.7a486a2.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.x86_64", "7Server-RH7-RHOSE-3.11:python2-kuryr-kubernetes-0:3.11.153-1.git.1.073ef06.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.153-1.git.1.0e8ef36.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.153-1.git.1.7a486a2.el7.src", "7Server-RH7-RHOSE-3.11:jenkins-0:2.176.3.1569349414-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-0:2.176.3.1569349414-1.el7.src", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1568994366-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1568994366-1.el7.src", "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.src", "7Server-RH7-RHOSE-3.11:mediawiki-doc-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-docs-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-playbooks-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-roles-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-test-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-kuryr-0:3.11.153-1.git.1.073ef06.el7.src", "7Server-RH7-RHOSE-3.11:openshift-kuryr-cni-0:3.11.153-1.git.1.073ef06.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-common-0:3.11.153-1.git.1.073ef06.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-controller-0:3.11.153-1.git.1.073ef06.el7.noarch", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.153-1.git.1.7a486a2.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.153-1.git.1.7a486a2.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.x86_64", "7Server-RH7-RHOSE-3.11:python2-kuryr-kubernetes-0:3.11.153-1.git.1.073ef06.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.src", "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:apb-container-scripts-0:1.9.8-1.el7.noarch", "7Server-RH7-RHOSE-3.11:apb-devel-0:1.9.8-1.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-redistributable-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-docker-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.src", "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.src", "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.153-1.git.1.0e8ef36.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.153-1.git.1.7a486a2.el7.src", "7Server-RH7-RHOSE-3.11:jenkins-0:2.176.3.1569349414-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-0:2.176.3.1569349414-1.el7.src", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1568994366-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1568994366-1.el7.src", "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.src", "7Server-RH7-RHOSE-3.11:mediawiki-doc-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-docs-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-playbooks-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-roles-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-test-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-kuryr-0:3.11.153-1.git.1.073ef06.el7.src", "7Server-RH7-RHOSE-3.11:openshift-kuryr-cni-0:3.11.153-1.git.1.073ef06.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-common-0:3.11.153-1.git.1.073ef06.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-controller-0:3.11.153-1.git.1.073ef06.el7.noarch", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.153-1.git.1.7a486a2.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.153-1.git.1.7a486a2.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.x86_64", "7Server-RH7-RHOSE-3.11:python2-kuryr-kubernetes-0:3.11.153-1.git.1.073ef06.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-18T02:02:14+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system is applied.\n\nSee the following documentation, which will be updated shortly for release 3.11.153, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_release_notes.html\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at https://access.redhat.com/articles/11258.", "product_ids": [ "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.src", "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:apb-container-scripts-0:1.9.8-1.el7.noarch", "7Server-RH7-RHOSE-3.11:apb-devel-0:1.9.8-1.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-redistributable-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-docker-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.src", "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.src", "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHBA-2019:3139" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.src", "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:apb-container-scripts-0:1.9.8-1.el7.noarch", "7Server-RH7-RHOSE-3.11:apb-devel-0:1.9.8-1.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-redistributable-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-docker-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.src", "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.153-1.git.1.0e8ef36.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.153-1.git.1.7a486a2.el7.src", "7Server-RH7-RHOSE-3.11:jenkins-0:2.176.3.1569349414-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-0:2.176.3.1569349414-1.el7.src", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1568994366-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1568994366-1.el7.src", "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.src", "7Server-RH7-RHOSE-3.11:mediawiki-doc-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-docs-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-playbooks-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-roles-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-test-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-kuryr-0:3.11.153-1.git.1.073ef06.el7.src", "7Server-RH7-RHOSE-3.11:openshift-kuryr-cni-0:3.11.153-1.git.1.073ef06.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-common-0:3.11.153-1.git.1.073ef06.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-controller-0:3.11.153-1.git.1.073ef06.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.src", "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.153-1.git.1.7a486a2.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.153-1.git.1.7a486a2.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.x86_64", "7Server-RH7-RHOSE-3.11:python2-kuryr-kubernetes-0:3.11.153-1.git.1.073ef06.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" } ] }
rhsa-2019_4020
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat JBoss Enterprise Application Platform 7.2 for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime.\n\nThis release of Red Hat JBoss Enterprise Application Platform 7.2.5 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.2.4, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.2.5 Release Notes for information about the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* undertow: HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511)\n\n* undertow: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* undertow: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* undertow: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default (CVE-2019-14838)\n\n* wildfly: wildfly-security-manager: security manager authorization bypass (CVE-2019-14843)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:4020", "url": "https://access.redhat.com/errata/RHSA-2019:4020" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/", "url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/html-single/installation_guide/", "url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/html-single/installation_guide/" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "1751227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751227" }, { "category": "external", "summary": "1752980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752980" }, { "category": "external", "summary": "JBEAP-17075", "url": "https://issues.redhat.com/browse/JBEAP-17075" }, { "category": "external", "summary": "JBEAP-17220", "url": "https://issues.redhat.com/browse/JBEAP-17220" }, { "category": "external", "summary": "JBEAP-17365", "url": "https://issues.redhat.com/browse/JBEAP-17365" }, { "category": "external", "summary": "JBEAP-17476", "url": "https://issues.redhat.com/browse/JBEAP-17476" }, { "category": "external", "summary": "JBEAP-17478", "url": "https://issues.redhat.com/browse/JBEAP-17478" }, { "category": "external", "summary": "JBEAP-17483", "url": "https://issues.redhat.com/browse/JBEAP-17483" }, { "category": "external", "summary": "JBEAP-17495", "url": "https://issues.redhat.com/browse/JBEAP-17495" }, { "category": "external", "summary": "JBEAP-17496", "url": "https://issues.redhat.com/browse/JBEAP-17496" }, { "category": "external", "summary": "JBEAP-17513", "url": "https://issues.redhat.com/browse/JBEAP-17513" }, { "category": "external", "summary": "JBEAP-17521", "url": "https://issues.redhat.com/browse/JBEAP-17521" }, { "category": "external", "summary": "JBEAP-17523", "url": "https://issues.redhat.com/browse/JBEAP-17523" }, { "category": "external", "summary": "JBEAP-17547", "url": "https://issues.redhat.com/browse/JBEAP-17547" }, { "category": "external", "summary": "JBEAP-17548", "url": "https://issues.redhat.com/browse/JBEAP-17548" }, { "category": "external", "summary": "JBEAP-17560", "url": "https://issues.redhat.com/browse/JBEAP-17560" }, { "category": "external", "summary": "JBEAP-17579", "url": "https://issues.redhat.com/browse/JBEAP-17579" }, { "category": "external", "summary": "JBEAP-17582", "url": "https://issues.redhat.com/browse/JBEAP-17582" }, { "category": "external", "summary": "JBEAP-17605", "url": "https://issues.redhat.com/browse/JBEAP-17605" }, { "category": "external", "summary": "JBEAP-17631", "url": "https://issues.redhat.com/browse/JBEAP-17631" }, { "category": "external", "summary": "JBEAP-17647", "url": "https://issues.redhat.com/browse/JBEAP-17647" }, { "category": "external", "summary": "JBEAP-17665", "url": "https://issues.redhat.com/browse/JBEAP-17665" }, { "category": "external", "summary": "JBEAP-17722", "url": "https://issues.redhat.com/browse/JBEAP-17722" }, { "category": "external", "summary": "JBEAP-17874", "url": "https://issues.redhat.com/browse/JBEAP-17874" }, { "category": "external", "summary": "JBEAP-17880", "url": "https://issues.redhat.com/browse/JBEAP-17880" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_4020.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 8 security update", "tracking": { "current_release_date": "2024-11-15T04:13:28+00:00", "generator": { "date": "2024-11-15T04:13:28+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2019:4020", "initial_release_date": "2019-11-26T19:57:14+00:00", "revision_history": [ { "date": "2019-11-26T19:57:14+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-11-26T19:57:14+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T04:13:28+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss EAP 7.2 for RHEL 8", "product": { "name": "Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el8" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" }, { "branches": [ { "category": "product_version", "name": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "product": { "name": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "product_id": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00005.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "product": { "name": "eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "product_id": "eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00005.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "product_id": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "product_id": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "product_id": "eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "product_id": "eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "product_id": "eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "product": { "name": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "product_id": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00003.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "product": { "name": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "product_id": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00002.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product": { "name": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product_id": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product": { "name": "eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product_id": "eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product": { "name": "eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product_id": "eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product": { "name": "eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product_id": "eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product": { "name": "eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product_id": "eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product": { "name": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product_id": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product": { "name": "eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product_id": "eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product": { "name": "eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product_id": "eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product": { "name": "eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product_id": "eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product": { "name": "eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product_id": "eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "product_id": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "product_id": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "product": { "name": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "product_id": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00002.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "product": { "name": "eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "product_id": "eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00002.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "product": { "name": "eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "product_id": "eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00002.1.el8eap?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "product": { "name": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "product_id": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00005.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "product": { "name": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "product_id": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "product": { "name": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "product_id": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "product": { "name": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "product_id": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00003.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "product": { "name": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "product_id": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00002.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "product": { "name": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "product_id": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "product": { "name": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "product_id": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "product": { "name": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "product_id": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "product": { "name": "eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "product_id": "eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "product": { "name": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "product_id": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "product": { "name": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "product_id": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "product": { "name": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "product_id": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "product": { "name": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "product_id": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "product": { "name": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "product_id": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00009.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "product": { "name": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "product_id": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "product": { "name": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "product_id": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00006.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "product": { "name": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "product_id": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "product": { "name": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "product_id": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src", "product": { "name": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src", "product_id": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "product": { "name": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "product_id": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "product": { "name": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "product_id": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "product": { "name": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "product_id": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00002.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "product": { "name": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "product_id": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "product": { "name": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "product_id": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=x86_64" } } }, { "category": "product_version", "name": "eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "product": { "name": "eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "product_id": "eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el8eap?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src" }, "product_reference": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch" }, "product_reference": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src" }, "product_reference": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch" }, "product_reference": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src" }, "product_reference": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src" }, "product_reference": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src" }, "product_reference": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src" }, "product_reference": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src" }, "product_reference": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src" }, "product_reference": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src" }, "product_reference": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src" }, "product_reference": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src" }, "product_reference": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch" }, "product_reference": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src" }, "product_reference": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch" }, "product_reference": "eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch" }, "product_reference": "eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch" }, "product_reference": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src" }, "product_reference": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch" }, "product_reference": "eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch" }, "product_reference": "eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch" }, "product_reference": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src" }, "product_reference": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch" }, "product_reference": "eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch" }, "product_reference": "eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch" }, "product_reference": "eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch" }, "product_reference": "eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch" }, "product_reference": "eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src" }, "product_reference": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src" }, "product_reference": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch" }, "product_reference": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src" }, "product_reference": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src" }, "product_reference": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src" }, "product_reference": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src" }, "product_reference": "eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch" }, "product_reference": "eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch" }, "product_reference": "eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src" }, "product_reference": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src" }, "product_reference": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64 as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64" }, "product_reference": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64 as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64" }, "product_reference": "eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" }, "product_reference": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-9511", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741860" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker can request a large amount of data by manipulating window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this queue can consume excess CPU, memory, or both, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: large amount of data requests leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "There are no mitigations available for nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "RHBZ#1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9511", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T19:57:14+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied.\n\nFor details about how to apply this update, see:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4020" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: large amount of data requests leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T19:57:14+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied.\n\nFor details about how to apply this update, see:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4020" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T19:57:14+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied.\n\nFor details about how to apply this update, see:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4020" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T19:57:14+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied.\n\nFor details about how to apply this update, see:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4020" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "F\u00e1bio Magalh\u00e3es de Andrade" ], "organization": "Sonda Ativas" }, { "names": [ "Juliano de Castro Santos", "Leonard Lunardi" ], "organization": "UnimedBH" } ], "cve": "CVE-2019-14838", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2019-08-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1751227" } ], "notes": [ { "category": "description", "text": "It was found that Wildfly users had default user permissions set incorrectly. A malicious user could use this flaw to access unauthorized controls for the application server.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14838" }, { "category": "external", "summary": "RHBZ#1751227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751227" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14838", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14838" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14838", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14838" }, { "category": "external", "summary": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14838", "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14838" } ], "release_date": "2019-10-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T19:57:14+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied.\n\nFor details about how to apply this update, see:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4020" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default" }, { "cve": "CVE-2019-14843", "cwe": { "id": "CWE-592", "name": "CWE-592" }, "discovery_date": "2019-09-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1752980" } ], "notes": [ { "category": "description", "text": "A flaw was found in Wildfly Security Manager, running under JDK 11 or 8, that authorized requests for any requester. This flaw could be used by a malicious app deployed on the app server to access unauthorized information and possibly conduct further attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-security-manager: security manager authorization bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14843" }, { "category": "external", "summary": "RHBZ#1752980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752980" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14843", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14843" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14843", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14843" } ], "release_date": "2019-09-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T19:57:14+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied.\n\nFor details about how to apply this update, see:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4020" }, { "category": "workaround", "details": "This flaw only affects the Security Manager running under JDK 11 or 8. To mitigate exposure to this flaw, do not run under those JDK versions.", "product_ids": [ "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "wildfly-security-manager: security manager authorization bypass" } ] }
rhsa-2019_3892
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "A minor version update (from 7.4 to 7.5) is now available for Red Hat Fuse. The purpose of this text-only errata is to inform you about the security issues fixed in this release.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.\n\n[2020-04-17 update: descriptions for mutiple components fixed for the same CVE added]", "title": "Topic" }, { "category": "general", "text": "This release of Red Hat Fuse 7.5.0 serves as a replacement for Red Hat Fuse 7.4, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-7525) (CVE-2017-15095)\n\n* jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-15095) (CVE-2017-17485)\n\n* infinispan: deserialization of data in XML and JSON transcoders (CVE-2018-1131)\n\n* hadoop: arbitrary file write vulnerability / arbitrary code execution using a specially crafted zip file (CVE-2018-8009)\n\n* jackson-databind: Potential information exfiltration with default typing, serialization gadget from MyBatis (CVE-2018-11307)\n\n* jackson-databind: improper polymorphic deserialization of types from Jodd-db library (CVE-2018-12022)\n\n* jackson-databind: improper polymorphic deserialization of types from Oracle JDBC driver (CVE-2018-12023)\n\n* jackson-databind: arbitrary code execution in slf4j-ext class (CVE-2018-14718)\n\n* jackson-databind: arbitrary code execution in blaze-ds-opt and blaze-ds-core classes (CVE-2018-14719)\n\n* jackson-databind: exfiltration/XXE in some JDK classes (CVE-2018-14720)\n\n* jackson-databind: improper polymorphic deserialization in axis2-transport-jms class (CVE-2018-19360)\n\n* jackson-databind: improper polymorphic deserialization in openjpa class (CVE-2018-19361)\n\n* jackson-databind: improper polymorphic deserialization in jboss-common-core class (CVE-2018-19362)\n\n* retrofit: Directory traversal in RequestBuilder allows manipulation of resources (CVE-2018-1000850)\n\n* zookeeper: Information disclosure in Apache ZooKeeper (CVE-2019-0201)\n\n* mesos: docker image code execution (CVE-2019-0204)\n\n* netty: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* grpc: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* netty: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* grpc: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* netty: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* grpc: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* netty: HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)\n\n* xstream: remote code execution due to insecure XML deserialization (regression of CVE-2013-7285) (CVE-2019-10173)\n\n* syndesis: default CORS configuration is allow all (CVE-2019-14860)\n\n* netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers (CVE-2019-16869)\n\n* activemq: ActiveMQ Client Missing TLS Hostname Verification (CVE-2018-11775)\n\n* tika: Incomplete fix allows for XML entity expansion resulting in denial of service (CVE-2018-11796)\n\n* jackson-databind: server-side request forgery (SSRF) in axis2-jaxws class (CVE-2018-14721)\n\n* tomcat: Host name verification missing in WebSocket client (CVE-2018-8034)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:3892", "url": "https://access.redhat.com/errata/RHSA-2019:3892" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=jboss.fuse\u0026version=7.5.0", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=jboss.fuse\u0026version=7.5.0" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "url": "https://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/" }, { "category": "external", "summary": "1506612", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1506612" }, { "category": "external", "summary": "1528565", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1528565" }, { "category": "external", "summary": "1576492", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1576492" }, { "category": "external", "summary": "1593018", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1593018" }, { "category": "external", "summary": "1607580", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1607580" }, { "category": "external", "summary": "1629083", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1629083" }, { "category": "external", "summary": "1639090", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1639090" }, { "category": "external", "summary": "1663904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1663904" }, { "category": "external", "summary": "1666415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666415" }, { "category": "external", "summary": "1666418", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666418" }, { "category": "external", "summary": "1666423", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666423" }, { "category": "external", "summary": "1666428", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666428" }, { "category": "external", "summary": "1666482", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666482" }, { "category": "external", "summary": "1666484", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666484" }, { "category": "external", "summary": "1666489", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666489" }, { "category": "external", "summary": "1671096", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1671096" }, { "category": "external", "summary": "1671097", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1671097" }, { "category": "external", "summary": "1677341", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1677341" }, { "category": "external", "summary": "1692755", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1692755" }, { "category": "external", "summary": "1715197", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1715197" }, { "category": "external", "summary": "1722971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1722971" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "1758619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758619" }, { "category": "external", "summary": "1761912", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1761912" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3892.json" } ], "title": "Red Hat Security Advisory: Red Hat Fuse 7.5.0 security update", "tracking": { "current_release_date": "2024-12-15T18:53:23+00:00", "generator": { "date": "2024-12-15T18:53:23+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2019:3892", "initial_release_date": "2019-11-14T21:17:38+00:00", "revision_history": [ { "date": "2019-11-14T21:17:38+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-04-20T07:18:57+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-15T18:53:23+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Fuse 7.5.0", "product": { "name": "Red Hat Fuse 7.5.0", "product_id": "Red Hat Fuse 7.5.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_fuse:7" } } } ], "category": "product_family", "name": "Red Hat JBoss Fuse" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Liao Xinxi" ], "organization": "NSFOCUS" } ], "cve": "CVE-2017-15095", "cwe": { "id": "CWE-184", "name": "Incomplete List of Disallowed Inputs" }, "discovery_date": "2017-10-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1506612" } ], "notes": [ { "category": "description", "text": "A deserialization flaw was discovered in the jackson-databind which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readValue method of the ObjectMapper. This issue extends the previous flaw CVE-2017-7525 by blacklisting more classes that could be used maliciously.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-7525)", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of jackson-databind (in Satellite 6.0 and 6.1) and candlepin (which embeds a copy of jackson-databind in Satellite 6.2) as shipped with Red Hat Satellite 6.x. However the affected code is NOT used at this time:\n\nCandlepin currently uses the default type resolution configuration for the ObjectMappers it creates/uses. Nowhere in candlepin do we enable global polymorphic deserialization via enableDefaultTyping(...), therefore based on the documentation sited BZ 1462702 , candlepin should not be affected.\n\nHowever as the vulnerable software ships with the product we have marked them as vulnerable to ensure the issue is tracked.\n\nJBoss EAP 7.x only uses the vulnerable Jackson Databind library for marshalling and unmarshalling of JSON objects passed to JAX-RS webservices. Some advise about how to remain safe when using JAX-RS webservices on JBoss EAP 7.x is available here: \n\nhttps://access.redhat.com/solutions/3279231", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-15095" }, { "category": "external", "summary": "RHBZ#1506612", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1506612" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-15095", "url": "https://www.cve.org/CVERecord?id=CVE-2017-15095" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-15095", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15095" }, { "category": "external", "summary": "https://access.redhat.com/solutions/3442891", "url": "https://access.redhat.com/solutions/3442891" } ], "release_date": "2017-11-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" }, { "category": "workaround", "details": "Mitigation to this problem is to not trigger polymorphic desrialization globally by using: objectMapper.enableDefaultTyping() and rather use @JsonTypeInfo on the class property to explicitly define the type information. For more information on this issue please refer to https://www.github.com/mbechler/marshalsec/blob/master/marshalsec.pdf?raw=true", "product_ids": [ "Red Hat Fuse 7.5.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-7525)" }, { "acknowledgments": [ { "names": [ "0c0c0f from 360\u89c2\u661f\u5b9e\u9a8c\u5ba4" ] } ], "cve": "CVE-2017-17485", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2017-12-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1528565" } ], "notes": [ { "category": "description", "text": "A deserialization flaw was discovered in the jackson-databind which could allow an unauthenticated user to perform code execution by sending maliciously crafted input to the readValue method of ObjectMapper. This issue extends upon the previous flaws CVE-2017-7525 and CVE-2017-15095 by blacklisting more classes that could be used maliciously.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-15095)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-17485" }, { "category": "external", "summary": "RHBZ#1528565", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1528565" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-17485", "url": "https://www.cve.org/CVERecord?id=CVE-2017-17485" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-17485", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-17485" }, { "category": "external", "summary": "https://access.redhat.com/solutions/3442891", "url": "https://access.redhat.com/solutions/3442891" } ], "release_date": "2017-12-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-15095)" }, { "cve": "CVE-2018-1131", "cwe": { "id": "CWE-349", "name": "Acceptance of Extraneous Untrusted Data With Trusted Data" }, "discovery_date": "2018-05-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1576492" } ], "notes": [ { "category": "description", "text": "Infinispan permits improper deserialization of trusted data via XML and JSON transcoders under certain server configurations. A user with authenticated access to the server could send a malicious object to a cache configured to accept certain types of objects, achieving code execution and possible further attacks. Versions 9.0.3.Final, 9.1.7.Final, 8.2.10.Final, 9.2.2.Final, 9.3.0.Alpha1 are believed to be affected.", "title": "Vulnerability description" }, { "category": "summary", "text": "infinispan: deserialization of data in XML and JSON transcoders", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1131" }, { "category": "external", "summary": "RHBZ#1576492", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1576492" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1131", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1131" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1131", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1131" } ], "release_date": "2018-05-14T14:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "infinispan: deserialization of data in XML and JSON transcoders" }, { "cve": "CVE-2018-8009", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2018-06-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1593018" } ], "notes": [ { "category": "description", "text": "Apache Hadoop 3.1.0, 3.0.0-alpha to 3.0.2, 2.9.0 to 2.9.1, 2.8.0 to 2.8.4, 2.0.0-alpha to 2.7.6, 0.23.0 to 0.23.11 is exploitable via the zip slip vulnerability in places that accept a zip file.", "title": "Vulnerability description" }, { "category": "summary", "text": "hadoop: arbitrary file write vulnerability / arbitrary code execution using a specially crafted zip file", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of rhs-hadoop as shipped with Red Hat Gluster Storage 3. For JBoss Fuse 6.3 and 7 standalone, while they ship vulnerable artifact via camel-hbase, camel-hdfs2 (fuse 6.3) and camel-hdfs2 (fuse 7), there\u0027s no invocation on the flawed code that could lead to an unzip operation. So fuse 6.3, 7 standalone are not affected. However FIS 2.0 and Fuse 7 on OpenShift ship vulnerable artifact via maven BOM, so setting fuse as affected for this reason.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-8009" }, { "category": "external", "summary": "RHBZ#1593018", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1593018" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-8009", "url": "https://www.cve.org/CVERecord?id=CVE-2018-8009" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-8009", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-8009" } ], "release_date": "2018-06-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "hadoop: arbitrary file write vulnerability / arbitrary code execution using a specially crafted zip file" }, { "cve": "CVE-2018-8034", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2018-07-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1607580" } ], "notes": [ { "category": "description", "text": "The host name verification when using TLS with the WebSocket client was missing. It is now enabled by default. Versions Affected: Apache Tomcat 9.0.0.M1 to 9.0.9, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, and 7.0.35 to 7.0.88.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Host name verification missing in WebSocket client", "title": "Vulnerability summary" }, { "category": "other", "text": "Tomcat 6, and Red Hat products shipping it, are not affected by this CVE. Tomcat 7, 8, and 9, as well as Red Hat Products shipping them, are affected. Affected products, including Red Hat JBoss Web Server 3 and 5, Enterprise Application Server 6, and Fuse 7, may provide fixes for this issue in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-8034" }, { "category": "external", "summary": "RHBZ#1607580", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1607580" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-8034", "url": "https://www.cve.org/CVERecord?id=CVE-2018-8034" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-8034", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-8034" } ], "release_date": "2018-07-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "tomcat: Host name verification missing in WebSocket client" }, { "cve": "CVE-2018-11307", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-02-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1677341" } ], "notes": [ { "category": "description", "text": "A vulnerability was discovered in jackson-databind where it would permit deserialization of a malicious object using MyBatis classes when using DefaultTyping. An attacker could use this flaw to achieve content exfiltration and possibly conduct further attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Potential information exfiltration with default typing, serialization gadget from MyBatis", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 is not affected by this issue, since Candlepin\u0027s java runtime environment does not load MyBatis classes.\n\nRed Hat Virtualization 4 is not affected by this issue, since it does not include MyBatis classes.\n\nRed Hat Fuse 6 and 7 are not directly affected by this issue, as although they do ship the vulnerable jackson-databind component, they do not enable polymorphic deserialization or default typing which are required for exploitability. Their impacts have correspondingly been reduced to Moderate. Future updates may address this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-11307" }, { "category": "external", "summary": "RHBZ#1677341", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1677341" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-11307", "url": "https://www.cve.org/CVERecord?id=CVE-2018-11307" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-11307", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11307" } ], "release_date": "2018-05-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Potential information exfiltration with default typing, serialization gadget from MyBatis" }, { "cve": "CVE-2018-11775", "discovery_date": "2018-09-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1629083" } ], "notes": [ { "category": "description", "text": "TLS hostname verification when using the Apache ActiveMQ Client before 5.15.6 was missing which could make the client vulnerable to a MITM attack between a Java application using the ActiveMQ client and the ActiveMQ server. This is now enabled by default.", "title": "Vulnerability description" }, { "category": "summary", "text": "activemq: ActiveMQ Client Missing TLS Hostname Verification", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-11775" }, { "category": "external", "summary": "RHBZ#1629083", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1629083" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-11775", "url": "https://www.cve.org/CVERecord?id=CVE-2018-11775" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-11775", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11775" } ], "release_date": "2018-09-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "activemq: ActiveMQ Client Missing TLS Hostname Verification" }, { "cve": "CVE-2018-11796", "cwe": { "id": "CWE-776", "name": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)" }, "discovery_date": "2018-10-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1639090" } ], "notes": [ { "category": "description", "text": "In Apache Tika 1.19 (CVE-2018-11761), we added an entity expansion limit for XML parsing. However, Tika reuses SAXParsers and calls reset() after each parse, which, for Xerces2 parsers, as per the documentation, removes the user-specified SecurityManager and thus removes entity expansion limits after the first parse. Apache Tika versions from 0.1 to 1.19 are therefore still vulnerable to entity expansions which can lead to a denial of service attack. Users should upgrade to 1.19.1 or later.", "title": "Vulnerability description" }, { "category": "summary", "text": "tika: Incomplete fix allows for XML entity expansion resulting in denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of tika which is embedded in the nutch package as shipped with Red Hat Satellite 5. The tika server is not exposed, as such exploitation is difficult, Red Hat Product Security has rated this issue as having security impact of Low. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-11796" }, { "category": "external", "summary": "RHBZ#1639090", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1639090" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-11796", "url": "https://www.cve.org/CVERecord?id=CVE-2018-11796" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-11796", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11796" }, { "category": "external", "summary": "https://lists.apache.org/thread.html/88de8350cda9b184888ec294c813c5bd8a2081de8fd3666f8904bc05@%3Cdev.tika.apache.org%3E", "url": "https://lists.apache.org/thread.html/88de8350cda9b184888ec294c813c5bd8a2081de8fd3666f8904bc05@%3Cdev.tika.apache.org%3E" } ], "release_date": "2018-10-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "tika: Incomplete fix allows for XML entity expansion resulting in denial of service" }, { "cve": "CVE-2018-12022", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-01-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1671097" } ], "notes": [ { "category": "description", "text": "A vulnerability was discovered in jackson-databind where it would permit deserialization of a malicious object using Jodd DB connection classes when using DefaultTyping. An attacker could use this flaw to achieve remote code execution under certain circumstances.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: improper polymorphic deserialization of types from Jodd-db library", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 is not affected by this issue, since Candlepin\u0027s java runtime environment does not load Jodd classes.\n\nRed Hat Virtualization 4 is not affected by this issue, since it does not load Jodd classes.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-12022" }, { "category": "external", "summary": "RHBZ#1671097", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1671097" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-12022", "url": "https://www.cve.org/CVERecord?id=CVE-2018-12022" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12022", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12022" } ], "release_date": "2018-05-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: improper polymorphic deserialization of types from Jodd-db library" }, { "cve": "CVE-2018-12023", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-01-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1671096" } ], "notes": [ { "category": "description", "text": "A vulnerability was discovered in jackson-databind where it would permit deserialization of a malicious object using Oracle JDBC classes when using DefaultTyping. An attacker could use this flaw to achieve remote code execution under certain circumstances.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: improper polymorphic deserialization of types from Oracle JDBC driver", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 is not affected by this issue, since Candlepin\u0027s java runtime environment does not load Oracle\u0027s JDBC classes.\n\nRed Hat Virtualization 4 is not affected by this issue, since it does not load Oracle\u0027s JDBC classes.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-12023" }, { "category": "external", "summary": "RHBZ#1671096", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1671096" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-12023", "url": "https://www.cve.org/CVERecord?id=CVE-2018-12023" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12023", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12023" } ], "release_date": "2018-06-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: improper polymorphic deserialization of types from Oracle JDBC driver" }, { "cve": "CVE-2018-14718", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1666415" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in jackson-databind, where it would permit polymorphic deserialization of a malicious object using slf4j classes. An attacker could use this flaw to execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: arbitrary code execution in slf4j-ext class", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability in jackson-databind involves exploiting CVE-2018-1088 against slf4j, which was fixed in Red Hat products through the errata referenced at https://access.redhat.com/security/cve/cve-2018-8088. Applications that link only slf4j versions including that fix are not vulnerable to this vulnerability.\n\nRed Hat Satellite 6 is not affected by this issue, since its candlepin component doesn\u0027t bundle slf4j-ext jar.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-14718" }, { "category": "external", "summary": "RHBZ#1666415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666415" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-14718", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14718" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14718", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14718" } ], "release_date": "2018-07-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: arbitrary code execution in slf4j-ext class" }, { "cve": "CVE-2018-14719", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1666418" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in jackson-databind, where it would permit polymorphic deserialization of a malicious object using blaze classes. An attacker could use this flaw to execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: arbitrary code execution in blaze-ds-opt and blaze-ds-core classes", "title": "Vulnerability summary" }, { "category": "other", "text": "The following Red Hat products are not affected by this issue as they do not bundle or provide the requisite gadget jars to exploit this vulnerability:\nRed Hat Satellite 6\nRed Hat Enterprise Virtualization 4\nRed Hat Fuse 6, 7, and Fuse Integration Services 2\nRed Hat A-MQ 6", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-14719" }, { "category": "external", "summary": "RHBZ#1666418", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666418" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-14719", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14719" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14719", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14719" } ], "release_date": "2018-07-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: arbitrary code execution in blaze-ds-opt and blaze-ds-core classes" }, { "cve": "CVE-2018-14720", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "discovery_date": "2019-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1666423" } ], "notes": [ { "category": "description", "text": "FasterXML jackson-databind 2.x before 2.9.7 might allow attackers to conduct external XML entity (XXE) attacks by leveraging failure to block unspecified JDK classes from polymorphic deserialization.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: exfiltration/XXE in some JDK classes", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 is not affected by this issue, since its only supported Java runtime (openJDK) doesn\u0027t bundle the com.sun.deploy.security.ruleset.DRSHelper class.\n\nRed Hat Enterprise Virtualization 4 is not affected by this issue, since its only supported Java runtime (openJDK) doesn\u0027t bundle the com.sun.deploy.security.ruleset.DRSHelper class.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-14720" }, { "category": "external", "summary": "RHBZ#1666423", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666423" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-14720", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14720" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14720", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14720" } ], "release_date": "2018-07-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible \n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Fuse 7.5.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: exfiltration/XXE in some JDK classes" }, { "cve": "CVE-2018-14721", "cwe": { "id": "CWE-352", "name": "Cross-Site Request Forgery (CSRF)" }, "discovery_date": "2019-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1666428" } ], "notes": [ { "category": "description", "text": "FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to conduct server-side request forgery (SSRF) attacks by leveraging failure to block the axis2-jaxws class from polymorphic deserialization.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: server-side request forgery (SSRF) in axis2-jaxws class", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 is not affected by this issue, since its candlepin component doesn\u0027t bundle axis2-jaxws jar.\n\nRed Hat Virtualization is not affected by this issue, since its does not bundle axis2-jaxws jar.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-14721" }, { "category": "external", "summary": "RHBZ#1666428", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666428" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-14721", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14721" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14721", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14721" } ], "release_date": "2018-07-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: server-side request forgery (SSRF) in axis2-jaxws class" }, { "cve": "CVE-2018-19360", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1666482" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in jackson-databind, where it would permit polymorphic deserialization of a malicious object using the axis2-transport-jms class. An attacker could use this flaw to execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: improper polymorphic deserialization in axis2-transport-jms class", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 is not affected by this issue, since its candlepin component doesn\u0027t include axis2-transport-jms jar.\n\nRed Hat Virtualization 4 is not affected by this issue, since it does not include axis2-transport-jms jar.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-19360" }, { "category": "external", "summary": "RHBZ#1666482", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666482" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-19360", "url": "https://www.cve.org/CVERecord?id=CVE-2018-19360" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-19360", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-19360" } ], "release_date": "2018-11-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: improper polymorphic deserialization in axis2-transport-jms class" }, { "cve": "CVE-2018-19361", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1666484" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in jackson-databind, where it would permit polymorphic deserialization of a malicious object using the OpenJPA class. An attacker could use this flaw to execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: improper polymorphic deserialization in openjpa class", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 is not affected by this issue, since its candlepin component doesn\u0027t bundle openjpa jar.\n\nRed Hat Virtualization 4 is not affected by this issue, since its candlepin component doesn\u0027t bundle openjpa jar.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-19361" }, { "category": "external", "summary": "RHBZ#1666484", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666484" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-19361", "url": "https://www.cve.org/CVERecord?id=CVE-2018-19361" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-19361", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-19361" } ], "release_date": "2018-11-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: improper polymorphic deserialization in openjpa class" }, { "cve": "CVE-2018-19362", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1666489" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in jackson-databind, where it would permit polymorphic deserialization of a malicious object using the jboss-common-core class. An attacker could use this flaw to execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: improper polymorphic deserialization in jboss-common-core class", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 is not affected by this issue, since its candlepin component doesn\u0027t bundle jboss-common-core jar.\n\nRed Hat Virtualization 4 is not affected by this issue, since its candlepin component doesn\u0027t bundle jboss-common-core jar.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-19362" }, { "category": "external", "summary": "RHBZ#1666489", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666489" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-19362", "url": "https://www.cve.org/CVERecord?id=CVE-2018-19362" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-19362", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-19362" } ], "release_date": "2018-11-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: improper polymorphic deserialization in jboss-common-core class" }, { "cve": "CVE-2018-1000850", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2018-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1663904" } ], "notes": [ { "category": "description", "text": "A flaw was found in Retrofit, where it allowed directory traversal via its RequestBuilder class. An attacker could use this flaw to access information or commands outside of its set permissions.", "title": "Vulnerability description" }, { "category": "summary", "text": "retrofit: Directory traversal in RequestBuilder allows manipulation of resources", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1000850" }, { "category": "external", "summary": "RHBZ#1663904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1663904" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1000850", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1000850" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000850", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000850" } ], "release_date": "2018-10-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "retrofit: Directory traversal in RequestBuilder allows manipulation of resources" }, { "cve": "CVE-2019-0201", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "discovery_date": "2019-05-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1715197" } ], "notes": [ { "category": "description", "text": "A flaw was found in Apache ZooKeeper. A lack of permission checks while retrieving ACLs allows unsalted hash values to be disclosed for unauthenticated or unprivileged users.", "title": "Vulnerability description" }, { "category": "summary", "text": "zookeeper: Information disclosure in Apache ZooKeeper", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-0201" }, { "category": "external", "summary": "RHBZ#1715197", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1715197" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0201", "url": "https://www.cve.org/CVERecord?id=CVE-2019-0201" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0201", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0201" } ], "release_date": "2019-05-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" }, { "category": "workaround", "details": "Use an authentication method other than Digest (e.g. Kerberos) or upgrade to zookeeper 3.4.14 or later (3.5.5 or later if on the 3.5 branch). [https://zookeeper.apache.org/security.html#CVE-2019-0201]", "product_ids": [ "Red Hat Fuse 7.5.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "zookeeper: Information disclosure in Apache ZooKeeper" }, { "cve": "CVE-2019-0204", "cwe": { "id": "CWE-250", "name": "Execution with Unnecessary Privileges" }, "discovery_date": "2019-03-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1692755" } ], "notes": [ { "category": "description", "text": "A flaw was found in Docker image running under root user, where it is possible to overwrite the init helper binary of the container runtime or the command executor in Apache Mesos. A malicious user could use this flaw to gain root-level code execution on the host.", "title": "Vulnerability description" }, { "category": "summary", "text": "mesos: docker image code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-0204" }, { "category": "external", "summary": "RHBZ#1692755", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1692755" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0204", "url": "https://www.cve.org/CVERecord?id=CVE-2019-0204" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0204", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0204" } ], "release_date": "2019-03-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "mesos: docker image code execution" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9518", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735749" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using frames with an empty payload, a flood could occur that results in excessive CPU usage and starvation of other clients. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using empty frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9518" }, { "category": "external", "summary": "RHBZ#1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9518", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using empty frames results in excessive resource consumption" }, { "cve": "CVE-2019-10173", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "discovery_date": "2019-06-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1722971" } ], "notes": [ { "category": "description", "text": "It was found that xstream API version 1.4.10 introduced a regression for a previous deserialization flaw. If the security framework has not been initialized, it may allow a remote attacker to run arbitrary shell commands when unmarshalling XML or any supported format. This a regression of CVE-2013-7285 fixed in 1.4.7 (fixed) as of BPMS 6.0.1, the regression was introduced with xstream-1.4.10 implemented in RHPAM.", "title": "Vulnerability description" }, { "category": "summary", "text": "xstream: remote code execution due to insecure XML deserialization (regression of CVE-2013-7285)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10173" }, { "category": "external", "summary": "RHBZ#1722971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1722971" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10173", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10173" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10173", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10173" }, { "category": "external", "summary": "http://x-stream.github.io/changes.html#1.4.11", "url": "http://x-stream.github.io/changes.html#1.4.11" } ], "release_date": "2018-10-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xstream: remote code execution due to insecure XML deserialization (regression of CVE-2013-7285)" }, { "acknowledgments": [ { "names": [ "Jeremy Choi" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2019-14860", "cwe": { "id": "CWE-942", "name": "Permissive Cross-domain Policy with Untrusted Domains" }, "discovery_date": "2019-10-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1761912" } ], "notes": [ { "category": "description", "text": "It was found that the Syndesis configuration for Cross-Origin Resource Sharing was set to allow all origins. An attacker could use this lack of protection to conduct phishing attacks and further access unauthorized information.", "title": "Vulnerability description" }, { "category": "summary", "text": "syndesis: default CORS configuration is allow all", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14860" }, { "category": "external", "summary": "RHBZ#1761912", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1761912" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14860", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14860" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14860", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14860" } ], "release_date": "2019-10-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "syndesis: default CORS configuration is allow all" }, { "cve": "CVE-2019-16869", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2019-09-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1758619" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty, where whitespace before the colon in HTTP headers is mishandled. This flaw allows an attacker to cause HTTP request smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that this vulnerability does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships vulnerable netty version embedded in Candlepin, however, is not directly vulnerable since HTTP requests are handled by Tomcat and not netty.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-16869" }, { "category": "external", "summary": "RHBZ#1758619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758619" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16869", "url": "https://www.cve.org/CVERecord?id=CVE-2019-16869" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16869", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16869" } ], "release_date": "2019-09-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat Fuse 7.5.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers" } ] }
RHBA-2019:2819
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Container Platform release 4.1.17 is now available with\nupdates to packages and images that fix several bugs.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the RPM packages for Red Hat\nOpenShift Container Platform 4.1.17. See the following advisory for the\ncontainer images for this release:\n\nhttps://access.redhat.com/errata/RHBA-2019:2820\n\nAll OpenShift Container Platform 4.1 users are advised to upgrade to these\nupdated packages and images.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHBA-2019:2819", "url": "https://access.redhat.com/errata/RHBA-2019:2819" }, { "category": "external", "summary": "1751890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751890" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhba-2019_2819.json" } ], "title": "Red Hat Bug Fix Advisory: OpenShift Container Platform 4.1.17 packages update", "tracking": { "current_release_date": "2025-03-15T19:44:46+00:00", "generator": { "date": "2025-03-15T19:44:46+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.1" } }, "id": "RHBA-2019:2819", "initial_release_date": "2019-09-25T06:26:23+00:00", "revision_history": [ { "date": "2019-09-25T06:26:23+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-09-25T06:26:23+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-03-15T19:44:46+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.1", "product": { "name": "Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.1::el7" } } }, { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.1", "product": { "name": "Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.1::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64", "product": { "name": "atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64", "product_id": "atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.1.17-201909170941.git.1.9b9b46b.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "atomic-enterprise-service-catalog-svcat-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64", "product": { "name": "atomic-enterprise-service-catalog-svcat-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64", "product_id": "atomic-enterprise-service-catalog-svcat-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog-svcat@4.1.17-201909170941.git.1.9b9b46b.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openshift-clients-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "product": { "name": "openshift-clients-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "product_id": "openshift-clients-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "product": { "name": "openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "product_id": "openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.1.17-201909170941.git.0.2447974.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "product": { "name": "openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "product_id": "openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "ansible-service-broker-1:1.4.4-2.el7.x86_64", "product": { "name": "ansible-service-broker-1:1.4.4-2.el7.x86_64", "product_id": "ansible-service-broker-1:1.4.4-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openshift-clients-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "product": { "name": "openshift-clients-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "product_id": "openshift-clients-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "product": { "name": "openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "product_id": "openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.1.17-201909170941.git.0.2447974.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "product": { "name": "openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "product_id": "openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "podman-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "product": { "name": "podman-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "product_id": "podman-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "podman-debugsource-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "product": { "name": "podman-debugsource-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "product_id": "podman-debugsource-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "podman-debuginfo-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "product": { "name": "podman-debuginfo-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "product_id": "podman-debuginfo-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "containers-common-1:0.1.32-5.git1715c90.el8.x86_64", "product": { "name": "containers-common-1:0.1.32-5.git1715c90.el8.x86_64", "product_id": "containers-common-1:0.1.32-5.git1715c90.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-1:0.1.32-5.git1715c90.el8.x86_64", "product": { "name": "skopeo-1:0.1.32-5.git1715c90.el8.x86_64", "product_id": "skopeo-1:0.1.32-5.git1715c90.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debugsource-1:0.1.32-5.git1715c90.el8.x86_64", "product": { "name": "skopeo-debugsource-1:0.1.32-5.git1715c90.el8.x86_64", "product_id": "skopeo-debugsource-1:0.1.32-5.git1715c90.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debuginfo-1:0.1.32-5.git1715c90.el8.x86_64", "product": { "name": "skopeo-debuginfo-1:0.1.32-5.git1715c90.el8.x86_64", "product_id": "skopeo-debuginfo-1:0.1.32-5.git1715c90.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.src", "product": { "name": "atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.src", "product_id": "atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.1.17-201909170941.git.1.9b9b46b.el7?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "openshift-0:4.1.17-201909170941.git.0.2447974.el7.src", "product": { "name": "openshift-0:4.1.17-201909170941.git.0.2447974.el7.src", "product_id": "openshift-0:4.1.17-201909170941.git.0.2447974.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.src", "product": { "name": "openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.src", "product_id": "openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "ansible-service-broker-1:1.4.4-2.el7.src", "product": { "name": "ansible-service-broker-1:1.4.4-2.el7.src", "product_id": "ansible-service-broker-1:1.4.4-2.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "openshift-0:4.1.17-201909170941.git.0.2447974.el8.src", "product": { "name": "openshift-0:4.1.17-201909170941.git.0.2447974.el8.src", "product_id": "openshift-0:4.1.17-201909170941.git.0.2447974.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "podman-0:1.0.2-2.dev.git96ccc2e.el8.src", "product": { "name": "podman-0:1.0.2-2.dev.git96ccc2e.el8.src", "product_id": "podman-0:1.0.2-2.dev.git96ccc2e.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "skopeo-1:0.1.32-5.git1715c90.el8.src", "product": { "name": "skopeo-1:0.1.32-5.git1715c90.el8.src", "product_id": "skopeo-1:0.1.32-5.git1715c90.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.noarch", "product": { "name": "openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.noarch", "product_id": "openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } }, { "category": "product_version", "name": "ansible-service-broker-container-scripts-1:1.4.4-2.el7.noarch", "product": { "name": "ansible-service-broker-container-scripts-1:1.4.4-2.el7.noarch", "product_id": "ansible-service-broker-container-scripts-1:1.4.4-2.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "ansible-service-broker-selinux-1:1.4.4-2.el7.noarch", "product": { "name": "ansible-service-broker-selinux-1:1.4.4-2.el7.noarch", "product_id": "ansible-service-broker-selinux-1:1.4.4-2.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "automation-broker-apb-role-1:1.4.4-2.el7.noarch", "product": { "name": "automation-broker-apb-role-1:1.4.4-2.el7.noarch", "product_id": "automation-broker-apb-role-1:1.4.4-2.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "podman-docker-0:1.0.2-2.dev.git96ccc2e.el8.noarch", "product": { "name": "podman-docker-0:1.0.2-2.dev.git96ccc2e.el8.noarch", "product_id": "podman-docker-0:1.0.2-2.dev.git96ccc2e.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ansible-service-broker-1:1.4.4-2.el7.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:ansible-service-broker-1:1.4.4-2.el7.src" }, "product_reference": "ansible-service-broker-1:1.4.4-2.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-service-broker-1:1.4.4-2.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:ansible-service-broker-1:1.4.4-2.el7.x86_64" }, "product_reference": "ansible-service-broker-1:1.4.4-2.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-service-broker-container-scripts-1:1.4.4-2.el7.noarch as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:ansible-service-broker-container-scripts-1:1.4.4-2.el7.noarch" }, "product_reference": "ansible-service-broker-container-scripts-1:1.4.4-2.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-service-broker-selinux-1:1.4.4-2.el7.noarch as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:ansible-service-broker-selinux-1:1.4.4-2.el7.noarch" }, "product_reference": "ansible-service-broker-selinux-1:1.4.4-2.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.src" }, "product_reference": "atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64" }, "product_reference": "atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-svcat-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-svcat-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64" }, "product_reference": "atomic-enterprise-service-catalog-svcat-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "automation-broker-apb-role-1:1.4.4-2.el7.noarch as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:automation-broker-apb-role-1:1.4.4-2.el7.noarch" }, "product_reference": "automation-broker-apb-role-1:1.4.4-2.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-0:4.1.17-201909170941.git.0.2447974.el7.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-0:4.1.17-201909170941.git.0.2447974.el7.src" }, "product_reference": "openshift-0:4.1.17-201909170941.git.0.2447974.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.noarch as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.noarch" }, "product_reference": "openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.src" }, "product_reference": "openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.1.17-201909170941.git.0.2447974.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-clients-0:4.1.17-201909170941.git.0.2447974.el7.x86_64" }, "product_reference": "openshift-clients-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el7.x86_64" }, "product_reference": "openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el7.x86_64" }, "product_reference": "openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "containers-common-1:0.1.32-5.git1715c90.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:containers-common-1:0.1.32-5.git1715c90.el8.x86_64" }, "product_reference": "containers-common-1:0.1.32-5.git1715c90.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-0:4.1.17-201909170941.git.0.2447974.el8.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:openshift-0:4.1.17-201909170941.git.0.2447974.el8.src" }, "product_reference": "openshift-0:4.1.17-201909170941.git.0.2447974.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.1.17-201909170941.git.0.2447974.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:openshift-clients-0:4.1.17-201909170941.git.0.2447974.el8.x86_64" }, "product_reference": "openshift-clients-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el8.x86_64" }, "product_reference": "openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el8.x86_64" }, "product_reference": "openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:1.0.2-2.dev.git96ccc2e.el8.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:podman-0:1.0.2-2.dev.git96ccc2e.el8.src" }, "product_reference": "podman-0:1.0.2-2.dev.git96ccc2e.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:1.0.2-2.dev.git96ccc2e.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:podman-0:1.0.2-2.dev.git96ccc2e.el8.x86_64" }, "product_reference": "podman-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-0:1.0.2-2.dev.git96ccc2e.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:podman-debuginfo-0:1.0.2-2.dev.git96ccc2e.el8.x86_64" }, "product_reference": "podman-debuginfo-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-0:1.0.2-2.dev.git96ccc2e.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:podman-debugsource-0:1.0.2-2.dev.git96ccc2e.el8.x86_64" }, "product_reference": "podman-debugsource-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "podman-docker-0:1.0.2-2.dev.git96ccc2e.el8.noarch as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:podman-docker-0:1.0.2-2.dev.git96ccc2e.el8.noarch" }, "product_reference": "podman-docker-0:1.0.2-2.dev.git96ccc2e.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:0.1.32-5.git1715c90.el8.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:skopeo-1:0.1.32-5.git1715c90.el8.src" }, "product_reference": "skopeo-1:0.1.32-5.git1715c90.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:0.1.32-5.git1715c90.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:skopeo-1:0.1.32-5.git1715c90.el8.x86_64" }, "product_reference": "skopeo-1:0.1.32-5.git1715c90.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-1:0.1.32-5.git1715c90.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:skopeo-debuginfo-1:0.1.32-5.git1715c90.el8.x86_64" }, "product_reference": "skopeo-debuginfo-1:0.1.32-5.git1715c90.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-1:0.1.32-5.git1715c90.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:skopeo-debugsource-1:0.1.32-5.git1715c90.el8.x86_64" }, "product_reference": "skopeo-debugsource-1:0.1.32-5.git1715c90.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.src", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-svcat-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-0:4.1.17-201909170941.git.0.2447974.el7.src", "7Server-RH7-RHOSE-4.1:openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.noarch", "7Server-RH7-RHOSE-4.1:openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.src", "7Server-RH7-RHOSE-4.1:openshift-clients-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "8Base-RHOSE-4.1:containers-common-1:0.1.32-5.git1715c90.el8.x86_64", "8Base-RHOSE-4.1:openshift-0:4.1.17-201909170941.git.0.2447974.el8.src", "8Base-RHOSE-4.1:openshift-clients-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "8Base-RHOSE-4.1:openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "8Base-RHOSE-4.1:openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "8Base-RHOSE-4.1:podman-0:1.0.2-2.dev.git96ccc2e.el8.src", "8Base-RHOSE-4.1:podman-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "8Base-RHOSE-4.1:podman-debuginfo-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "8Base-RHOSE-4.1:podman-debugsource-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "8Base-RHOSE-4.1:podman-docker-0:1.0.2-2.dev.git96ccc2e.el8.noarch", "8Base-RHOSE-4.1:skopeo-1:0.1.32-5.git1715c90.el8.src", "8Base-RHOSE-4.1:skopeo-1:0.1.32-5.git1715c90.el8.x86_64", "8Base-RHOSE-4.1:skopeo-debuginfo-1:0.1.32-5.git1715c90.el8.x86_64", "8Base-RHOSE-4.1:skopeo-debugsource-1:0.1.32-5.git1715c90.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.1:ansible-service-broker-1:1.4.4-2.el7.src", "7Server-RH7-RHOSE-4.1:ansible-service-broker-1:1.4.4-2.el7.x86_64", "7Server-RH7-RHOSE-4.1:ansible-service-broker-container-scripts-1:1.4.4-2.el7.noarch", "7Server-RH7-RHOSE-4.1:ansible-service-broker-selinux-1:1.4.4-2.el7.noarch", "7Server-RH7-RHOSE-4.1:automation-broker-apb-role-1:1.4.4-2.el7.noarch" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.src", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-svcat-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-0:4.1.17-201909170941.git.0.2447974.el7.src", "7Server-RH7-RHOSE-4.1:openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.noarch", "7Server-RH7-RHOSE-4.1:openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.src", "7Server-RH7-RHOSE-4.1:openshift-clients-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "8Base-RHOSE-4.1:containers-common-1:0.1.32-5.git1715c90.el8.x86_64", "8Base-RHOSE-4.1:openshift-0:4.1.17-201909170941.git.0.2447974.el8.src", "8Base-RHOSE-4.1:openshift-clients-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "8Base-RHOSE-4.1:openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "8Base-RHOSE-4.1:openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "8Base-RHOSE-4.1:podman-0:1.0.2-2.dev.git96ccc2e.el8.src", "8Base-RHOSE-4.1:podman-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "8Base-RHOSE-4.1:podman-debuginfo-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "8Base-RHOSE-4.1:podman-debugsource-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "8Base-RHOSE-4.1:podman-docker-0:1.0.2-2.dev.git96ccc2e.el8.noarch", "8Base-RHOSE-4.1:skopeo-1:0.1.32-5.git1715c90.el8.src", "8Base-RHOSE-4.1:skopeo-1:0.1.32-5.git1715c90.el8.x86_64", "8Base-RHOSE-4.1:skopeo-debuginfo-1:0.1.32-5.git1715c90.el8.x86_64", "8Base-RHOSE-4.1:skopeo-debugsource-1:0.1.32-5.git1715c90.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-25T06:26:23+00:00", "details": "Before applying this update, ensure all previously released errata\nrelevant to your system have been applied.\n\nFor OpenShift Container Platform 4.1 see the following documentation, which\nwill be updated shortly for release 4.1.17, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.1/updating/updating-cluster-cli.html.", "product_ids": [ "7Server-RH7-RHOSE-4.1:ansible-service-broker-1:1.4.4-2.el7.src", "7Server-RH7-RHOSE-4.1:ansible-service-broker-1:1.4.4-2.el7.x86_64", "7Server-RH7-RHOSE-4.1:ansible-service-broker-container-scripts-1:1.4.4-2.el7.noarch", "7Server-RH7-RHOSE-4.1:ansible-service-broker-selinux-1:1.4.4-2.el7.noarch", "7Server-RH7-RHOSE-4.1:automation-broker-apb-role-1:1.4.4-2.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHBA-2019:2819" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-4.1:ansible-service-broker-1:1.4.4-2.el7.src", "7Server-RH7-RHOSE-4.1:ansible-service-broker-1:1.4.4-2.el7.x86_64", "7Server-RH7-RHOSE-4.1:ansible-service-broker-container-scripts-1:1.4.4-2.el7.noarch", "7Server-RH7-RHOSE-4.1:ansible-service-broker-selinux-1:1.4.4-2.el7.noarch", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.src", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-svcat-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64", "7Server-RH7-RHOSE-4.1:automation-broker-apb-role-1:1.4.4-2.el7.noarch", "7Server-RH7-RHOSE-4.1:openshift-0:4.1.17-201909170941.git.0.2447974.el7.src", "7Server-RH7-RHOSE-4.1:openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.noarch", "7Server-RH7-RHOSE-4.1:openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.src", "7Server-RH7-RHOSE-4.1:openshift-clients-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "8Base-RHOSE-4.1:containers-common-1:0.1.32-5.git1715c90.el8.x86_64", "8Base-RHOSE-4.1:openshift-0:4.1.17-201909170941.git.0.2447974.el8.src", "8Base-RHOSE-4.1:openshift-clients-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "8Base-RHOSE-4.1:openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "8Base-RHOSE-4.1:openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "8Base-RHOSE-4.1:podman-0:1.0.2-2.dev.git96ccc2e.el8.src", "8Base-RHOSE-4.1:podman-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "8Base-RHOSE-4.1:podman-debuginfo-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "8Base-RHOSE-4.1:podman-debugsource-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "8Base-RHOSE-4.1:podman-docker-0:1.0.2-2.dev.git96ccc2e.el8.noarch", "8Base-RHOSE-4.1:skopeo-1:0.1.32-5.git1715c90.el8.src", "8Base-RHOSE-4.1:skopeo-1:0.1.32-5.git1715c90.el8.x86_64", "8Base-RHOSE-4.1:skopeo-debuginfo-1:0.1.32-5.git1715c90.el8.x86_64", "8Base-RHOSE-4.1:skopeo-debugsource-1:0.1.32-5.git1715c90.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.src", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-svcat-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-0:4.1.17-201909170941.git.0.2447974.el7.src", "7Server-RH7-RHOSE-4.1:openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.noarch", "7Server-RH7-RHOSE-4.1:openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.src", "7Server-RH7-RHOSE-4.1:openshift-clients-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "8Base-RHOSE-4.1:containers-common-1:0.1.32-5.git1715c90.el8.x86_64", "8Base-RHOSE-4.1:openshift-0:4.1.17-201909170941.git.0.2447974.el8.src", "8Base-RHOSE-4.1:openshift-clients-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "8Base-RHOSE-4.1:openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "8Base-RHOSE-4.1:openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "8Base-RHOSE-4.1:podman-0:1.0.2-2.dev.git96ccc2e.el8.src", "8Base-RHOSE-4.1:podman-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "8Base-RHOSE-4.1:podman-debuginfo-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "8Base-RHOSE-4.1:podman-debugsource-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "8Base-RHOSE-4.1:podman-docker-0:1.0.2-2.dev.git96ccc2e.el8.noarch", "8Base-RHOSE-4.1:skopeo-1:0.1.32-5.git1715c90.el8.src", "8Base-RHOSE-4.1:skopeo-1:0.1.32-5.git1715c90.el8.x86_64", "8Base-RHOSE-4.1:skopeo-debuginfo-1:0.1.32-5.git1715c90.el8.x86_64", "8Base-RHOSE-4.1:skopeo-debugsource-1:0.1.32-5.git1715c90.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.1:ansible-service-broker-1:1.4.4-2.el7.src", "7Server-RH7-RHOSE-4.1:ansible-service-broker-1:1.4.4-2.el7.x86_64", "7Server-RH7-RHOSE-4.1:ansible-service-broker-container-scripts-1:1.4.4-2.el7.noarch", "7Server-RH7-RHOSE-4.1:ansible-service-broker-selinux-1:1.4.4-2.el7.noarch", "7Server-RH7-RHOSE-4.1:automation-broker-apb-role-1:1.4.4-2.el7.noarch" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.src", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-svcat-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-0:4.1.17-201909170941.git.0.2447974.el7.src", "7Server-RH7-RHOSE-4.1:openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.noarch", "7Server-RH7-RHOSE-4.1:openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.src", "7Server-RH7-RHOSE-4.1:openshift-clients-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "8Base-RHOSE-4.1:containers-common-1:0.1.32-5.git1715c90.el8.x86_64", "8Base-RHOSE-4.1:openshift-0:4.1.17-201909170941.git.0.2447974.el8.src", "8Base-RHOSE-4.1:openshift-clients-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "8Base-RHOSE-4.1:openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "8Base-RHOSE-4.1:openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "8Base-RHOSE-4.1:podman-0:1.0.2-2.dev.git96ccc2e.el8.src", "8Base-RHOSE-4.1:podman-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "8Base-RHOSE-4.1:podman-debuginfo-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "8Base-RHOSE-4.1:podman-debugsource-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "8Base-RHOSE-4.1:podman-docker-0:1.0.2-2.dev.git96ccc2e.el8.noarch", "8Base-RHOSE-4.1:skopeo-1:0.1.32-5.git1715c90.el8.src", "8Base-RHOSE-4.1:skopeo-1:0.1.32-5.git1715c90.el8.x86_64", "8Base-RHOSE-4.1:skopeo-debuginfo-1:0.1.32-5.git1715c90.el8.x86_64", "8Base-RHOSE-4.1:skopeo-debugsource-1:0.1.32-5.git1715c90.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-25T06:26:23+00:00", "details": "Before applying this update, ensure all previously released errata\nrelevant to your system have been applied.\n\nFor OpenShift Container Platform 4.1 see the following documentation, which\nwill be updated shortly for release 4.1.17, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.1/updating/updating-cluster-cli.html.", "product_ids": [ "7Server-RH7-RHOSE-4.1:ansible-service-broker-1:1.4.4-2.el7.src", "7Server-RH7-RHOSE-4.1:ansible-service-broker-1:1.4.4-2.el7.x86_64", "7Server-RH7-RHOSE-4.1:ansible-service-broker-container-scripts-1:1.4.4-2.el7.noarch", "7Server-RH7-RHOSE-4.1:ansible-service-broker-selinux-1:1.4.4-2.el7.noarch", "7Server-RH7-RHOSE-4.1:automation-broker-apb-role-1:1.4.4-2.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHBA-2019:2819" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-4.1:ansible-service-broker-1:1.4.4-2.el7.src", "7Server-RH7-RHOSE-4.1:ansible-service-broker-1:1.4.4-2.el7.x86_64", "7Server-RH7-RHOSE-4.1:ansible-service-broker-container-scripts-1:1.4.4-2.el7.noarch", "7Server-RH7-RHOSE-4.1:ansible-service-broker-selinux-1:1.4.4-2.el7.noarch", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.src", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-svcat-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64", "7Server-RH7-RHOSE-4.1:automation-broker-apb-role-1:1.4.4-2.el7.noarch", "7Server-RH7-RHOSE-4.1:openshift-0:4.1.17-201909170941.git.0.2447974.el7.src", "7Server-RH7-RHOSE-4.1:openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.noarch", "7Server-RH7-RHOSE-4.1:openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.src", "7Server-RH7-RHOSE-4.1:openshift-clients-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "8Base-RHOSE-4.1:containers-common-1:0.1.32-5.git1715c90.el8.x86_64", "8Base-RHOSE-4.1:openshift-0:4.1.17-201909170941.git.0.2447974.el8.src", "8Base-RHOSE-4.1:openshift-clients-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "8Base-RHOSE-4.1:openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "8Base-RHOSE-4.1:openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "8Base-RHOSE-4.1:podman-0:1.0.2-2.dev.git96ccc2e.el8.src", "8Base-RHOSE-4.1:podman-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "8Base-RHOSE-4.1:podman-debuginfo-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "8Base-RHOSE-4.1:podman-debugsource-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "8Base-RHOSE-4.1:podman-docker-0:1.0.2-2.dev.git96ccc2e.el8.noarch", "8Base-RHOSE-4.1:skopeo-1:0.1.32-5.git1715c90.el8.src", "8Base-RHOSE-4.1:skopeo-1:0.1.32-5.git1715c90.el8.x86_64", "8Base-RHOSE-4.1:skopeo-debuginfo-1:0.1.32-5.git1715c90.el8.x86_64", "8Base-RHOSE-4.1:skopeo-debugsource-1:0.1.32-5.git1715c90.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" } ] }
rhba-2019_2819
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Container Platform release 4.1.17 is now available with\nupdates to packages and images that fix several bugs.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the RPM packages for Red Hat\nOpenShift Container Platform 4.1.17. See the following advisory for the\ncontainer images for this release:\n\nhttps://access.redhat.com/errata/RHBA-2019:2820\n\nAll OpenShift Container Platform 4.1 users are advised to upgrade to these\nupdated packages and images.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHBA-2019:2819", "url": "https://access.redhat.com/errata/RHBA-2019:2819" }, { "category": "external", "summary": "1751890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751890" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhba-2019_2819.json" } ], "title": "Red Hat Bug Fix Advisory: OpenShift Container Platform 4.1.17 packages update", "tracking": { "current_release_date": "2024-11-13T22:07:08+00:00", "generator": { "date": "2024-11-13T22:07:08+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHBA-2019:2819", "initial_release_date": "2019-09-25T06:26:23+00:00", "revision_history": [ { "date": "2019-09-25T06:26:23+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-09-25T06:26:23+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-13T22:07:08+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.1", "product": { "name": "Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.1::el7" } } }, { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.1", "product": { "name": "Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.1::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64", "product": { "name": "atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64", "product_id": "atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.1.17-201909170941.git.1.9b9b46b.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "atomic-enterprise-service-catalog-svcat-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64", "product": { "name": "atomic-enterprise-service-catalog-svcat-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64", "product_id": "atomic-enterprise-service-catalog-svcat-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog-svcat@4.1.17-201909170941.git.1.9b9b46b.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openshift-clients-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "product": { "name": "openshift-clients-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "product_id": "openshift-clients-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "product": { "name": "openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "product_id": "openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.1.17-201909170941.git.0.2447974.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "product": { "name": "openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "product_id": "openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "ansible-service-broker-1:1.4.4-2.el7.x86_64", "product": { "name": "ansible-service-broker-1:1.4.4-2.el7.x86_64", "product_id": "ansible-service-broker-1:1.4.4-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openshift-clients-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "product": { "name": "openshift-clients-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "product_id": "openshift-clients-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "product": { "name": "openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "product_id": "openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.1.17-201909170941.git.0.2447974.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "product": { "name": "openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "product_id": "openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "podman-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "product": { "name": "podman-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "product_id": "podman-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "podman-debugsource-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "product": { "name": "podman-debugsource-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "product_id": "podman-debugsource-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "podman-debuginfo-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "product": { "name": "podman-debuginfo-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "product_id": "podman-debuginfo-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "containers-common-1:0.1.32-5.git1715c90.el8.x86_64", "product": { "name": "containers-common-1:0.1.32-5.git1715c90.el8.x86_64", "product_id": "containers-common-1:0.1.32-5.git1715c90.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-1:0.1.32-5.git1715c90.el8.x86_64", "product": { "name": "skopeo-1:0.1.32-5.git1715c90.el8.x86_64", "product_id": "skopeo-1:0.1.32-5.git1715c90.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debugsource-1:0.1.32-5.git1715c90.el8.x86_64", "product": { "name": "skopeo-debugsource-1:0.1.32-5.git1715c90.el8.x86_64", "product_id": "skopeo-debugsource-1:0.1.32-5.git1715c90.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debuginfo-1:0.1.32-5.git1715c90.el8.x86_64", "product": { "name": "skopeo-debuginfo-1:0.1.32-5.git1715c90.el8.x86_64", "product_id": "skopeo-debuginfo-1:0.1.32-5.git1715c90.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.src", "product": { "name": "atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.src", "product_id": "atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.1.17-201909170941.git.1.9b9b46b.el7?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "openshift-0:4.1.17-201909170941.git.0.2447974.el7.src", "product": { "name": "openshift-0:4.1.17-201909170941.git.0.2447974.el7.src", "product_id": "openshift-0:4.1.17-201909170941.git.0.2447974.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.src", "product": { "name": "openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.src", "product_id": "openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "ansible-service-broker-1:1.4.4-2.el7.src", "product": { "name": "ansible-service-broker-1:1.4.4-2.el7.src", "product_id": "ansible-service-broker-1:1.4.4-2.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "openshift-0:4.1.17-201909170941.git.0.2447974.el8.src", "product": { "name": "openshift-0:4.1.17-201909170941.git.0.2447974.el8.src", "product_id": "openshift-0:4.1.17-201909170941.git.0.2447974.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "podman-0:1.0.2-2.dev.git96ccc2e.el8.src", "product": { "name": "podman-0:1.0.2-2.dev.git96ccc2e.el8.src", "product_id": "podman-0:1.0.2-2.dev.git96ccc2e.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "skopeo-1:0.1.32-5.git1715c90.el8.src", "product": { "name": "skopeo-1:0.1.32-5.git1715c90.el8.src", "product_id": "skopeo-1:0.1.32-5.git1715c90.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.noarch", "product": { "name": "openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.noarch", "product_id": "openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } }, { "category": "product_version", "name": "ansible-service-broker-container-scripts-1:1.4.4-2.el7.noarch", "product": { "name": "ansible-service-broker-container-scripts-1:1.4.4-2.el7.noarch", "product_id": "ansible-service-broker-container-scripts-1:1.4.4-2.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "ansible-service-broker-selinux-1:1.4.4-2.el7.noarch", "product": { "name": "ansible-service-broker-selinux-1:1.4.4-2.el7.noarch", "product_id": "ansible-service-broker-selinux-1:1.4.4-2.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "automation-broker-apb-role-1:1.4.4-2.el7.noarch", "product": { "name": "automation-broker-apb-role-1:1.4.4-2.el7.noarch", "product_id": "automation-broker-apb-role-1:1.4.4-2.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "podman-docker-0:1.0.2-2.dev.git96ccc2e.el8.noarch", "product": { "name": "podman-docker-0:1.0.2-2.dev.git96ccc2e.el8.noarch", "product_id": "podman-docker-0:1.0.2-2.dev.git96ccc2e.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ansible-service-broker-1:1.4.4-2.el7.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:ansible-service-broker-1:1.4.4-2.el7.src" }, "product_reference": "ansible-service-broker-1:1.4.4-2.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-service-broker-1:1.4.4-2.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:ansible-service-broker-1:1.4.4-2.el7.x86_64" }, "product_reference": "ansible-service-broker-1:1.4.4-2.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-service-broker-container-scripts-1:1.4.4-2.el7.noarch as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:ansible-service-broker-container-scripts-1:1.4.4-2.el7.noarch" }, "product_reference": "ansible-service-broker-container-scripts-1:1.4.4-2.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-service-broker-selinux-1:1.4.4-2.el7.noarch as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:ansible-service-broker-selinux-1:1.4.4-2.el7.noarch" }, "product_reference": "ansible-service-broker-selinux-1:1.4.4-2.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.src" }, "product_reference": "atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64" }, "product_reference": "atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-svcat-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-svcat-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64" }, "product_reference": "atomic-enterprise-service-catalog-svcat-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "automation-broker-apb-role-1:1.4.4-2.el7.noarch as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:automation-broker-apb-role-1:1.4.4-2.el7.noarch" }, "product_reference": "automation-broker-apb-role-1:1.4.4-2.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-0:4.1.17-201909170941.git.0.2447974.el7.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-0:4.1.17-201909170941.git.0.2447974.el7.src" }, "product_reference": "openshift-0:4.1.17-201909170941.git.0.2447974.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.noarch as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.noarch" }, "product_reference": "openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.src" }, "product_reference": "openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.1.17-201909170941.git.0.2447974.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-clients-0:4.1.17-201909170941.git.0.2447974.el7.x86_64" }, "product_reference": "openshift-clients-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el7.x86_64" }, "product_reference": "openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el7.x86_64" }, "product_reference": "openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "containers-common-1:0.1.32-5.git1715c90.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:containers-common-1:0.1.32-5.git1715c90.el8.x86_64" }, "product_reference": "containers-common-1:0.1.32-5.git1715c90.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-0:4.1.17-201909170941.git.0.2447974.el8.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:openshift-0:4.1.17-201909170941.git.0.2447974.el8.src" }, "product_reference": "openshift-0:4.1.17-201909170941.git.0.2447974.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.1.17-201909170941.git.0.2447974.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:openshift-clients-0:4.1.17-201909170941.git.0.2447974.el8.x86_64" }, "product_reference": "openshift-clients-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el8.x86_64" }, "product_reference": "openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el8.x86_64" }, "product_reference": "openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:1.0.2-2.dev.git96ccc2e.el8.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:podman-0:1.0.2-2.dev.git96ccc2e.el8.src" }, "product_reference": "podman-0:1.0.2-2.dev.git96ccc2e.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:1.0.2-2.dev.git96ccc2e.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:podman-0:1.0.2-2.dev.git96ccc2e.el8.x86_64" }, "product_reference": "podman-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-0:1.0.2-2.dev.git96ccc2e.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:podman-debuginfo-0:1.0.2-2.dev.git96ccc2e.el8.x86_64" }, "product_reference": "podman-debuginfo-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-0:1.0.2-2.dev.git96ccc2e.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:podman-debugsource-0:1.0.2-2.dev.git96ccc2e.el8.x86_64" }, "product_reference": "podman-debugsource-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "podman-docker-0:1.0.2-2.dev.git96ccc2e.el8.noarch as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:podman-docker-0:1.0.2-2.dev.git96ccc2e.el8.noarch" }, "product_reference": "podman-docker-0:1.0.2-2.dev.git96ccc2e.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:0.1.32-5.git1715c90.el8.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:skopeo-1:0.1.32-5.git1715c90.el8.src" }, "product_reference": "skopeo-1:0.1.32-5.git1715c90.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:0.1.32-5.git1715c90.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:skopeo-1:0.1.32-5.git1715c90.el8.x86_64" }, "product_reference": "skopeo-1:0.1.32-5.git1715c90.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-1:0.1.32-5.git1715c90.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:skopeo-debuginfo-1:0.1.32-5.git1715c90.el8.x86_64" }, "product_reference": "skopeo-debuginfo-1:0.1.32-5.git1715c90.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-1:0.1.32-5.git1715c90.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:skopeo-debugsource-1:0.1.32-5.git1715c90.el8.x86_64" }, "product_reference": "skopeo-debugsource-1:0.1.32-5.git1715c90.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.src", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-svcat-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-0:4.1.17-201909170941.git.0.2447974.el7.src", "7Server-RH7-RHOSE-4.1:openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.noarch", "7Server-RH7-RHOSE-4.1:openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.src", "7Server-RH7-RHOSE-4.1:openshift-clients-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "8Base-RHOSE-4.1:containers-common-1:0.1.32-5.git1715c90.el8.x86_64", "8Base-RHOSE-4.1:openshift-0:4.1.17-201909170941.git.0.2447974.el8.src", "8Base-RHOSE-4.1:openshift-clients-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "8Base-RHOSE-4.1:openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "8Base-RHOSE-4.1:openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "8Base-RHOSE-4.1:podman-0:1.0.2-2.dev.git96ccc2e.el8.src", "8Base-RHOSE-4.1:podman-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "8Base-RHOSE-4.1:podman-debuginfo-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "8Base-RHOSE-4.1:podman-debugsource-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "8Base-RHOSE-4.1:podman-docker-0:1.0.2-2.dev.git96ccc2e.el8.noarch", "8Base-RHOSE-4.1:skopeo-1:0.1.32-5.git1715c90.el8.src", "8Base-RHOSE-4.1:skopeo-1:0.1.32-5.git1715c90.el8.x86_64", "8Base-RHOSE-4.1:skopeo-debuginfo-1:0.1.32-5.git1715c90.el8.x86_64", "8Base-RHOSE-4.1:skopeo-debugsource-1:0.1.32-5.git1715c90.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.1:ansible-service-broker-1:1.4.4-2.el7.src", "7Server-RH7-RHOSE-4.1:ansible-service-broker-1:1.4.4-2.el7.x86_64", "7Server-RH7-RHOSE-4.1:ansible-service-broker-container-scripts-1:1.4.4-2.el7.noarch", "7Server-RH7-RHOSE-4.1:ansible-service-broker-selinux-1:1.4.4-2.el7.noarch", "7Server-RH7-RHOSE-4.1:automation-broker-apb-role-1:1.4.4-2.el7.noarch" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.src", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-svcat-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-0:4.1.17-201909170941.git.0.2447974.el7.src", "7Server-RH7-RHOSE-4.1:openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.noarch", "7Server-RH7-RHOSE-4.1:openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.src", "7Server-RH7-RHOSE-4.1:openshift-clients-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "8Base-RHOSE-4.1:containers-common-1:0.1.32-5.git1715c90.el8.x86_64", "8Base-RHOSE-4.1:openshift-0:4.1.17-201909170941.git.0.2447974.el8.src", "8Base-RHOSE-4.1:openshift-clients-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "8Base-RHOSE-4.1:openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "8Base-RHOSE-4.1:openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "8Base-RHOSE-4.1:podman-0:1.0.2-2.dev.git96ccc2e.el8.src", "8Base-RHOSE-4.1:podman-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "8Base-RHOSE-4.1:podman-debuginfo-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "8Base-RHOSE-4.1:podman-debugsource-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "8Base-RHOSE-4.1:podman-docker-0:1.0.2-2.dev.git96ccc2e.el8.noarch", "8Base-RHOSE-4.1:skopeo-1:0.1.32-5.git1715c90.el8.src", "8Base-RHOSE-4.1:skopeo-1:0.1.32-5.git1715c90.el8.x86_64", "8Base-RHOSE-4.1:skopeo-debuginfo-1:0.1.32-5.git1715c90.el8.x86_64", "8Base-RHOSE-4.1:skopeo-debugsource-1:0.1.32-5.git1715c90.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-25T06:26:23+00:00", "details": "Before applying this update, ensure all previously released errata\nrelevant to your system have been applied.\n\nFor OpenShift Container Platform 4.1 see the following documentation, which\nwill be updated shortly for release 4.1.17, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.1/updating/updating-cluster-cli.html.", "product_ids": [ "7Server-RH7-RHOSE-4.1:ansible-service-broker-1:1.4.4-2.el7.src", "7Server-RH7-RHOSE-4.1:ansible-service-broker-1:1.4.4-2.el7.x86_64", "7Server-RH7-RHOSE-4.1:ansible-service-broker-container-scripts-1:1.4.4-2.el7.noarch", "7Server-RH7-RHOSE-4.1:ansible-service-broker-selinux-1:1.4.4-2.el7.noarch", "7Server-RH7-RHOSE-4.1:automation-broker-apb-role-1:1.4.4-2.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHBA-2019:2819" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-4.1:ansible-service-broker-1:1.4.4-2.el7.src", "7Server-RH7-RHOSE-4.1:ansible-service-broker-1:1.4.4-2.el7.x86_64", "7Server-RH7-RHOSE-4.1:ansible-service-broker-container-scripts-1:1.4.4-2.el7.noarch", "7Server-RH7-RHOSE-4.1:ansible-service-broker-selinux-1:1.4.4-2.el7.noarch", "7Server-RH7-RHOSE-4.1:automation-broker-apb-role-1:1.4.4-2.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.src", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-svcat-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-0:4.1.17-201909170941.git.0.2447974.el7.src", "7Server-RH7-RHOSE-4.1:openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.noarch", "7Server-RH7-RHOSE-4.1:openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.src", "7Server-RH7-RHOSE-4.1:openshift-clients-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "8Base-RHOSE-4.1:containers-common-1:0.1.32-5.git1715c90.el8.x86_64", "8Base-RHOSE-4.1:openshift-0:4.1.17-201909170941.git.0.2447974.el8.src", "8Base-RHOSE-4.1:openshift-clients-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "8Base-RHOSE-4.1:openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "8Base-RHOSE-4.1:openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "8Base-RHOSE-4.1:podman-0:1.0.2-2.dev.git96ccc2e.el8.src", "8Base-RHOSE-4.1:podman-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "8Base-RHOSE-4.1:podman-debuginfo-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "8Base-RHOSE-4.1:podman-debugsource-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "8Base-RHOSE-4.1:podman-docker-0:1.0.2-2.dev.git96ccc2e.el8.noarch", "8Base-RHOSE-4.1:skopeo-1:0.1.32-5.git1715c90.el8.src", "8Base-RHOSE-4.1:skopeo-1:0.1.32-5.git1715c90.el8.x86_64", "8Base-RHOSE-4.1:skopeo-debuginfo-1:0.1.32-5.git1715c90.el8.x86_64", "8Base-RHOSE-4.1:skopeo-debugsource-1:0.1.32-5.git1715c90.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.1:ansible-service-broker-1:1.4.4-2.el7.src", "7Server-RH7-RHOSE-4.1:ansible-service-broker-1:1.4.4-2.el7.x86_64", "7Server-RH7-RHOSE-4.1:ansible-service-broker-container-scripts-1:1.4.4-2.el7.noarch", "7Server-RH7-RHOSE-4.1:ansible-service-broker-selinux-1:1.4.4-2.el7.noarch", "7Server-RH7-RHOSE-4.1:automation-broker-apb-role-1:1.4.4-2.el7.noarch" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.src", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-svcat-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-0:4.1.17-201909170941.git.0.2447974.el7.src", "7Server-RH7-RHOSE-4.1:openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.noarch", "7Server-RH7-RHOSE-4.1:openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.src", "7Server-RH7-RHOSE-4.1:openshift-clients-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "8Base-RHOSE-4.1:containers-common-1:0.1.32-5.git1715c90.el8.x86_64", "8Base-RHOSE-4.1:openshift-0:4.1.17-201909170941.git.0.2447974.el8.src", "8Base-RHOSE-4.1:openshift-clients-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "8Base-RHOSE-4.1:openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "8Base-RHOSE-4.1:openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "8Base-RHOSE-4.1:podman-0:1.0.2-2.dev.git96ccc2e.el8.src", "8Base-RHOSE-4.1:podman-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "8Base-RHOSE-4.1:podman-debuginfo-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "8Base-RHOSE-4.1:podman-debugsource-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "8Base-RHOSE-4.1:podman-docker-0:1.0.2-2.dev.git96ccc2e.el8.noarch", "8Base-RHOSE-4.1:skopeo-1:0.1.32-5.git1715c90.el8.src", "8Base-RHOSE-4.1:skopeo-1:0.1.32-5.git1715c90.el8.x86_64", "8Base-RHOSE-4.1:skopeo-debuginfo-1:0.1.32-5.git1715c90.el8.x86_64", "8Base-RHOSE-4.1:skopeo-debugsource-1:0.1.32-5.git1715c90.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-25T06:26:23+00:00", "details": "Before applying this update, ensure all previously released errata\nrelevant to your system have been applied.\n\nFor OpenShift Container Platform 4.1 see the following documentation, which\nwill be updated shortly for release 4.1.17, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.1/updating/updating-cluster-cli.html.", "product_ids": [ "7Server-RH7-RHOSE-4.1:ansible-service-broker-1:1.4.4-2.el7.src", "7Server-RH7-RHOSE-4.1:ansible-service-broker-1:1.4.4-2.el7.x86_64", "7Server-RH7-RHOSE-4.1:ansible-service-broker-container-scripts-1:1.4.4-2.el7.noarch", "7Server-RH7-RHOSE-4.1:ansible-service-broker-selinux-1:1.4.4-2.el7.noarch", "7Server-RH7-RHOSE-4.1:automation-broker-apb-role-1:1.4.4-2.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHBA-2019:2819" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-4.1:ansible-service-broker-1:1.4.4-2.el7.src", "7Server-RH7-RHOSE-4.1:ansible-service-broker-1:1.4.4-2.el7.x86_64", "7Server-RH7-RHOSE-4.1:ansible-service-broker-container-scripts-1:1.4.4-2.el7.noarch", "7Server-RH7-RHOSE-4.1:ansible-service-broker-selinux-1:1.4.4-2.el7.noarch", "7Server-RH7-RHOSE-4.1:automation-broker-apb-role-1:1.4.4-2.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" } ] }
rhba-2019:3139
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Container Platform release 3.11.153 is now available with\nupdates to packages and images that fix several bugs and add enhancements.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the RPM packages for Red Hat OpenShift Container\nPlatform 3.11.153. See the following advisory for the container images for\nthis release:\n\nhttps://access.redhat.com/errata/RHBA-2019:3138\n\nThis release fixes the following bugs:\n\n* NSX role templates referenced module output based on previous data structure. Templates were not properly populated. With this bug fix, the templates were updated to use the updated data structure and the templates are now generated with clusterIP as expected. (BZ#1753890)\n\nAll OpenShift Container Platform 3.11 users are advised to upgrade to these\nupdated packages and images.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHBA-2019:3139", "url": "https://access.redhat.com/errata/RHBA-2019:3139" }, { "category": "external", "summary": "1645725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1645725" }, { "category": "external", "summary": "1651583", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1651583" }, { "category": "external", "summary": "1678100", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1678100" }, { "category": "external", "summary": "1720174", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1720174" }, { "category": "external", "summary": "1723924", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1723924" }, { "category": "external", "summary": "1734385", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1734385" }, { "category": "external", "summary": "1741679", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741679" }, { "category": "external", "summary": "1747305", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1747305" }, { "category": "external", "summary": "1751125", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751125" }, { "category": "external", "summary": "1751975", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751975" }, { "category": "external", "summary": "1752532", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752532" }, { "category": "external", "summary": "1753890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753890" }, { "category": "external", "summary": "1754788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1754788" }, { "category": "external", "summary": "1754968", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1754968" }, { "category": "external", "summary": "1758156", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758156" }, { "category": "external", "summary": "1758235", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758235" }, { "category": "external", "summary": "1758267", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758267" }, { "category": "external", "summary": "1759344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759344" }, { "category": "external", "summary": "1759837", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759837" }, { "category": "external", "summary": "1760166", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760166" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhba-2019_3139.json" } ], "title": "Red Hat Bug Fix Advisory: OpenShift Container Platform 3.11 bug fix and enhancement update", "tracking": { "current_release_date": "2025-03-15T19:44:23+00:00", "generator": { "date": "2025-03-15T19:44:23+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.1" } }, "id": "RHBA-2019:3139", "initial_release_date": "2019-10-18T02:02:14+00:00", "revision_history": [ { "date": "2019-10-18T02:02:14+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-10-18T02:02:14+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-03-15T19:44:23+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 3.11", "product": { "name": "Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:3.11::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "apb-0:1.9.8-1.el7.ppc64le", "product": { "name": "apb-0:1.9.8-1.el7.ppc64le", "product_id": "apb-0:1.9.8-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le", "product": { "name": "cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le", "product_id": "cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le", "product": { "name": "cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le", "product_id": "cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.ppc64le", "product": { "name": "openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.ppc64le", "product_id": "openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.ppc64le", "product": { "name": "atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.ppc64le", "product_id": "atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.ppc64le", "product": { "name": "atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.ppc64le", "product_id": "atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog-svcat@3.11.153-1.git.1.e227636.el7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product": { "name": "atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product_id": "atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product": { "name": "atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product_id": "atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product": { "name": "atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product_id": "atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product": { "name": "atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product_id": "atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product": { "name": "atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product_id": "atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product": { "name": "atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product_id": "atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product": { "name": "atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product_id": "atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product": { "name": "atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product_id": "atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product": { "name": "atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product_id": "atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-template-service-broker@3.11.153-1.git.0.aaf3f71.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product": { "name": "atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product_id": "atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.ppc64le", "product": { "name": "atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.ppc64le", "product_id": "atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.ppc64le", "product": { "name": "atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.ppc64le", "product_id": "atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.ppc64le", "product": { "name": "atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.ppc64le", "product_id": "atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.ppc64le", "product": { "name": "atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.ppc64le", "product_id": "atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.ppc64le", "product": { "name": "atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.ppc64le", "product_id": "atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-node-problem-detector@3.11.153-1.git.1.7fbf681.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.ppc64le", "product": { "name": "atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.ppc64le", "product_id": "atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.ppc64le", "product": { "name": "atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.ppc64le", "product_id": "atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.ppc64le", "product": { "name": "golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.ppc64le", "product_id": "golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.ppc64le", "product": { "name": "prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.ppc64le", "product_id": "prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.ppc64le", "product": { "name": "prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.ppc64le", "product_id": "prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "prometheus-0:3.11.153-1.git.1.7a486a2.el7.ppc64le", "product": { "name": "prometheus-0:3.11.153-1.git.1.7a486a2.el7.ppc64le", "product_id": "prometheus-0:3.11.153-1.git.1.7a486a2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.ppc64le", "product": { "name": "openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.ppc64le", "product_id": "openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.ppc64le", "product": { "name": "openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.ppc64le", "product_id": "openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-enterprise-cluster-capacity@3.11.153-1.git.1.5f83714.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "apb-0:1.9.8-1.el7.x86_64", "product": { "name": "apb-0:1.9.8-1.el7.x86_64", "product_id": "apb-0:1.9.8-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64", "product": { "name": "cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64", "product_id": "cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64", "product": { "name": "cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64", "product_id": "cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.x86_64", "product": { "name": "openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.x86_64", "product_id": "openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.x86_64", "product": { "name": "atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.x86_64", "product_id": "atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.x86_64", "product": { "name": "atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.x86_64", "product_id": "atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog-svcat@3.11.153-1.git.1.e227636.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product": { "name": "atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_id": "atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product": { "name": "atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_id": "atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-clients-redistributable-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product": { "name": "atomic-openshift-clients-redistributable-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_id": "atomic-openshift-clients-redistributable-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-clients-redistributable@3.11.153-1.git.0.aaf3f71.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product": { "name": "atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_id": "atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product": { "name": "atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_id": "atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product": { "name": "atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_id": "atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product": { "name": "atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_id": "atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product": { "name": "atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_id": "atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product": { "name": "atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_id": "atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product": { "name": "atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_id": "atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-template-service-broker@3.11.153-1.git.0.aaf3f71.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product": { "name": "atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_id": "atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.x86_64", "product": { "name": "atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.x86_64", "product_id": "atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.x86_64", "product": { "name": "atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.x86_64", "product_id": "atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.x86_64", "product": { "name": "atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.x86_64", "product_id": "atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.x86_64", "product": { "name": "atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.x86_64", "product_id": "atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.x86_64", "product": { "name": "atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.x86_64", "product_id": "atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-node-problem-detector@3.11.153-1.git.1.7fbf681.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.x86_64", "product": { "name": "atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.x86_64", "product_id": "atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.x86_64", "product": { "name": "atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.x86_64", "product_id": "atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.x86_64", "product": { "name": "golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.x86_64", "product_id": "golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.x86_64", "product": { "name": "prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.x86_64", "product_id": "prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.x86_64", "product": { "name": "prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.x86_64", "product_id": "prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "prometheus-0:3.11.153-1.git.1.7a486a2.el7.x86_64", "product": { "name": "prometheus-0:3.11.153-1.git.1.7a486a2.el7.x86_64", "product_id": "prometheus-0:3.11.153-1.git.1.7a486a2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.x86_64", "product": { "name": "openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.x86_64", "product_id": "openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.x86_64", "product": { "name": "openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.x86_64", "product_id": "openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-enterprise-cluster-capacity@3.11.153-1.git.1.5f83714.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "apb-0:1.9.8-1.el7.src", "product": { "name": "apb-0:1.9.8-1.el7.src", "product_id": "apb-0:1.9.8-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.src", "product": { "name": "cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.src", "product_id": "cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "jenkins-2-plugins-0:3.11.1568994366-1.el7.src", "product": { "name": "jenkins-2-plugins-0:3.11.1568994366-1.el7.src", "product_id": "jenkins-2-plugins-0:3.11.1568994366-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "jenkins-0:2.176.3.1569349414-1.el7.src", "product": { "name": "jenkins-0:2.176.3.1569349414-1.el7.src", "product_id": "jenkins-0:2.176.3.1569349414-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.src", "product": { "name": "openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.src", "product_id": "openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "mediawiki-0:1.27.7-1.el7.src", "product": { "name": "mediawiki-0:1.27.7-1.el7.src", "product_id": "mediawiki-0:1.27.7-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.src", "product": { "name": "atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.src", "product_id": "atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.src", "product": { "name": "atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.src", "product_id": "atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.src", "product": { "name": "atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.src", "product_id": "atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.src", "product": { "name": "atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.src", "product_id": "atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.src", "product": { "name": "atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.src", "product_id": "atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.src", "product": { "name": "atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.src", "product_id": "atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.src", "product": { "name": "atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.src", "product_id": "atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-node-problem-detector@3.11.153-1.git.1.7fbf681.el7?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.src", "product": { "name": "atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.src", "product_id": "atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.src", "product": { "name": "atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.src", "product_id": "atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.src", "product": { "name": "golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.src", "product_id": "golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "golang-github-prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.src", "product": { "name": "golang-github-prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.src", "product_id": "golang-github-prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-prometheus-alertmanager@3.11.153-1.git.1.2768abd.el7?arch=src" } } }, { "category": "product_version", "name": "golang-github-prometheus-node_exporter-0:3.11.153-1.git.1.0e8ef36.el7.src", "product": { "name": "golang-github-prometheus-node_exporter-0:3.11.153-1.git.1.0e8ef36.el7.src", "product_id": "golang-github-prometheus-node_exporter-0:3.11.153-1.git.1.0e8ef36.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-prometheus-node_exporter@3.11.153-1.git.1.0e8ef36.el7?arch=src" } } }, { "category": "product_version", "name": "golang-github-prometheus-prometheus-0:3.11.153-1.git.1.7a486a2.el7.src", "product": { "name": "golang-github-prometheus-prometheus-0:3.11.153-1.git.1.7a486a2.el7.src", "product_id": "golang-github-prometheus-prometheus-0:3.11.153-1.git.1.7a486a2.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.src", "product": { "name": "openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.src", "product_id": "openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.src", "product": { "name": "openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.src", "product_id": "openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-enterprise-cluster-capacity@3.11.153-1.git.1.5f83714.el7?arch=src" } } }, { "category": "product_version", "name": "openshift-kuryr-0:3.11.153-1.git.1.073ef06.el7.src", "product": { "name": "openshift-kuryr-0:3.11.153-1.git.1.073ef06.el7.src", "product_id": "openshift-kuryr-0:3.11.153-1.git.1.073ef06.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.src", "product": { "name": "openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.src", "product_id": "openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "apb-container-scripts-0:1.9.8-1.el7.noarch", "product": { "name": "apb-container-scripts-0:1.9.8-1.el7.noarch", "product_id": "apb-container-scripts-0:1.9.8-1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } }, { "category": "product_version", "name": "apb-devel-0:1.9.8-1.el7.noarch", "product": { "name": "apb-devel-0:1.9.8-1.el7.noarch", "product_id": "apb-devel-0:1.9.8-1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } }, { "category": "product_version", "name": "jenkins-2-plugins-0:3.11.1568994366-1.el7.noarch", "product": { "name": "jenkins-2-plugins-0:3.11.1568994366-1.el7.noarch", "product_id": "jenkins-2-plugins-0:3.11.1568994366-1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } }, { "category": "product_version", "name": "jenkins-0:2.176.3.1569349414-1.el7.noarch", "product": { "name": "jenkins-0:2.176.3.1569349414-1.el7.noarch", "product_id": "jenkins-0:2.176.3.1569349414-1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } }, { "category": "product_version", "name": "mediawiki-0:1.27.7-1.el7.noarch", "product": { "name": "mediawiki-0:1.27.7-1.el7.noarch", "product_id": "mediawiki-0:1.27.7-1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } }, { "category": "product_version", "name": "mediawiki-doc-0:1.27.7-1.el7.noarch", "product": { "name": "mediawiki-doc-0:1.27.7-1.el7.noarch", "product_id": "mediawiki-doc-0:1.27.7-1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } }, { "category": "product_version", "name": "atomic-openshift-docker-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch", "product": { "name": "atomic-openshift-docker-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch", "product_id": "atomic-openshift-docker-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } }, { "category": "product_version", "name": "atomic-openshift-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch", "product": { "name": "atomic-openshift-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch", "product_id": "atomic-openshift-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } }, { "category": "product_version", "name": "openshift-kuryr-cni-0:3.11.153-1.git.1.073ef06.el7.noarch", "product": { "name": "openshift-kuryr-cni-0:3.11.153-1.git.1.073ef06.el7.noarch", "product_id": "openshift-kuryr-cni-0:3.11.153-1.git.1.073ef06.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } }, { "category": "product_version", "name": "openshift-kuryr-common-0:3.11.153-1.git.1.073ef06.el7.noarch", "product": { "name": "openshift-kuryr-common-0:3.11.153-1.git.1.073ef06.el7.noarch", "product_id": "openshift-kuryr-common-0:3.11.153-1.git.1.073ef06.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } }, { "category": "product_version", "name": "openshift-kuryr-controller-0:3.11.153-1.git.1.073ef06.el7.noarch", "product": { "name": "openshift-kuryr-controller-0:3.11.153-1.git.1.073ef06.el7.noarch", "product_id": "openshift-kuryr-controller-0:3.11.153-1.git.1.073ef06.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } }, { "category": "product_version", "name": "python2-kuryr-kubernetes-0:3.11.153-1.git.1.073ef06.el7.noarch", "product": { "name": "python2-kuryr-kubernetes-0:3.11.153-1.git.1.073ef06.el7.noarch", "product_id": "python2-kuryr-kubernetes-0:3.11.153-1.git.1.073ef06.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } }, { "category": "product_version", "name": "openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.noarch", "product": { "name": "openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.noarch", "product_id": "openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } }, { "category": "product_version", "name": "openshift-ansible-docs-0:3.11.153-2.git.0.ee699b5.el7.noarch", "product": { "name": "openshift-ansible-docs-0:3.11.153-2.git.0.ee699b5.el7.noarch", "product_id": "openshift-ansible-docs-0:3.11.153-2.git.0.ee699b5.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } }, { "category": "product_version", "name": "openshift-ansible-playbooks-0:3.11.153-2.git.0.ee699b5.el7.noarch", "product": { "name": "openshift-ansible-playbooks-0:3.11.153-2.git.0.ee699b5.el7.noarch", "product_id": "openshift-ansible-playbooks-0:3.11.153-2.git.0.ee699b5.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } }, { "category": "product_version", "name": "openshift-ansible-roles-0:3.11.153-2.git.0.ee699b5.el7.noarch", "product": { "name": "openshift-ansible-roles-0:3.11.153-2.git.0.ee699b5.el7.noarch", "product_id": "openshift-ansible-roles-0:3.11.153-2.git.0.ee699b5.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } }, { "category": "product_version", "name": "openshift-ansible-test-0:3.11.153-2.git.0.ee699b5.el7.noarch", "product": { "name": "openshift-ansible-test-0:3.11.153-2.git.0.ee699b5.el7.noarch", "product_id": "openshift-ansible-test-0:3.11.153-2.git.0.ee699b5.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "apb-0:1.9.8-1.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.ppc64le" }, "product_reference": "apb-0:1.9.8-1.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "apb-0:1.9.8-1.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.src" }, "product_reference": "apb-0:1.9.8-1.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "apb-0:1.9.8-1.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.x86_64" }, "product_reference": "apb-0:1.9.8-1.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "apb-container-scripts-0:1.9.8-1.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:apb-container-scripts-0:1.9.8-1.el7.noarch" }, "product_reference": "apb-container-scripts-0:1.9.8-1.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "apb-devel-0:1.9.8-1.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:apb-devel-0:1.9.8-1.el7.noarch" }, "product_reference": "apb-devel-0:1.9.8-1.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.ppc64le" }, "product_reference": "atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.src" }, "product_reference": "atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.x86_64" }, "product_reference": "atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.ppc64le" }, "product_reference": "atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.x86_64" }, "product_reference": "atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le" }, "product_reference": "atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.src" }, "product_reference": "atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64" }, "product_reference": "atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le" }, "product_reference": "atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.x86_64" }, "product_reference": "atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-clients-redistributable-0:3.11.153-1.git.0.aaf3f71.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-redistributable-0:3.11.153-1.git.0.aaf3f71.el7.x86_64" }, "product_reference": "atomic-openshift-clients-redistributable-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.ppc64le" }, "product_reference": "atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.src" }, "product_reference": "atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.x86_64" }, "product_reference": "atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.ppc64le" }, "product_reference": "atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.src" }, "product_reference": "atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.x86_64" }, "product_reference": "atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-docker-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-docker-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch" }, "product_reference": "atomic-openshift-docker-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.ppc64le" }, "product_reference": "atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.src" }, "product_reference": "atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.x86_64" }, "product_reference": "atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch" }, "product_reference": "atomic-openshift-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le" }, "product_reference": "atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.x86_64" }, "product_reference": "atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le" }, "product_reference": "atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64" }, "product_reference": "atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le" }, "product_reference": "atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.x86_64" }, "product_reference": "atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.ppc64le" }, "product_reference": "atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.src" }, "product_reference": "atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.x86_64" }, "product_reference": "atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le" }, "product_reference": "atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.x86_64" }, "product_reference": "atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.ppc64le" }, "product_reference": "atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.src" }, "product_reference": "atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.x86_64" }, "product_reference": "atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le" }, "product_reference": "atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.x86_64" }, "product_reference": "atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le" }, "product_reference": "atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.x86_64" }, "product_reference": "atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.ppc64le" }, "product_reference": "atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.src" }, "product_reference": "atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.x86_64" }, "product_reference": "atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le" }, "product_reference": "atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.x86_64" }, "product_reference": "atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le" }, "product_reference": "atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.x86_64" }, "product_reference": "atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.ppc64le" }, "product_reference": "atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.src" }, "product_reference": "atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.x86_64" }, "product_reference": "atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le" }, "product_reference": "cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.src" }, "product_reference": "cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64" }, "product_reference": "cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le" }, "product_reference": "cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64" }, "product_reference": "cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.ppc64le" }, "product_reference": "golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.src" }, "product_reference": "golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.x86_64" }, "product_reference": "golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.src" }, "product_reference": "golang-github-prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-node_exporter-0:3.11.153-1.git.1.0e8ef36.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.153-1.git.1.0e8ef36.el7.src" }, "product_reference": "golang-github-prometheus-node_exporter-0:3.11.153-1.git.1.0e8ef36.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-prometheus-0:3.11.153-1.git.1.7a486a2.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.153-1.git.1.7a486a2.el7.src" }, "product_reference": "golang-github-prometheus-prometheus-0:3.11.153-1.git.1.7a486a2.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "jenkins-0:2.176.3.1569349414-1.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:jenkins-0:2.176.3.1569349414-1.el7.noarch" }, "product_reference": "jenkins-0:2.176.3.1569349414-1.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "jenkins-0:2.176.3.1569349414-1.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:jenkins-0:2.176.3.1569349414-1.el7.src" }, "product_reference": "jenkins-0:2.176.3.1569349414-1.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "jenkins-2-plugins-0:3.11.1568994366-1.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1568994366-1.el7.noarch" }, "product_reference": "jenkins-2-plugins-0:3.11.1568994366-1.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "jenkins-2-plugins-0:3.11.1568994366-1.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1568994366-1.el7.src" }, "product_reference": "jenkins-2-plugins-0:3.11.1568994366-1.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "mediawiki-0:1.27.7-1.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.noarch" }, "product_reference": "mediawiki-0:1.27.7-1.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "mediawiki-0:1.27.7-1.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.src" }, "product_reference": "mediawiki-0:1.27.7-1.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "mediawiki-doc-0:1.27.7-1.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:mediawiki-doc-0:1.27.7-1.el7.noarch" }, "product_reference": "mediawiki-doc-0:1.27.7-1.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.noarch" }, "product_reference": "openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.src" }, "product_reference": "openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-docs-0:3.11.153-2.git.0.ee699b5.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-ansible-docs-0:3.11.153-2.git.0.ee699b5.el7.noarch" }, "product_reference": "openshift-ansible-docs-0:3.11.153-2.git.0.ee699b5.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-playbooks-0:3.11.153-2.git.0.ee699b5.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-ansible-playbooks-0:3.11.153-2.git.0.ee699b5.el7.noarch" }, "product_reference": "openshift-ansible-playbooks-0:3.11.153-2.git.0.ee699b5.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-roles-0:3.11.153-2.git.0.ee699b5.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-ansible-roles-0:3.11.153-2.git.0.ee699b5.el7.noarch" }, "product_reference": "openshift-ansible-roles-0:3.11.153-2.git.0.ee699b5.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-test-0:3.11.153-2.git.0.ee699b5.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-ansible-test-0:3.11.153-2.git.0.ee699b5.el7.noarch" }, "product_reference": "openshift-ansible-test-0:3.11.153-2.git.0.ee699b5.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.ppc64le" }, "product_reference": "openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.src" }, "product_reference": "openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.x86_64" }, "product_reference": "openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.ppc64le" }, "product_reference": "openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.src" }, "product_reference": "openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.x86_64" }, "product_reference": "openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-0:3.11.153-1.git.1.073ef06.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-kuryr-0:3.11.153-1.git.1.073ef06.el7.src" }, "product_reference": "openshift-kuryr-0:3.11.153-1.git.1.073ef06.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-cni-0:3.11.153-1.git.1.073ef06.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-kuryr-cni-0:3.11.153-1.git.1.073ef06.el7.noarch" }, "product_reference": "openshift-kuryr-cni-0:3.11.153-1.git.1.073ef06.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-common-0:3.11.153-1.git.1.073ef06.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-kuryr-common-0:3.11.153-1.git.1.073ef06.el7.noarch" }, "product_reference": "openshift-kuryr-common-0:3.11.153-1.git.1.073ef06.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-controller-0:3.11.153-1.git.1.073ef06.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-kuryr-controller-0:3.11.153-1.git.1.073ef06.el7.noarch" }, "product_reference": "openshift-kuryr-controller-0:3.11.153-1.git.1.073ef06.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.ppc64le" }, "product_reference": "openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.src" }, "product_reference": "openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.x86_64" }, "product_reference": "openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-0:3.11.153-1.git.1.7a486a2.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.153-1.git.1.7a486a2.el7.ppc64le" }, "product_reference": "prometheus-0:3.11.153-1.git.1.7a486a2.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-0:3.11.153-1.git.1.7a486a2.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.153-1.git.1.7a486a2.el7.x86_64" }, "product_reference": "prometheus-0:3.11.153-1.git.1.7a486a2.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.ppc64le" }, "product_reference": "prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.x86_64" }, "product_reference": "prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.ppc64le" }, "product_reference": "prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.x86_64" }, "product_reference": "prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "python2-kuryr-kubernetes-0:3.11.153-1.git.1.073ef06.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:python2-kuryr-kubernetes-0:3.11.153-1.git.1.073ef06.el7.noarch" }, "product_reference": "python2-kuryr-kubernetes-0:3.11.153-1.git.1.073ef06.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.153-1.git.1.0e8ef36.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.153-1.git.1.7a486a2.el7.src", "7Server-RH7-RHOSE-3.11:jenkins-0:2.176.3.1569349414-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-0:2.176.3.1569349414-1.el7.src", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1568994366-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1568994366-1.el7.src", "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.src", "7Server-RH7-RHOSE-3.11:mediawiki-doc-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-docs-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-playbooks-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-roles-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-test-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-kuryr-0:3.11.153-1.git.1.073ef06.el7.src", "7Server-RH7-RHOSE-3.11:openshift-kuryr-cni-0:3.11.153-1.git.1.073ef06.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-common-0:3.11.153-1.git.1.073ef06.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-controller-0:3.11.153-1.git.1.073ef06.el7.noarch", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.153-1.git.1.7a486a2.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.153-1.git.1.7a486a2.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.x86_64", "7Server-RH7-RHOSE-3.11:python2-kuryr-kubernetes-0:3.11.153-1.git.1.073ef06.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.src", "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:apb-container-scripts-0:1.9.8-1.el7.noarch", "7Server-RH7-RHOSE-3.11:apb-devel-0:1.9.8-1.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-redistributable-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-docker-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.src", "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.src", "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.153-1.git.1.0e8ef36.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.153-1.git.1.7a486a2.el7.src", "7Server-RH7-RHOSE-3.11:jenkins-0:2.176.3.1569349414-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-0:2.176.3.1569349414-1.el7.src", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1568994366-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1568994366-1.el7.src", "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.src", "7Server-RH7-RHOSE-3.11:mediawiki-doc-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-docs-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-playbooks-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-roles-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-test-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-kuryr-0:3.11.153-1.git.1.073ef06.el7.src", "7Server-RH7-RHOSE-3.11:openshift-kuryr-cni-0:3.11.153-1.git.1.073ef06.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-common-0:3.11.153-1.git.1.073ef06.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-controller-0:3.11.153-1.git.1.073ef06.el7.noarch", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.153-1.git.1.7a486a2.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.153-1.git.1.7a486a2.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.x86_64", "7Server-RH7-RHOSE-3.11:python2-kuryr-kubernetes-0:3.11.153-1.git.1.073ef06.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-18T02:02:14+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system is applied.\n\nSee the following documentation, which will be updated shortly for release 3.11.153, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_release_notes.html\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at https://access.redhat.com/articles/11258.", "product_ids": [ "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.src", "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:apb-container-scripts-0:1.9.8-1.el7.noarch", "7Server-RH7-RHOSE-3.11:apb-devel-0:1.9.8-1.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-redistributable-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-docker-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.src", "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.src", "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHBA-2019:3139" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.src", "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:apb-container-scripts-0:1.9.8-1.el7.noarch", "7Server-RH7-RHOSE-3.11:apb-devel-0:1.9.8-1.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-redistributable-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-docker-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.src", "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.153-1.git.1.0e8ef36.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.153-1.git.1.7a486a2.el7.src", "7Server-RH7-RHOSE-3.11:jenkins-0:2.176.3.1569349414-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-0:2.176.3.1569349414-1.el7.src", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1568994366-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1568994366-1.el7.src", "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.src", "7Server-RH7-RHOSE-3.11:mediawiki-doc-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-docs-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-playbooks-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-roles-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-test-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-kuryr-0:3.11.153-1.git.1.073ef06.el7.src", "7Server-RH7-RHOSE-3.11:openshift-kuryr-cni-0:3.11.153-1.git.1.073ef06.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-common-0:3.11.153-1.git.1.073ef06.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-controller-0:3.11.153-1.git.1.073ef06.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.src", "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.153-1.git.1.7a486a2.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.153-1.git.1.7a486a2.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.x86_64", "7Server-RH7-RHOSE-3.11:python2-kuryr-kubernetes-0:3.11.153-1.git.1.073ef06.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.153-1.git.1.0e8ef36.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.153-1.git.1.7a486a2.el7.src", "7Server-RH7-RHOSE-3.11:jenkins-0:2.176.3.1569349414-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-0:2.176.3.1569349414-1.el7.src", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1568994366-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1568994366-1.el7.src", "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.src", "7Server-RH7-RHOSE-3.11:mediawiki-doc-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-docs-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-playbooks-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-roles-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-test-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-kuryr-0:3.11.153-1.git.1.073ef06.el7.src", "7Server-RH7-RHOSE-3.11:openshift-kuryr-cni-0:3.11.153-1.git.1.073ef06.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-common-0:3.11.153-1.git.1.073ef06.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-controller-0:3.11.153-1.git.1.073ef06.el7.noarch", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.153-1.git.1.7a486a2.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.153-1.git.1.7a486a2.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.x86_64", "7Server-RH7-RHOSE-3.11:python2-kuryr-kubernetes-0:3.11.153-1.git.1.073ef06.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.src", "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:apb-container-scripts-0:1.9.8-1.el7.noarch", "7Server-RH7-RHOSE-3.11:apb-devel-0:1.9.8-1.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-redistributable-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-docker-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.src", "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.src", "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.153-1.git.1.0e8ef36.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.153-1.git.1.7a486a2.el7.src", "7Server-RH7-RHOSE-3.11:jenkins-0:2.176.3.1569349414-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-0:2.176.3.1569349414-1.el7.src", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1568994366-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1568994366-1.el7.src", "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.src", "7Server-RH7-RHOSE-3.11:mediawiki-doc-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-docs-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-playbooks-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-roles-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-test-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-kuryr-0:3.11.153-1.git.1.073ef06.el7.src", "7Server-RH7-RHOSE-3.11:openshift-kuryr-cni-0:3.11.153-1.git.1.073ef06.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-common-0:3.11.153-1.git.1.073ef06.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-controller-0:3.11.153-1.git.1.073ef06.el7.noarch", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.153-1.git.1.7a486a2.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.153-1.git.1.7a486a2.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.x86_64", "7Server-RH7-RHOSE-3.11:python2-kuryr-kubernetes-0:3.11.153-1.git.1.073ef06.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-18T02:02:14+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system is applied.\n\nSee the following documentation, which will be updated shortly for release 3.11.153, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_release_notes.html\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at https://access.redhat.com/articles/11258.", "product_ids": [ "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.src", "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:apb-container-scripts-0:1.9.8-1.el7.noarch", "7Server-RH7-RHOSE-3.11:apb-devel-0:1.9.8-1.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-redistributable-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-docker-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.src", "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.src", "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHBA-2019:3139" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.src", "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:apb-container-scripts-0:1.9.8-1.el7.noarch", "7Server-RH7-RHOSE-3.11:apb-devel-0:1.9.8-1.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-redistributable-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-docker-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.src", "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.153-1.git.1.0e8ef36.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.153-1.git.1.7a486a2.el7.src", "7Server-RH7-RHOSE-3.11:jenkins-0:2.176.3.1569349414-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-0:2.176.3.1569349414-1.el7.src", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1568994366-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1568994366-1.el7.src", "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.src", "7Server-RH7-RHOSE-3.11:mediawiki-doc-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-docs-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-playbooks-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-roles-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-test-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-kuryr-0:3.11.153-1.git.1.073ef06.el7.src", "7Server-RH7-RHOSE-3.11:openshift-kuryr-cni-0:3.11.153-1.git.1.073ef06.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-common-0:3.11.153-1.git.1.073ef06.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-controller-0:3.11.153-1.git.1.073ef06.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.src", "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.153-1.git.1.7a486a2.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.153-1.git.1.7a486a2.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.x86_64", "7Server-RH7-RHOSE-3.11:python2-kuryr-kubernetes-0:3.11.153-1.git.1.073ef06.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" } ] }
RHSA-2019:4041
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "New Red Hat Single Sign-On 7.3.5 packages are now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Single Sign-On 7.3 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications.\n\nThis release of Red Hat Single Sign-On 7.3.5 on RHEL 7 serves as a replacement for Red Hat Single Sign-On 7.3.4, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* keycloak: Service accounts reset password flow not using placeholder.org domain anymore (CVE-2019-14837)\n\n* undertow: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* undertow: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* undertow: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default (CVE-2019-14838)\n\n* wildfly: wildfly-security-manager: security manager authorization bypass (CVE-2019-14843)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:4041", "url": "https://access.redhat.com/errata/RHSA-2019:4041" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.3/", "url": "https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.3/" }, { "category": "external", "summary": "1730227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1730227" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1751227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751227" }, { "category": "external", "summary": "1752980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752980" }, { "category": "external", "summary": "KEYCLOAK-11816", "url": "https://issues.redhat.com/browse/KEYCLOAK-11816" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_4041.json" } ], "title": "Red Hat Security Advisory: Red Hat Single Sign-On 7.3.5 security update on RHEL 7", "tracking": { "current_release_date": "2025-03-15T19:44:45+00:00", "generator": { "date": "2025-03-15T19:44:45+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.1" } }, "id": "RHSA-2019:4041", "initial_release_date": "2019-12-02T17:04:03+00:00", "revision_history": [ { "date": "2019-12-02T17:04:03+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-12-02T17:04:03+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-03-15T19:44:45+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Single Sign-On 7.3 for RHEL 7 Server", "product": { "name": "Red Hat Single Sign-On 7.3 for RHEL 7 Server", "product_id": "7Server-RHSSO-7.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:red_hat_single_sign_on:7::el7" } } } ], "category": "product_family", "name": "Red Hat Single Sign-On" }, { "branches": [ { "category": "product_version", "name": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "product": { "name": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "product_id": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7sso?arch=noarch" } } }, { "category": "product_version", "name": "rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "product": { "name": "rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "product_id": "rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7sso?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "product": { "name": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "product_id": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]_redhat_00001.1.el7sso?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch as a component of Red Hat Single Sign-On 7.3 for RHEL 7 Server", "product_id": "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" }, "product_reference": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "relates_to_product_reference": "7Server-RHSSO-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src as a component of Red Hat Single Sign-On 7.3 for RHEL 7 Server", "product_id": "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src" }, "product_reference": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "relates_to_product_reference": "7Server-RHSSO-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch as a component of Red Hat Single Sign-On 7.3 for RHEL 7 Server", "product_id": "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" }, "product_reference": "rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "relates_to_product_reference": "7Server-RHSSO-7.3" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:04:03+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4041" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:04:03+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4041" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:04:03+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4041" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "Vadim Ashikhman" ] } ], "cve": "CVE-2019-14837", "cwe": { "id": "CWE-547", "name": "Use of Hard-coded, Security-relevant Constants" }, "discovery_date": "2019-07-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1730227" } ], "notes": [ { "category": "description", "text": "A flaw was found in Keycloak. The use of an open hard-coded domain can allow an unauthorized login by setting up a mail server and resetting the user credentials, enabling information disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak: keycloak uses hardcoded open dummy domain for new accounts enabling information disclosure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14837" }, { "category": "external", "summary": "RHBZ#1730227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1730227" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14837", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14837" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14837", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14837" } ], "release_date": "2019-12-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:04:03+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4041" }, { "category": "workaround", "details": "It is not a very straight forward workaround but it is possible to mitigate this by manually editing the default Email ID ([email protected]) to some valid email ID ([email protected]) in the USER_ENTITY table in the RHSSO database used.", "product_ids": [ "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "keycloak: keycloak uses hardcoded open dummy domain for new accounts enabling information disclosure" }, { "acknowledgments": [ { "names": [ "F\u00e1bio Magalh\u00e3es de Andrade" ], "organization": "Sonda Ativas" }, { "names": [ "Juliano de Castro Santos", "Leonard Lunardi" ], "organization": "UnimedBH" } ], "cve": "CVE-2019-14838", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2019-08-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1751227" } ], "notes": [ { "category": "description", "text": "It was found that Wildfly users had default user permissions set incorrectly. A malicious user could use this flaw to access unauthorized controls for the application server.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14838" }, { "category": "external", "summary": "RHBZ#1751227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751227" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14838", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14838" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14838", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14838" }, { "category": "external", "summary": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14838", "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14838" } ], "release_date": "2019-10-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:04:03+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4041" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default" }, { "cve": "CVE-2019-14843", "cwe": { "id": "CWE-592", "name": "CWE-592" }, "discovery_date": "2019-09-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1752980" } ], "notes": [ { "category": "description", "text": "A flaw was found in Wildfly Security Manager, running under JDK 11 or 8, that authorized requests for any requester. This flaw could be used by a malicious app deployed on the app server to access unauthorized information and possibly conduct further attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-security-manager: security manager authorization bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14843" }, { "category": "external", "summary": "RHBZ#1752980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752980" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14843", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14843" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14843", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14843" } ], "release_date": "2019-09-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:04:03+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4041" }, { "category": "workaround", "details": "This flaw only affects the Security Manager running under JDK 11 or 8. To mitigate exposure to this flaw, do not run under those JDK versions.", "product_ids": [ "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "wildfly-security-manager: security manager authorization bypass" } ] }
rhba-2019_3139
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Container Platform release 3.11.153 is now available with\nupdates to packages and images that fix several bugs and add enhancements.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the RPM packages for Red Hat OpenShift Container\nPlatform 3.11.153. See the following advisory for the container images for\nthis release:\n\nhttps://access.redhat.com/errata/RHBA-2019:3138\n\nThis release fixes the following bugs:\n\n* NSX role templates referenced module output based on previous data structure. Templates were not properly populated. With this bug fix, the templates were updated to use the updated data structure and the templates are now generated with clusterIP as expected. (BZ#1753890)\n\nAll OpenShift Container Platform 3.11 users are advised to upgrade to these\nupdated packages and images.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHBA-2019:3139", "url": "https://access.redhat.com/errata/RHBA-2019:3139" }, { "category": "external", "summary": "1645725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1645725" }, { "category": "external", "summary": "1651583", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1651583" }, { "category": "external", "summary": "1678100", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1678100" }, { "category": "external", "summary": "1720174", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1720174" }, { "category": "external", "summary": "1723924", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1723924" }, { "category": "external", "summary": "1734385", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1734385" }, { "category": "external", "summary": "1741679", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741679" }, { "category": "external", "summary": "1747305", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1747305" }, { "category": "external", "summary": "1751125", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751125" }, { "category": "external", "summary": "1751975", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751975" }, { "category": "external", "summary": "1752532", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752532" }, { "category": "external", "summary": "1753890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753890" }, { "category": "external", "summary": "1754788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1754788" }, { "category": "external", "summary": "1754968", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1754968" }, { "category": "external", "summary": "1758156", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758156" }, { "category": "external", "summary": "1758235", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758235" }, { "category": "external", "summary": "1758267", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758267" }, { "category": "external", "summary": "1759344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759344" }, { "category": "external", "summary": "1759837", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759837" }, { "category": "external", "summary": "1760166", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760166" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhba-2019_3139.json" } ], "title": "Red Hat Bug Fix Advisory: OpenShift Container Platform 3.11 bug fix and enhancement update", "tracking": { "current_release_date": "2024-11-13T22:06:46+00:00", "generator": { "date": "2024-11-13T22:06:46+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHBA-2019:3139", "initial_release_date": "2019-10-18T02:02:14+00:00", "revision_history": [ { "date": "2019-10-18T02:02:14+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-10-18T02:02:14+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-13T22:06:46+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 3.11", "product": { "name": "Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:3.11::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "apb-0:1.9.8-1.el7.ppc64le", "product": { "name": "apb-0:1.9.8-1.el7.ppc64le", "product_id": "apb-0:1.9.8-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le", "product": { "name": "cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le", "product_id": "cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le", "product": { "name": "cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le", "product_id": "cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.ppc64le", "product": { "name": "openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.ppc64le", "product_id": "openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.ppc64le", "product": { "name": "atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.ppc64le", "product_id": "atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.ppc64le", "product": { "name": "atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.ppc64le", "product_id": "atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog-svcat@3.11.153-1.git.1.e227636.el7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product": { "name": "atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product_id": "atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product": { "name": "atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product_id": "atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product": { "name": "atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product_id": "atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product": { "name": "atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product_id": "atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product": { "name": "atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product_id": "atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product": { "name": "atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product_id": "atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product": { "name": "atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product_id": "atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product": { "name": "atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product_id": "atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product": { "name": "atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product_id": "atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-template-service-broker@3.11.153-1.git.0.aaf3f71.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product": { "name": "atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product_id": "atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.ppc64le", "product": { "name": "atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.ppc64le", "product_id": "atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.ppc64le", "product": { "name": "atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.ppc64le", "product_id": "atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.ppc64le", "product": { "name": "atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.ppc64le", "product_id": "atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.ppc64le", "product": { "name": "atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.ppc64le", "product_id": "atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.ppc64le", "product": { "name": "atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.ppc64le", "product_id": "atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-node-problem-detector@3.11.153-1.git.1.7fbf681.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.ppc64le", "product": { "name": "atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.ppc64le", "product_id": "atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.ppc64le", "product": { "name": "atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.ppc64le", "product_id": "atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.ppc64le", "product": { "name": "golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.ppc64le", "product_id": "golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.ppc64le", "product": { "name": "prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.ppc64le", "product_id": "prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.ppc64le", "product": { "name": "prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.ppc64le", "product_id": "prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "prometheus-0:3.11.153-1.git.1.7a486a2.el7.ppc64le", "product": { "name": "prometheus-0:3.11.153-1.git.1.7a486a2.el7.ppc64le", "product_id": "prometheus-0:3.11.153-1.git.1.7a486a2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.ppc64le", "product": { "name": "openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.ppc64le", "product_id": "openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.ppc64le", "product": { "name": "openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.ppc64le", "product_id": "openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-enterprise-cluster-capacity@3.11.153-1.git.1.5f83714.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "apb-0:1.9.8-1.el7.x86_64", "product": { "name": "apb-0:1.9.8-1.el7.x86_64", "product_id": "apb-0:1.9.8-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64", "product": { "name": "cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64", "product_id": "cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64", "product": { "name": "cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64", "product_id": "cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.x86_64", "product": { "name": "openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.x86_64", "product_id": "openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.x86_64", "product": { "name": "atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.x86_64", "product_id": "atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.x86_64", "product": { "name": "atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.x86_64", "product_id": "atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog-svcat@3.11.153-1.git.1.e227636.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product": { "name": "atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_id": "atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product": { "name": "atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_id": "atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-clients-redistributable-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product": { "name": "atomic-openshift-clients-redistributable-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_id": "atomic-openshift-clients-redistributable-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-clients-redistributable@3.11.153-1.git.0.aaf3f71.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product": { "name": "atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_id": "atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product": { "name": "atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_id": "atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product": { "name": "atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_id": "atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product": { "name": "atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_id": "atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product": { "name": "atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_id": "atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product": { "name": "atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_id": "atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product": { "name": "atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_id": "atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-template-service-broker@3.11.153-1.git.0.aaf3f71.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product": { "name": "atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_id": "atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.x86_64", "product": { "name": "atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.x86_64", "product_id": "atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.x86_64", "product": { "name": "atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.x86_64", "product_id": "atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.x86_64", "product": { "name": "atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.x86_64", "product_id": "atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.x86_64", "product": { "name": "atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.x86_64", "product_id": "atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.x86_64", "product": { "name": "atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.x86_64", "product_id": "atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-node-problem-detector@3.11.153-1.git.1.7fbf681.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.x86_64", "product": { "name": "atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.x86_64", "product_id": "atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.x86_64", "product": { "name": "atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.x86_64", "product_id": "atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.x86_64", "product": { "name": "golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.x86_64", "product_id": "golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.x86_64", "product": { "name": "prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.x86_64", "product_id": "prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.x86_64", "product": { "name": "prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.x86_64", "product_id": "prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "prometheus-0:3.11.153-1.git.1.7a486a2.el7.x86_64", "product": { "name": "prometheus-0:3.11.153-1.git.1.7a486a2.el7.x86_64", "product_id": "prometheus-0:3.11.153-1.git.1.7a486a2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.x86_64", "product": { "name": "openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.x86_64", "product_id": "openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.x86_64", "product": { "name": "openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.x86_64", "product_id": "openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-enterprise-cluster-capacity@3.11.153-1.git.1.5f83714.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "apb-0:1.9.8-1.el7.src", "product": { "name": "apb-0:1.9.8-1.el7.src", "product_id": "apb-0:1.9.8-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.src", "product": { "name": "cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.src", "product_id": "cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "jenkins-2-plugins-0:3.11.1568994366-1.el7.src", "product": { "name": "jenkins-2-plugins-0:3.11.1568994366-1.el7.src", "product_id": "jenkins-2-plugins-0:3.11.1568994366-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "jenkins-0:2.176.3.1569349414-1.el7.src", "product": { "name": "jenkins-0:2.176.3.1569349414-1.el7.src", "product_id": "jenkins-0:2.176.3.1569349414-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.src", "product": { "name": "openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.src", "product_id": "openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "mediawiki-0:1.27.7-1.el7.src", "product": { "name": "mediawiki-0:1.27.7-1.el7.src", "product_id": "mediawiki-0:1.27.7-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.src", "product": { "name": "atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.src", "product_id": "atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.src", "product": { "name": "atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.src", "product_id": "atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.src", "product": { "name": "atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.src", "product_id": "atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.src", "product": { "name": "atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.src", "product_id": "atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.src", "product": { "name": "atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.src", "product_id": "atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.src", "product": { "name": "atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.src", "product_id": "atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.src", "product": { "name": "atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.src", "product_id": "atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-node-problem-detector@3.11.153-1.git.1.7fbf681.el7?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.src", "product": { "name": "atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.src", "product_id": "atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.src", "product": { "name": "atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.src", "product_id": "atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.src", "product": { "name": "golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.src", "product_id": "golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "golang-github-prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.src", "product": { "name": "golang-github-prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.src", "product_id": "golang-github-prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-prometheus-alertmanager@3.11.153-1.git.1.2768abd.el7?arch=src" } } }, { "category": "product_version", "name": "golang-github-prometheus-node_exporter-0:3.11.153-1.git.1.0e8ef36.el7.src", "product": { "name": "golang-github-prometheus-node_exporter-0:3.11.153-1.git.1.0e8ef36.el7.src", "product_id": "golang-github-prometheus-node_exporter-0:3.11.153-1.git.1.0e8ef36.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-prometheus-node_exporter@3.11.153-1.git.1.0e8ef36.el7?arch=src" } } }, { "category": "product_version", "name": "golang-github-prometheus-prometheus-0:3.11.153-1.git.1.7a486a2.el7.src", "product": { "name": "golang-github-prometheus-prometheus-0:3.11.153-1.git.1.7a486a2.el7.src", "product_id": "golang-github-prometheus-prometheus-0:3.11.153-1.git.1.7a486a2.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.src", "product": { "name": "openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.src", "product_id": "openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.src", "product": { "name": "openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.src", "product_id": "openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-enterprise-cluster-capacity@3.11.153-1.git.1.5f83714.el7?arch=src" } } }, { "category": "product_version", "name": "openshift-kuryr-0:3.11.153-1.git.1.073ef06.el7.src", "product": { "name": "openshift-kuryr-0:3.11.153-1.git.1.073ef06.el7.src", "product_id": "openshift-kuryr-0:3.11.153-1.git.1.073ef06.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.src", "product": { "name": "openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.src", "product_id": "openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "apb-container-scripts-0:1.9.8-1.el7.noarch", "product": { "name": "apb-container-scripts-0:1.9.8-1.el7.noarch", "product_id": "apb-container-scripts-0:1.9.8-1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } }, { "category": "product_version", "name": "apb-devel-0:1.9.8-1.el7.noarch", "product": { "name": "apb-devel-0:1.9.8-1.el7.noarch", "product_id": "apb-devel-0:1.9.8-1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } }, { "category": "product_version", "name": "jenkins-2-plugins-0:3.11.1568994366-1.el7.noarch", "product": { "name": "jenkins-2-plugins-0:3.11.1568994366-1.el7.noarch", "product_id": "jenkins-2-plugins-0:3.11.1568994366-1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } }, { "category": "product_version", "name": "jenkins-0:2.176.3.1569349414-1.el7.noarch", "product": { "name": "jenkins-0:2.176.3.1569349414-1.el7.noarch", "product_id": "jenkins-0:2.176.3.1569349414-1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } }, { "category": "product_version", "name": "mediawiki-0:1.27.7-1.el7.noarch", "product": { "name": "mediawiki-0:1.27.7-1.el7.noarch", "product_id": "mediawiki-0:1.27.7-1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } }, { "category": "product_version", "name": "mediawiki-doc-0:1.27.7-1.el7.noarch", "product": { "name": "mediawiki-doc-0:1.27.7-1.el7.noarch", "product_id": "mediawiki-doc-0:1.27.7-1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } }, { "category": "product_version", "name": "atomic-openshift-docker-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch", "product": { "name": "atomic-openshift-docker-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch", "product_id": "atomic-openshift-docker-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } }, { "category": "product_version", "name": "atomic-openshift-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch", "product": { "name": "atomic-openshift-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch", "product_id": "atomic-openshift-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } }, { "category": "product_version", "name": "openshift-kuryr-cni-0:3.11.153-1.git.1.073ef06.el7.noarch", "product": { "name": "openshift-kuryr-cni-0:3.11.153-1.git.1.073ef06.el7.noarch", "product_id": "openshift-kuryr-cni-0:3.11.153-1.git.1.073ef06.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } }, { "category": "product_version", "name": "openshift-kuryr-common-0:3.11.153-1.git.1.073ef06.el7.noarch", "product": { "name": "openshift-kuryr-common-0:3.11.153-1.git.1.073ef06.el7.noarch", "product_id": "openshift-kuryr-common-0:3.11.153-1.git.1.073ef06.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } }, { "category": "product_version", "name": "openshift-kuryr-controller-0:3.11.153-1.git.1.073ef06.el7.noarch", "product": { "name": "openshift-kuryr-controller-0:3.11.153-1.git.1.073ef06.el7.noarch", "product_id": "openshift-kuryr-controller-0:3.11.153-1.git.1.073ef06.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } }, { "category": "product_version", "name": "python2-kuryr-kubernetes-0:3.11.153-1.git.1.073ef06.el7.noarch", "product": { "name": "python2-kuryr-kubernetes-0:3.11.153-1.git.1.073ef06.el7.noarch", "product_id": "python2-kuryr-kubernetes-0:3.11.153-1.git.1.073ef06.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } }, { "category": "product_version", "name": "openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.noarch", "product": { "name": "openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.noarch", "product_id": "openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } }, { "category": "product_version", "name": "openshift-ansible-docs-0:3.11.153-2.git.0.ee699b5.el7.noarch", "product": { "name": "openshift-ansible-docs-0:3.11.153-2.git.0.ee699b5.el7.noarch", "product_id": "openshift-ansible-docs-0:3.11.153-2.git.0.ee699b5.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } }, { "category": "product_version", "name": "openshift-ansible-playbooks-0:3.11.153-2.git.0.ee699b5.el7.noarch", "product": { "name": "openshift-ansible-playbooks-0:3.11.153-2.git.0.ee699b5.el7.noarch", "product_id": "openshift-ansible-playbooks-0:3.11.153-2.git.0.ee699b5.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } }, { "category": "product_version", "name": "openshift-ansible-roles-0:3.11.153-2.git.0.ee699b5.el7.noarch", "product": { "name": "openshift-ansible-roles-0:3.11.153-2.git.0.ee699b5.el7.noarch", "product_id": "openshift-ansible-roles-0:3.11.153-2.git.0.ee699b5.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } }, { "category": "product_version", "name": "openshift-ansible-test-0:3.11.153-2.git.0.ee699b5.el7.noarch", "product": { "name": "openshift-ansible-test-0:3.11.153-2.git.0.ee699b5.el7.noarch", "product_id": "openshift-ansible-test-0:3.11.153-2.git.0.ee699b5.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "apb-0:1.9.8-1.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.ppc64le" }, "product_reference": "apb-0:1.9.8-1.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "apb-0:1.9.8-1.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.src" }, "product_reference": "apb-0:1.9.8-1.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "apb-0:1.9.8-1.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.x86_64" }, "product_reference": "apb-0:1.9.8-1.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "apb-container-scripts-0:1.9.8-1.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:apb-container-scripts-0:1.9.8-1.el7.noarch" }, "product_reference": "apb-container-scripts-0:1.9.8-1.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "apb-devel-0:1.9.8-1.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:apb-devel-0:1.9.8-1.el7.noarch" }, "product_reference": "apb-devel-0:1.9.8-1.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.ppc64le" }, "product_reference": "atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.src" }, "product_reference": "atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.x86_64" }, "product_reference": "atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.ppc64le" }, "product_reference": "atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.x86_64" }, "product_reference": "atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le" }, "product_reference": "atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.src" }, "product_reference": "atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64" }, "product_reference": "atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le" }, "product_reference": "atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.x86_64" }, "product_reference": "atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-clients-redistributable-0:3.11.153-1.git.0.aaf3f71.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-redistributable-0:3.11.153-1.git.0.aaf3f71.el7.x86_64" }, "product_reference": "atomic-openshift-clients-redistributable-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.ppc64le" }, "product_reference": "atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.src" }, "product_reference": "atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.x86_64" }, "product_reference": "atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.ppc64le" }, "product_reference": "atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.src" }, "product_reference": "atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.x86_64" }, "product_reference": "atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-docker-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-docker-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch" }, "product_reference": "atomic-openshift-docker-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.ppc64le" }, "product_reference": "atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.src" }, "product_reference": "atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.x86_64" }, "product_reference": "atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch" }, "product_reference": "atomic-openshift-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le" }, "product_reference": "atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.x86_64" }, "product_reference": "atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le" }, "product_reference": "atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64" }, "product_reference": "atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le" }, "product_reference": "atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.x86_64" }, "product_reference": "atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.ppc64le" }, "product_reference": "atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.src" }, "product_reference": "atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.x86_64" }, "product_reference": "atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le" }, "product_reference": "atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.x86_64" }, "product_reference": "atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.ppc64le" }, "product_reference": "atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.src" }, "product_reference": "atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.x86_64" }, "product_reference": "atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le" }, "product_reference": "atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.x86_64" }, "product_reference": "atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le" }, "product_reference": "atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.x86_64" }, "product_reference": "atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.ppc64le" }, "product_reference": "atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.src" }, "product_reference": "atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.x86_64" }, "product_reference": "atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le" }, "product_reference": "atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.x86_64" }, "product_reference": "atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le" }, "product_reference": "atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.x86_64" }, "product_reference": "atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.ppc64le" }, "product_reference": "atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.src" }, "product_reference": "atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.x86_64" }, "product_reference": "atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le" }, "product_reference": "cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.src" }, "product_reference": "cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64" }, "product_reference": "cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le" }, "product_reference": "cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64" }, "product_reference": "cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.ppc64le" }, "product_reference": "golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.src" }, "product_reference": "golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.x86_64" }, "product_reference": "golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.src" }, "product_reference": "golang-github-prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-node_exporter-0:3.11.153-1.git.1.0e8ef36.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.153-1.git.1.0e8ef36.el7.src" }, "product_reference": "golang-github-prometheus-node_exporter-0:3.11.153-1.git.1.0e8ef36.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-prometheus-0:3.11.153-1.git.1.7a486a2.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.153-1.git.1.7a486a2.el7.src" }, "product_reference": "golang-github-prometheus-prometheus-0:3.11.153-1.git.1.7a486a2.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "jenkins-0:2.176.3.1569349414-1.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:jenkins-0:2.176.3.1569349414-1.el7.noarch" }, "product_reference": "jenkins-0:2.176.3.1569349414-1.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "jenkins-0:2.176.3.1569349414-1.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:jenkins-0:2.176.3.1569349414-1.el7.src" }, "product_reference": "jenkins-0:2.176.3.1569349414-1.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "jenkins-2-plugins-0:3.11.1568994366-1.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1568994366-1.el7.noarch" }, "product_reference": "jenkins-2-plugins-0:3.11.1568994366-1.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "jenkins-2-plugins-0:3.11.1568994366-1.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1568994366-1.el7.src" }, "product_reference": "jenkins-2-plugins-0:3.11.1568994366-1.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "mediawiki-0:1.27.7-1.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.noarch" }, "product_reference": "mediawiki-0:1.27.7-1.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "mediawiki-0:1.27.7-1.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.src" }, "product_reference": "mediawiki-0:1.27.7-1.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "mediawiki-doc-0:1.27.7-1.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:mediawiki-doc-0:1.27.7-1.el7.noarch" }, "product_reference": "mediawiki-doc-0:1.27.7-1.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.noarch" }, "product_reference": "openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.src" }, "product_reference": "openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-docs-0:3.11.153-2.git.0.ee699b5.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-ansible-docs-0:3.11.153-2.git.0.ee699b5.el7.noarch" }, "product_reference": "openshift-ansible-docs-0:3.11.153-2.git.0.ee699b5.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-playbooks-0:3.11.153-2.git.0.ee699b5.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-ansible-playbooks-0:3.11.153-2.git.0.ee699b5.el7.noarch" }, "product_reference": "openshift-ansible-playbooks-0:3.11.153-2.git.0.ee699b5.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-roles-0:3.11.153-2.git.0.ee699b5.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-ansible-roles-0:3.11.153-2.git.0.ee699b5.el7.noarch" }, "product_reference": "openshift-ansible-roles-0:3.11.153-2.git.0.ee699b5.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-test-0:3.11.153-2.git.0.ee699b5.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-ansible-test-0:3.11.153-2.git.0.ee699b5.el7.noarch" }, "product_reference": "openshift-ansible-test-0:3.11.153-2.git.0.ee699b5.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.ppc64le" }, "product_reference": "openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.src" }, "product_reference": "openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.x86_64" }, "product_reference": "openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.ppc64le" }, "product_reference": "openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.src" }, "product_reference": "openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.x86_64" }, "product_reference": "openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-0:3.11.153-1.git.1.073ef06.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-kuryr-0:3.11.153-1.git.1.073ef06.el7.src" }, "product_reference": "openshift-kuryr-0:3.11.153-1.git.1.073ef06.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-cni-0:3.11.153-1.git.1.073ef06.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-kuryr-cni-0:3.11.153-1.git.1.073ef06.el7.noarch" }, "product_reference": "openshift-kuryr-cni-0:3.11.153-1.git.1.073ef06.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-common-0:3.11.153-1.git.1.073ef06.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-kuryr-common-0:3.11.153-1.git.1.073ef06.el7.noarch" }, "product_reference": "openshift-kuryr-common-0:3.11.153-1.git.1.073ef06.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-controller-0:3.11.153-1.git.1.073ef06.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-kuryr-controller-0:3.11.153-1.git.1.073ef06.el7.noarch" }, "product_reference": "openshift-kuryr-controller-0:3.11.153-1.git.1.073ef06.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.ppc64le" }, "product_reference": "openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.src" }, "product_reference": "openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.x86_64" }, "product_reference": "openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-0:3.11.153-1.git.1.7a486a2.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.153-1.git.1.7a486a2.el7.ppc64le" }, "product_reference": "prometheus-0:3.11.153-1.git.1.7a486a2.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-0:3.11.153-1.git.1.7a486a2.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.153-1.git.1.7a486a2.el7.x86_64" }, "product_reference": "prometheus-0:3.11.153-1.git.1.7a486a2.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.ppc64le" }, "product_reference": "prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.x86_64" }, "product_reference": "prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.ppc64le" }, "product_reference": "prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.x86_64" }, "product_reference": "prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "python2-kuryr-kubernetes-0:3.11.153-1.git.1.073ef06.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:python2-kuryr-kubernetes-0:3.11.153-1.git.1.073ef06.el7.noarch" }, "product_reference": "python2-kuryr-kubernetes-0:3.11.153-1.git.1.073ef06.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.153-1.git.1.0e8ef36.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.153-1.git.1.7a486a2.el7.src", "7Server-RH7-RHOSE-3.11:jenkins-0:2.176.3.1569349414-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-0:2.176.3.1569349414-1.el7.src", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1568994366-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1568994366-1.el7.src", "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.src", "7Server-RH7-RHOSE-3.11:mediawiki-doc-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-docs-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-playbooks-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-roles-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-test-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-kuryr-0:3.11.153-1.git.1.073ef06.el7.src", "7Server-RH7-RHOSE-3.11:openshift-kuryr-cni-0:3.11.153-1.git.1.073ef06.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-common-0:3.11.153-1.git.1.073ef06.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-controller-0:3.11.153-1.git.1.073ef06.el7.noarch", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.153-1.git.1.7a486a2.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.153-1.git.1.7a486a2.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.x86_64", "7Server-RH7-RHOSE-3.11:python2-kuryr-kubernetes-0:3.11.153-1.git.1.073ef06.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.src", "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:apb-container-scripts-0:1.9.8-1.el7.noarch", "7Server-RH7-RHOSE-3.11:apb-devel-0:1.9.8-1.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-redistributable-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-docker-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.src", "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.src", "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.153-1.git.1.0e8ef36.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.153-1.git.1.7a486a2.el7.src", "7Server-RH7-RHOSE-3.11:jenkins-0:2.176.3.1569349414-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-0:2.176.3.1569349414-1.el7.src", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1568994366-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1568994366-1.el7.src", "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.src", "7Server-RH7-RHOSE-3.11:mediawiki-doc-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-docs-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-playbooks-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-roles-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-test-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-kuryr-0:3.11.153-1.git.1.073ef06.el7.src", "7Server-RH7-RHOSE-3.11:openshift-kuryr-cni-0:3.11.153-1.git.1.073ef06.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-common-0:3.11.153-1.git.1.073ef06.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-controller-0:3.11.153-1.git.1.073ef06.el7.noarch", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.153-1.git.1.7a486a2.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.153-1.git.1.7a486a2.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.x86_64", "7Server-RH7-RHOSE-3.11:python2-kuryr-kubernetes-0:3.11.153-1.git.1.073ef06.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-18T02:02:14+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system is applied.\n\nSee the following documentation, which will be updated shortly for release 3.11.153, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_release_notes.html\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at https://access.redhat.com/articles/11258.", "product_ids": [ "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.src", "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:apb-container-scripts-0:1.9.8-1.el7.noarch", "7Server-RH7-RHOSE-3.11:apb-devel-0:1.9.8-1.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-redistributable-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-docker-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.src", "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.src", "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHBA-2019:3139" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.src", "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:apb-container-scripts-0:1.9.8-1.el7.noarch", "7Server-RH7-RHOSE-3.11:apb-devel-0:1.9.8-1.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-redistributable-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-docker-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.src", "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.src", "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.153-1.git.1.0e8ef36.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.153-1.git.1.7a486a2.el7.src", "7Server-RH7-RHOSE-3.11:jenkins-0:2.176.3.1569349414-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-0:2.176.3.1569349414-1.el7.src", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1568994366-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1568994366-1.el7.src", "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.src", "7Server-RH7-RHOSE-3.11:mediawiki-doc-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-docs-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-playbooks-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-roles-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-test-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-kuryr-0:3.11.153-1.git.1.073ef06.el7.src", "7Server-RH7-RHOSE-3.11:openshift-kuryr-cni-0:3.11.153-1.git.1.073ef06.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-common-0:3.11.153-1.git.1.073ef06.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-controller-0:3.11.153-1.git.1.073ef06.el7.noarch", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.153-1.git.1.7a486a2.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.153-1.git.1.7a486a2.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.x86_64", "7Server-RH7-RHOSE-3.11:python2-kuryr-kubernetes-0:3.11.153-1.git.1.073ef06.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.src", "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:apb-container-scripts-0:1.9.8-1.el7.noarch", "7Server-RH7-RHOSE-3.11:apb-devel-0:1.9.8-1.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-redistributable-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-docker-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.src", "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.src", "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.153-1.git.1.0e8ef36.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.153-1.git.1.7a486a2.el7.src", "7Server-RH7-RHOSE-3.11:jenkins-0:2.176.3.1569349414-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-0:2.176.3.1569349414-1.el7.src", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1568994366-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1568994366-1.el7.src", "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.src", "7Server-RH7-RHOSE-3.11:mediawiki-doc-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-docs-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-playbooks-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-roles-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-test-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-kuryr-0:3.11.153-1.git.1.073ef06.el7.src", "7Server-RH7-RHOSE-3.11:openshift-kuryr-cni-0:3.11.153-1.git.1.073ef06.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-common-0:3.11.153-1.git.1.073ef06.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-controller-0:3.11.153-1.git.1.073ef06.el7.noarch", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.153-1.git.1.7a486a2.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.153-1.git.1.7a486a2.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.x86_64", "7Server-RH7-RHOSE-3.11:python2-kuryr-kubernetes-0:3.11.153-1.git.1.073ef06.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-18T02:02:14+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system is applied.\n\nSee the following documentation, which will be updated shortly for release 3.11.153, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_release_notes.html\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at https://access.redhat.com/articles/11258.", "product_ids": [ "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.src", "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:apb-container-scripts-0:1.9.8-1.el7.noarch", "7Server-RH7-RHOSE-3.11:apb-devel-0:1.9.8-1.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-redistributable-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-docker-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.src", "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.src", "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHBA-2019:3139" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.src", "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:apb-container-scripts-0:1.9.8-1.el7.noarch", "7Server-RH7-RHOSE-3.11:apb-devel-0:1.9.8-1.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-redistributable-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-docker-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.src", "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.src", "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" } ] }
rhba-2019:2819
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Container Platform release 4.1.17 is now available with\nupdates to packages and images that fix several bugs.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the RPM packages for Red Hat\nOpenShift Container Platform 4.1.17. See the following advisory for the\ncontainer images for this release:\n\nhttps://access.redhat.com/errata/RHBA-2019:2820\n\nAll OpenShift Container Platform 4.1 users are advised to upgrade to these\nupdated packages and images.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHBA-2019:2819", "url": "https://access.redhat.com/errata/RHBA-2019:2819" }, { "category": "external", "summary": "1751890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751890" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhba-2019_2819.json" } ], "title": "Red Hat Bug Fix Advisory: OpenShift Container Platform 4.1.17 packages update", "tracking": { "current_release_date": "2025-03-15T19:44:46+00:00", "generator": { "date": "2025-03-15T19:44:46+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.1" } }, "id": "RHBA-2019:2819", "initial_release_date": "2019-09-25T06:26:23+00:00", "revision_history": [ { "date": "2019-09-25T06:26:23+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-09-25T06:26:23+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-03-15T19:44:46+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.1", "product": { "name": "Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.1::el7" } } }, { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.1", "product": { "name": "Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.1::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64", "product": { "name": "atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64", "product_id": "atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.1.17-201909170941.git.1.9b9b46b.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "atomic-enterprise-service-catalog-svcat-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64", "product": { "name": "atomic-enterprise-service-catalog-svcat-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64", "product_id": "atomic-enterprise-service-catalog-svcat-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog-svcat@4.1.17-201909170941.git.1.9b9b46b.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openshift-clients-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "product": { "name": "openshift-clients-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "product_id": "openshift-clients-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "product": { "name": "openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "product_id": "openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.1.17-201909170941.git.0.2447974.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "product": { "name": "openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "product_id": "openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "ansible-service-broker-1:1.4.4-2.el7.x86_64", "product": { "name": "ansible-service-broker-1:1.4.4-2.el7.x86_64", "product_id": "ansible-service-broker-1:1.4.4-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openshift-clients-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "product": { "name": "openshift-clients-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "product_id": "openshift-clients-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "product": { "name": "openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "product_id": "openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.1.17-201909170941.git.0.2447974.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "product": { "name": "openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "product_id": "openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "podman-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "product": { "name": "podman-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "product_id": "podman-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "podman-debugsource-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "product": { "name": "podman-debugsource-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "product_id": "podman-debugsource-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "podman-debuginfo-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "product": { "name": "podman-debuginfo-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "product_id": "podman-debuginfo-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64" } } }, { "category": "product_version", "name": "containers-common-1:0.1.32-5.git1715c90.el8.x86_64", "product": { "name": "containers-common-1:0.1.32-5.git1715c90.el8.x86_64", "product_id": "containers-common-1:0.1.32-5.git1715c90.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-1:0.1.32-5.git1715c90.el8.x86_64", "product": { "name": "skopeo-1:0.1.32-5.git1715c90.el8.x86_64", "product_id": "skopeo-1:0.1.32-5.git1715c90.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debugsource-1:0.1.32-5.git1715c90.el8.x86_64", "product": { "name": "skopeo-debugsource-1:0.1.32-5.git1715c90.el8.x86_64", "product_id": "skopeo-debugsource-1:0.1.32-5.git1715c90.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debuginfo-1:0.1.32-5.git1715c90.el8.x86_64", "product": { "name": "skopeo-debuginfo-1:0.1.32-5.git1715c90.el8.x86_64", "product_id": "skopeo-debuginfo-1:0.1.32-5.git1715c90.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.src", "product": { "name": "atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.src", "product_id": "atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.1.17-201909170941.git.1.9b9b46b.el7?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "openshift-0:4.1.17-201909170941.git.0.2447974.el7.src", "product": { "name": "openshift-0:4.1.17-201909170941.git.0.2447974.el7.src", "product_id": "openshift-0:4.1.17-201909170941.git.0.2447974.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.src", "product": { "name": "openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.src", "product_id": "openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "ansible-service-broker-1:1.4.4-2.el7.src", "product": { "name": "ansible-service-broker-1:1.4.4-2.el7.src", "product_id": "ansible-service-broker-1:1.4.4-2.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "openshift-0:4.1.17-201909170941.git.0.2447974.el8.src", "product": { "name": "openshift-0:4.1.17-201909170941.git.0.2447974.el8.src", "product_id": "openshift-0:4.1.17-201909170941.git.0.2447974.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "podman-0:1.0.2-2.dev.git96ccc2e.el8.src", "product": { "name": "podman-0:1.0.2-2.dev.git96ccc2e.el8.src", "product_id": "podman-0:1.0.2-2.dev.git96ccc2e.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src" } } }, { "category": "product_version", "name": "skopeo-1:0.1.32-5.git1715c90.el8.src", "product": { "name": "skopeo-1:0.1.32-5.git1715c90.el8.src", "product_id": "skopeo-1:0.1.32-5.git1715c90.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.noarch", "product": { "name": "openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.noarch", "product_id": "openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } }, { "category": "product_version", "name": "ansible-service-broker-container-scripts-1:1.4.4-2.el7.noarch", "product": { "name": "ansible-service-broker-container-scripts-1:1.4.4-2.el7.noarch", "product_id": "ansible-service-broker-container-scripts-1:1.4.4-2.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "ansible-service-broker-selinux-1:1.4.4-2.el7.noarch", "product": { "name": "ansible-service-broker-selinux-1:1.4.4-2.el7.noarch", "product_id": "ansible-service-broker-selinux-1:1.4.4-2.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "automation-broker-apb-role-1:1.4.4-2.el7.noarch", "product": { "name": "automation-broker-apb-role-1:1.4.4-2.el7.noarch", "product_id": "automation-broker-apb-role-1:1.4.4-2.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "podman-docker-0:1.0.2-2.dev.git96ccc2e.el8.noarch", "product": { "name": "podman-docker-0:1.0.2-2.dev.git96ccc2e.el8.noarch", "product_id": "podman-docker-0:1.0.2-2.dev.git96ccc2e.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/[email protected]?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ansible-service-broker-1:1.4.4-2.el7.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:ansible-service-broker-1:1.4.4-2.el7.src" }, "product_reference": "ansible-service-broker-1:1.4.4-2.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-service-broker-1:1.4.4-2.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:ansible-service-broker-1:1.4.4-2.el7.x86_64" }, "product_reference": "ansible-service-broker-1:1.4.4-2.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-service-broker-container-scripts-1:1.4.4-2.el7.noarch as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:ansible-service-broker-container-scripts-1:1.4.4-2.el7.noarch" }, "product_reference": "ansible-service-broker-container-scripts-1:1.4.4-2.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-service-broker-selinux-1:1.4.4-2.el7.noarch as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:ansible-service-broker-selinux-1:1.4.4-2.el7.noarch" }, "product_reference": "ansible-service-broker-selinux-1:1.4.4-2.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.src" }, "product_reference": "atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64" }, "product_reference": "atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-svcat-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-svcat-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64" }, "product_reference": "atomic-enterprise-service-catalog-svcat-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "automation-broker-apb-role-1:1.4.4-2.el7.noarch as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:automation-broker-apb-role-1:1.4.4-2.el7.noarch" }, "product_reference": "automation-broker-apb-role-1:1.4.4-2.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-0:4.1.17-201909170941.git.0.2447974.el7.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-0:4.1.17-201909170941.git.0.2447974.el7.src" }, "product_reference": "openshift-0:4.1.17-201909170941.git.0.2447974.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.noarch as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.noarch" }, "product_reference": "openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.src" }, "product_reference": "openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.1.17-201909170941.git.0.2447974.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-clients-0:4.1.17-201909170941.git.0.2447974.el7.x86_64" }, "product_reference": "openshift-clients-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el7.x86_64" }, "product_reference": "openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el7.x86_64" }, "product_reference": "openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "containers-common-1:0.1.32-5.git1715c90.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:containers-common-1:0.1.32-5.git1715c90.el8.x86_64" }, "product_reference": "containers-common-1:0.1.32-5.git1715c90.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-0:4.1.17-201909170941.git.0.2447974.el8.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:openshift-0:4.1.17-201909170941.git.0.2447974.el8.src" }, "product_reference": "openshift-0:4.1.17-201909170941.git.0.2447974.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.1.17-201909170941.git.0.2447974.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:openshift-clients-0:4.1.17-201909170941.git.0.2447974.el8.x86_64" }, "product_reference": "openshift-clients-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el8.x86_64" }, "product_reference": "openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el8.x86_64" }, "product_reference": "openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:1.0.2-2.dev.git96ccc2e.el8.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:podman-0:1.0.2-2.dev.git96ccc2e.el8.src" }, "product_reference": "podman-0:1.0.2-2.dev.git96ccc2e.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:1.0.2-2.dev.git96ccc2e.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:podman-0:1.0.2-2.dev.git96ccc2e.el8.x86_64" }, "product_reference": "podman-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-0:1.0.2-2.dev.git96ccc2e.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:podman-debuginfo-0:1.0.2-2.dev.git96ccc2e.el8.x86_64" }, "product_reference": "podman-debuginfo-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-0:1.0.2-2.dev.git96ccc2e.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:podman-debugsource-0:1.0.2-2.dev.git96ccc2e.el8.x86_64" }, "product_reference": "podman-debugsource-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "podman-docker-0:1.0.2-2.dev.git96ccc2e.el8.noarch as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:podman-docker-0:1.0.2-2.dev.git96ccc2e.el8.noarch" }, "product_reference": "podman-docker-0:1.0.2-2.dev.git96ccc2e.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:0.1.32-5.git1715c90.el8.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:skopeo-1:0.1.32-5.git1715c90.el8.src" }, "product_reference": "skopeo-1:0.1.32-5.git1715c90.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:0.1.32-5.git1715c90.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:skopeo-1:0.1.32-5.git1715c90.el8.x86_64" }, "product_reference": "skopeo-1:0.1.32-5.git1715c90.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-1:0.1.32-5.git1715c90.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:skopeo-debuginfo-1:0.1.32-5.git1715c90.el8.x86_64" }, "product_reference": "skopeo-debuginfo-1:0.1.32-5.git1715c90.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-1:0.1.32-5.git1715c90.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:skopeo-debugsource-1:0.1.32-5.git1715c90.el8.x86_64" }, "product_reference": "skopeo-debugsource-1:0.1.32-5.git1715c90.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.src", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-svcat-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-0:4.1.17-201909170941.git.0.2447974.el7.src", "7Server-RH7-RHOSE-4.1:openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.noarch", "7Server-RH7-RHOSE-4.1:openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.src", "7Server-RH7-RHOSE-4.1:openshift-clients-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "8Base-RHOSE-4.1:containers-common-1:0.1.32-5.git1715c90.el8.x86_64", "8Base-RHOSE-4.1:openshift-0:4.1.17-201909170941.git.0.2447974.el8.src", "8Base-RHOSE-4.1:openshift-clients-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "8Base-RHOSE-4.1:openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "8Base-RHOSE-4.1:openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "8Base-RHOSE-4.1:podman-0:1.0.2-2.dev.git96ccc2e.el8.src", "8Base-RHOSE-4.1:podman-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "8Base-RHOSE-4.1:podman-debuginfo-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "8Base-RHOSE-4.1:podman-debugsource-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "8Base-RHOSE-4.1:podman-docker-0:1.0.2-2.dev.git96ccc2e.el8.noarch", "8Base-RHOSE-4.1:skopeo-1:0.1.32-5.git1715c90.el8.src", "8Base-RHOSE-4.1:skopeo-1:0.1.32-5.git1715c90.el8.x86_64", "8Base-RHOSE-4.1:skopeo-debuginfo-1:0.1.32-5.git1715c90.el8.x86_64", "8Base-RHOSE-4.1:skopeo-debugsource-1:0.1.32-5.git1715c90.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.1:ansible-service-broker-1:1.4.4-2.el7.src", "7Server-RH7-RHOSE-4.1:ansible-service-broker-1:1.4.4-2.el7.x86_64", "7Server-RH7-RHOSE-4.1:ansible-service-broker-container-scripts-1:1.4.4-2.el7.noarch", "7Server-RH7-RHOSE-4.1:ansible-service-broker-selinux-1:1.4.4-2.el7.noarch", "7Server-RH7-RHOSE-4.1:automation-broker-apb-role-1:1.4.4-2.el7.noarch" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.src", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-svcat-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-0:4.1.17-201909170941.git.0.2447974.el7.src", "7Server-RH7-RHOSE-4.1:openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.noarch", "7Server-RH7-RHOSE-4.1:openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.src", "7Server-RH7-RHOSE-4.1:openshift-clients-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "8Base-RHOSE-4.1:containers-common-1:0.1.32-5.git1715c90.el8.x86_64", "8Base-RHOSE-4.1:openshift-0:4.1.17-201909170941.git.0.2447974.el8.src", "8Base-RHOSE-4.1:openshift-clients-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "8Base-RHOSE-4.1:openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "8Base-RHOSE-4.1:openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "8Base-RHOSE-4.1:podman-0:1.0.2-2.dev.git96ccc2e.el8.src", "8Base-RHOSE-4.1:podman-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "8Base-RHOSE-4.1:podman-debuginfo-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "8Base-RHOSE-4.1:podman-debugsource-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "8Base-RHOSE-4.1:podman-docker-0:1.0.2-2.dev.git96ccc2e.el8.noarch", "8Base-RHOSE-4.1:skopeo-1:0.1.32-5.git1715c90.el8.src", "8Base-RHOSE-4.1:skopeo-1:0.1.32-5.git1715c90.el8.x86_64", "8Base-RHOSE-4.1:skopeo-debuginfo-1:0.1.32-5.git1715c90.el8.x86_64", "8Base-RHOSE-4.1:skopeo-debugsource-1:0.1.32-5.git1715c90.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-25T06:26:23+00:00", "details": "Before applying this update, ensure all previously released errata\nrelevant to your system have been applied.\n\nFor OpenShift Container Platform 4.1 see the following documentation, which\nwill be updated shortly for release 4.1.17, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.1/updating/updating-cluster-cli.html.", "product_ids": [ "7Server-RH7-RHOSE-4.1:ansible-service-broker-1:1.4.4-2.el7.src", "7Server-RH7-RHOSE-4.1:ansible-service-broker-1:1.4.4-2.el7.x86_64", "7Server-RH7-RHOSE-4.1:ansible-service-broker-container-scripts-1:1.4.4-2.el7.noarch", "7Server-RH7-RHOSE-4.1:ansible-service-broker-selinux-1:1.4.4-2.el7.noarch", "7Server-RH7-RHOSE-4.1:automation-broker-apb-role-1:1.4.4-2.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHBA-2019:2819" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-4.1:ansible-service-broker-1:1.4.4-2.el7.src", "7Server-RH7-RHOSE-4.1:ansible-service-broker-1:1.4.4-2.el7.x86_64", "7Server-RH7-RHOSE-4.1:ansible-service-broker-container-scripts-1:1.4.4-2.el7.noarch", "7Server-RH7-RHOSE-4.1:ansible-service-broker-selinux-1:1.4.4-2.el7.noarch", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.src", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-svcat-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64", "7Server-RH7-RHOSE-4.1:automation-broker-apb-role-1:1.4.4-2.el7.noarch", "7Server-RH7-RHOSE-4.1:openshift-0:4.1.17-201909170941.git.0.2447974.el7.src", "7Server-RH7-RHOSE-4.1:openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.noarch", "7Server-RH7-RHOSE-4.1:openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.src", "7Server-RH7-RHOSE-4.1:openshift-clients-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "8Base-RHOSE-4.1:containers-common-1:0.1.32-5.git1715c90.el8.x86_64", "8Base-RHOSE-4.1:openshift-0:4.1.17-201909170941.git.0.2447974.el8.src", "8Base-RHOSE-4.1:openshift-clients-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "8Base-RHOSE-4.1:openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "8Base-RHOSE-4.1:openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "8Base-RHOSE-4.1:podman-0:1.0.2-2.dev.git96ccc2e.el8.src", "8Base-RHOSE-4.1:podman-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "8Base-RHOSE-4.1:podman-debuginfo-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "8Base-RHOSE-4.1:podman-debugsource-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "8Base-RHOSE-4.1:podman-docker-0:1.0.2-2.dev.git96ccc2e.el8.noarch", "8Base-RHOSE-4.1:skopeo-1:0.1.32-5.git1715c90.el8.src", "8Base-RHOSE-4.1:skopeo-1:0.1.32-5.git1715c90.el8.x86_64", "8Base-RHOSE-4.1:skopeo-debuginfo-1:0.1.32-5.git1715c90.el8.x86_64", "8Base-RHOSE-4.1:skopeo-debugsource-1:0.1.32-5.git1715c90.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.src", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-svcat-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-0:4.1.17-201909170941.git.0.2447974.el7.src", "7Server-RH7-RHOSE-4.1:openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.noarch", "7Server-RH7-RHOSE-4.1:openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.src", "7Server-RH7-RHOSE-4.1:openshift-clients-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "8Base-RHOSE-4.1:containers-common-1:0.1.32-5.git1715c90.el8.x86_64", "8Base-RHOSE-4.1:openshift-0:4.1.17-201909170941.git.0.2447974.el8.src", "8Base-RHOSE-4.1:openshift-clients-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "8Base-RHOSE-4.1:openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "8Base-RHOSE-4.1:openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "8Base-RHOSE-4.1:podman-0:1.0.2-2.dev.git96ccc2e.el8.src", "8Base-RHOSE-4.1:podman-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "8Base-RHOSE-4.1:podman-debuginfo-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "8Base-RHOSE-4.1:podman-debugsource-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "8Base-RHOSE-4.1:podman-docker-0:1.0.2-2.dev.git96ccc2e.el8.noarch", "8Base-RHOSE-4.1:skopeo-1:0.1.32-5.git1715c90.el8.src", "8Base-RHOSE-4.1:skopeo-1:0.1.32-5.git1715c90.el8.x86_64", "8Base-RHOSE-4.1:skopeo-debuginfo-1:0.1.32-5.git1715c90.el8.x86_64", "8Base-RHOSE-4.1:skopeo-debugsource-1:0.1.32-5.git1715c90.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.1:ansible-service-broker-1:1.4.4-2.el7.src", "7Server-RH7-RHOSE-4.1:ansible-service-broker-1:1.4.4-2.el7.x86_64", "7Server-RH7-RHOSE-4.1:ansible-service-broker-container-scripts-1:1.4.4-2.el7.noarch", "7Server-RH7-RHOSE-4.1:ansible-service-broker-selinux-1:1.4.4-2.el7.noarch", "7Server-RH7-RHOSE-4.1:automation-broker-apb-role-1:1.4.4-2.el7.noarch" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.src", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-svcat-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-0:4.1.17-201909170941.git.0.2447974.el7.src", "7Server-RH7-RHOSE-4.1:openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.noarch", "7Server-RH7-RHOSE-4.1:openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.src", "7Server-RH7-RHOSE-4.1:openshift-clients-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "8Base-RHOSE-4.1:containers-common-1:0.1.32-5.git1715c90.el8.x86_64", "8Base-RHOSE-4.1:openshift-0:4.1.17-201909170941.git.0.2447974.el8.src", "8Base-RHOSE-4.1:openshift-clients-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "8Base-RHOSE-4.1:openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "8Base-RHOSE-4.1:openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "8Base-RHOSE-4.1:podman-0:1.0.2-2.dev.git96ccc2e.el8.src", "8Base-RHOSE-4.1:podman-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "8Base-RHOSE-4.1:podman-debuginfo-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "8Base-RHOSE-4.1:podman-debugsource-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "8Base-RHOSE-4.1:podman-docker-0:1.0.2-2.dev.git96ccc2e.el8.noarch", "8Base-RHOSE-4.1:skopeo-1:0.1.32-5.git1715c90.el8.src", "8Base-RHOSE-4.1:skopeo-1:0.1.32-5.git1715c90.el8.x86_64", "8Base-RHOSE-4.1:skopeo-debuginfo-1:0.1.32-5.git1715c90.el8.x86_64", "8Base-RHOSE-4.1:skopeo-debugsource-1:0.1.32-5.git1715c90.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/[email protected]/msg06408.html", "url": "https://www.mail-archive.com/[email protected]/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-25T06:26:23+00:00", "details": "Before applying this update, ensure all previously released errata\nrelevant to your system have been applied.\n\nFor OpenShift Container Platform 4.1 see the following documentation, which\nwill be updated shortly for release 4.1.17, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.1/updating/updating-cluster-cli.html.", "product_ids": [ "7Server-RH7-RHOSE-4.1:ansible-service-broker-1:1.4.4-2.el7.src", "7Server-RH7-RHOSE-4.1:ansible-service-broker-1:1.4.4-2.el7.x86_64", "7Server-RH7-RHOSE-4.1:ansible-service-broker-container-scripts-1:1.4.4-2.el7.noarch", "7Server-RH7-RHOSE-4.1:ansible-service-broker-selinux-1:1.4.4-2.el7.noarch", "7Server-RH7-RHOSE-4.1:automation-broker-apb-role-1:1.4.4-2.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHBA-2019:2819" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-4.1:ansible-service-broker-1:1.4.4-2.el7.src", "7Server-RH7-RHOSE-4.1:ansible-service-broker-1:1.4.4-2.el7.x86_64", "7Server-RH7-RHOSE-4.1:ansible-service-broker-container-scripts-1:1.4.4-2.el7.noarch", "7Server-RH7-RHOSE-4.1:ansible-service-broker-selinux-1:1.4.4-2.el7.noarch", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.src", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-svcat-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64", "7Server-RH7-RHOSE-4.1:automation-broker-apb-role-1:1.4.4-2.el7.noarch", "7Server-RH7-RHOSE-4.1:openshift-0:4.1.17-201909170941.git.0.2447974.el7.src", "7Server-RH7-RHOSE-4.1:openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.noarch", "7Server-RH7-RHOSE-4.1:openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.src", "7Server-RH7-RHOSE-4.1:openshift-clients-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "8Base-RHOSE-4.1:containers-common-1:0.1.32-5.git1715c90.el8.x86_64", "8Base-RHOSE-4.1:openshift-0:4.1.17-201909170941.git.0.2447974.el8.src", "8Base-RHOSE-4.1:openshift-clients-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "8Base-RHOSE-4.1:openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "8Base-RHOSE-4.1:openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "8Base-RHOSE-4.1:podman-0:1.0.2-2.dev.git96ccc2e.el8.src", "8Base-RHOSE-4.1:podman-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "8Base-RHOSE-4.1:podman-debuginfo-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "8Base-RHOSE-4.1:podman-debugsource-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "8Base-RHOSE-4.1:podman-docker-0:1.0.2-2.dev.git96ccc2e.el8.noarch", "8Base-RHOSE-4.1:skopeo-1:0.1.32-5.git1715c90.el8.src", "8Base-RHOSE-4.1:skopeo-1:0.1.32-5.git1715c90.el8.x86_64", "8Base-RHOSE-4.1:skopeo-debuginfo-1:0.1.32-5.git1715c90.el8.x86_64", "8Base-RHOSE-4.1:skopeo-debugsource-1:0.1.32-5.git1715c90.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" } ] }
opensuse-su-2024:10805-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "go1.12-1.12.17-4.8 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the go1.12-1.12.17-4.8 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-10805", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10805-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2014-7189 page", "url": "https://www.suse.com/security/cve/CVE-2014-7189/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8618 page", "url": "https://www.suse.com/security/cve/CVE-2015-8618/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3959 page", "url": "https://www.suse.com/security/cve/CVE-2016-3959/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5386 page", "url": "https://www.suse.com/security/cve/CVE-2016-5386/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-15041 page", "url": "https://www.suse.com/security/cve/CVE-2017-15041/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-15042 page", "url": "https://www.suse.com/security/cve/CVE-2017-15042/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-8932 page", "url": "https://www.suse.com/security/cve/CVE-2017-8932/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16873 page", "url": "https://www.suse.com/security/cve/CVE-2018-16873/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16874 page", "url": "https://www.suse.com/security/cve/CVE-2018-16874/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16875 page", "url": "https://www.suse.com/security/cve/CVE-2018-16875/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6574 page", "url": "https://www.suse.com/security/cve/CVE-2018-6574/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11888 page", "url": "https://www.suse.com/security/cve/CVE-2019-11888/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14809 page", "url": "https://www.suse.com/security/cve/CVE-2019-14809/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16276 page", "url": "https://www.suse.com/security/cve/CVE-2019-16276/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-17596 page", "url": "https://www.suse.com/security/cve/CVE-2019-17596/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-6486 page", "url": "https://www.suse.com/security/cve/CVE-2019-6486/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9512 page", "url": "https://www.suse.com/security/cve/CVE-2019-9512/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9514 page", "url": "https://www.suse.com/security/cve/CVE-2019-9514/" } ], "title": "go1.12-1.12.17-4.8 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:10805-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "go1.12-1.12.17-4.8.aarch64", "product": { "name": "go1.12-1.12.17-4.8.aarch64", "product_id": "go1.12-1.12.17-4.8.aarch64" } }, { "category": "product_version", "name": "go1.12-doc-1.12.17-4.8.aarch64", "product": { "name": "go1.12-doc-1.12.17-4.8.aarch64", "product_id": "go1.12-doc-1.12.17-4.8.aarch64" } }, { "category": "product_version", "name": "go1.12-race-1.12.17-4.8.aarch64", "product": { "name": "go1.12-race-1.12.17-4.8.aarch64", "product_id": "go1.12-race-1.12.17-4.8.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "go1.12-1.12.17-4.8.ppc64le", "product": { "name": "go1.12-1.12.17-4.8.ppc64le", "product_id": "go1.12-1.12.17-4.8.ppc64le" } }, { "category": "product_version", "name": "go1.12-doc-1.12.17-4.8.ppc64le", "product": { "name": "go1.12-doc-1.12.17-4.8.ppc64le", "product_id": "go1.12-doc-1.12.17-4.8.ppc64le" } }, { "category": "product_version", "name": "go1.12-race-1.12.17-4.8.ppc64le", "product": { "name": "go1.12-race-1.12.17-4.8.ppc64le", "product_id": "go1.12-race-1.12.17-4.8.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "go1.12-1.12.17-4.8.s390x", "product": { "name": "go1.12-1.12.17-4.8.s390x", "product_id": "go1.12-1.12.17-4.8.s390x" } }, { "category": "product_version", "name": "go1.12-doc-1.12.17-4.8.s390x", "product": { "name": "go1.12-doc-1.12.17-4.8.s390x", "product_id": "go1.12-doc-1.12.17-4.8.s390x" } }, { "category": "product_version", "name": "go1.12-race-1.12.17-4.8.s390x", "product": { "name": "go1.12-race-1.12.17-4.8.s390x", "product_id": "go1.12-race-1.12.17-4.8.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "go1.12-1.12.17-4.8.x86_64", "product": { "name": "go1.12-1.12.17-4.8.x86_64", "product_id": "go1.12-1.12.17-4.8.x86_64" } }, { "category": "product_version", "name": "go1.12-doc-1.12.17-4.8.x86_64", "product": { "name": "go1.12-doc-1.12.17-4.8.x86_64", "product_id": "go1.12-doc-1.12.17-4.8.x86_64" } }, { "category": "product_version", "name": "go1.12-race-1.12.17-4.8.x86_64", "product": { "name": "go1.12-race-1.12.17-4.8.x86_64", "product_id": "go1.12-race-1.12.17-4.8.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "go1.12-1.12.17-4.8.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64" }, "product_reference": "go1.12-1.12.17-4.8.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.12-1.12.17-4.8.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le" }, "product_reference": "go1.12-1.12.17-4.8.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.12-1.12.17-4.8.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x" }, "product_reference": "go1.12-1.12.17-4.8.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.12-1.12.17-4.8.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64" }, "product_reference": "go1.12-1.12.17-4.8.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.12-doc-1.12.17-4.8.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64" }, "product_reference": "go1.12-doc-1.12.17-4.8.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.12-doc-1.12.17-4.8.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le" }, "product_reference": "go1.12-doc-1.12.17-4.8.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.12-doc-1.12.17-4.8.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x" }, "product_reference": "go1.12-doc-1.12.17-4.8.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.12-doc-1.12.17-4.8.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64" }, "product_reference": "go1.12-doc-1.12.17-4.8.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.12-race-1.12.17-4.8.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64" }, "product_reference": "go1.12-race-1.12.17-4.8.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.12-race-1.12.17-4.8.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le" }, "product_reference": "go1.12-race-1.12.17-4.8.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.12-race-1.12.17-4.8.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x" }, "product_reference": "go1.12-race-1.12.17-4.8.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.12-race-1.12.17-4.8.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64" }, "product_reference": "go1.12-race-1.12.17-4.8.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2014-7189", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-7189" } ], "notes": [ { "category": "general", "text": "crpyto/tls in Go 1.1 before 1.3.2, when SessionTicketsDisabled is enabled, allows man-in-the-middle attackers to spoof clients via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-7189", "url": "https://www.suse.com/security/cve/CVE-2014-7189" }, { "category": "external", "summary": "SUSE Bug 898901 for CVE-2014-7189", "url": "https://bugzilla.suse.com/898901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-7189" }, { "cve": "CVE-2015-8618", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8618" } ], "notes": [ { "category": "general", "text": "The Int.Exp Montgomery code in the math/big library in Go 1.5.x before 1.5.3 mishandles carry propagation and produces incorrect output, which makes it easier for attackers to obtain private RSA keys via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8618", "url": "https://www.suse.com/security/cve/CVE-2015-8618" }, { "category": "external", "summary": "SUSE Bug 957814 for CVE-2015-8618", "url": "https://bugzilla.suse.com/957814" }, { "category": "external", "summary": "SUSE Bug 960151 for CVE-2015-8618", "url": "https://bugzilla.suse.com/960151" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-8618" }, { "cve": "CVE-2016-3959", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3959" } ], "notes": [ { "category": "general", "text": "The Verify function in crypto/dsa/dsa.go in Go before 1.5.4 and 1.6.x before 1.6.1 does not properly check parameters passed to the big integer library, which might allow remote attackers to cause a denial of service (infinite loop) via a crafted public key to a program that uses HTTPS client certificates or SSH server libraries.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3959", "url": "https://www.suse.com/security/cve/CVE-2016-3959" }, { "category": "external", "summary": "SUSE Bug 974232 for CVE-2016-3959", "url": "https://bugzilla.suse.com/974232" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-3959" }, { "cve": "CVE-2016-5386", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5386" } ], "notes": [ { "category": "general", "text": "The net/http package in Go through 1.6 does not attempt to address RFC 3875 section 4.1.18 namespace conflicts and therefore does not protect CGI applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect a CGI application\u0027s outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an \"httpoxy\" issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5386", "url": "https://www.suse.com/security/cve/CVE-2016-5386" }, { "category": "external", "summary": "SUSE Bug 988484 for CVE-2016-5386", "url": "https://bugzilla.suse.com/988484" }, { "category": "external", "summary": "SUSE Bug 988486 for CVE-2016-5386", "url": "https://bugzilla.suse.com/988486" }, { "category": "external", "summary": "SUSE Bug 988487 for CVE-2016-5386", "url": "https://bugzilla.suse.com/988487" }, { "category": "external", "summary": "SUSE Bug 988488 for CVE-2016-5386", "url": "https://bugzilla.suse.com/988488" }, { "category": "external", "summary": "SUSE Bug 988489 for CVE-2016-5386", "url": "https://bugzilla.suse.com/988489" }, { "category": "external", "summary": "SUSE Bug 988491 for CVE-2016-5386", "url": "https://bugzilla.suse.com/988491" }, { "category": "external", "summary": "SUSE Bug 988492 for CVE-2016-5386", "url": "https://bugzilla.suse.com/988492" }, { "category": "external", "summary": "SUSE Bug 989125 for CVE-2016-5386", "url": "https://bugzilla.suse.com/989125" }, { "category": "external", "summary": "SUSE Bug 989174 for CVE-2016-5386", "url": "https://bugzilla.suse.com/989174" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-5386" }, { "cve": "CVE-2017-15041", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-15041" } ], "notes": [ { "category": "general", "text": "Go before 1.8.4 and 1.9.x before 1.9.1 allows \"go get\" remote command execution. Using custom domains, it is possible to arrange things so that example.com/pkg1 points to a Subversion repository but example.com/pkg1/pkg2 points to a Git repository. If the Subversion repository includes a Git checkout in its pkg2 directory and some other work is done to ensure the proper ordering of operations, \"go get\" can be tricked into reusing this Git checkout for the fetch of code from pkg2. If the Subversion repository\u0027s Git checkout has malicious commands in .git/hooks/, they will execute on the system running \"go get.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-15041", "url": "https://www.suse.com/security/cve/CVE-2017-15041" }, { "category": "external", "summary": "SUSE Bug 1062085 for CVE-2017-15041", "url": "https://bugzilla.suse.com/1062085" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2017-15041" }, { "cve": "CVE-2017-15042", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-15042" } ], "notes": [ { "category": "general", "text": "An unintended cleartext issue exists in Go before 1.8.4 and 1.9.x before 1.9.1. RFC 4954 requires that, during SMTP, the PLAIN auth scheme must only be used on network connections secured with TLS. The original implementation of smtp.PlainAuth in Go 1.0 enforced this requirement, and it was documented to do so. In 2013, upstream issue #5184, this was changed so that the server may decide whether PLAIN is acceptable. The result is that if you set up a man-in-the-middle SMTP server that doesn\u0027t advertise STARTTLS and does advertise that PLAIN auth is OK, the smtp.PlainAuth implementation sends the username and password.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-15042", "url": "https://www.suse.com/security/cve/CVE-2017-15042" }, { "category": "external", "summary": "SUSE Bug 1062087 for CVE-2017-15042", "url": "https://bugzilla.suse.com/1062087" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-15042" }, { "cve": "CVE-2017-8932", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-8932" } ], "notes": [ { "category": "general", "text": "A bug in the standard library ScalarMult implementation of curve P-256 for amd64 architectures in Go before 1.7.6 and 1.8.x before 1.8.2 causes incorrect results to be generated for specific input points. An adaptive attack can be mounted to progressively extract the scalar input to ScalarMult by submitting crafted points and observing failures to the derive correct output. This leads to a full key recovery attack against static ECDH, as used in popular JWT libraries.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-8932", "url": "https://www.suse.com/security/cve/CVE-2017-8932" }, { "category": "external", "summary": "SUSE Bug 1040618 for CVE-2017-8932", "url": "https://bugzilla.suse.com/1040618" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-8932" }, { "cve": "CVE-2018-16873", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16873" } ], "notes": [ { "category": "general", "text": "In Go before 1.10.6 and 1.11.x before 1.11.3, the \"go get\" command is vulnerable to remote code execution when executed with the -u flag and the import path of a malicious Go package, or a package that imports it directly or indirectly. Specifically, it is only vulnerable in GOPATH mode, but not in module mode (the distinction is documented at https://golang.org/cmd/go/#hdr-Module_aware_go_get). Using custom domains, it\u0027s possible to arrange things so that a Git repository is cloned to a folder named \".git\" by using a vanity import path that ends with \"/.git\". If the Git repository root contains a \"HEAD\" file, a \"config\" file, an \"objects\" directory, a \"refs\" directory, with some work to ensure the proper ordering of operations, \"go get -u\" can be tricked into considering the parent directory as a repository root, and running Git commands on it. That will use the \"config\" file in the original Git repository root for its configuration, and if that config file contains malicious commands, they will execute on the system running \"go get -u\".", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16873", "url": "https://www.suse.com/security/cve/CVE-2018-16873" }, { "category": "external", "summary": "SUSE Bug 1118897 for CVE-2018-16873", "url": "https://bugzilla.suse.com/1118897" }, { "category": "external", "summary": "SUSE Bug 1118898 for CVE-2018-16873", "url": "https://bugzilla.suse.com/1118898" }, { "category": "external", "summary": "SUSE Bug 1118899 for CVE-2018-16873", "url": "https://bugzilla.suse.com/1118899" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-16873" }, { "cve": "CVE-2018-16874", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16874" } ], "notes": [ { "category": "general", "text": "In Go before 1.10.6 and 1.11.x before 1.11.3, the \"go get\" command is vulnerable to directory traversal when executed with the import path of a malicious Go package which contains curly braces (both \u0027{\u0027 and \u0027}\u0027 characters). Specifically, it is only vulnerable in GOPATH mode, but not in module mode (the distinction is documented at https://golang.org/cmd/go/#hdr-Module_aware_go_get). The attacker can cause an arbitrary filesystem write, which can lead to code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16874", "url": "https://www.suse.com/security/cve/CVE-2018-16874" }, { "category": "external", "summary": "SUSE Bug 1118897 for CVE-2018-16874", "url": "https://bugzilla.suse.com/1118897" }, { "category": "external", "summary": "SUSE Bug 1118898 for CVE-2018-16874", "url": "https://bugzilla.suse.com/1118898" }, { "category": "external", "summary": "SUSE Bug 1118899 for CVE-2018-16874", "url": "https://bugzilla.suse.com/1118899" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-16874" }, { "cve": "CVE-2018-16875", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16875" } ], "notes": [ { "category": "general", "text": "The crypto/x509 package of Go before 1.10.6 and 1.11.x before 1.11.3 does not limit the amount of work performed for each chain verification, which might allow attackers to craft pathological inputs leading to a CPU denial of service. Go TLS servers accepting client certificates and TLS clients are affected.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16875", "url": "https://www.suse.com/security/cve/CVE-2018-16875" }, { "category": "external", "summary": "SUSE Bug 1118897 for CVE-2018-16875", "url": "https://bugzilla.suse.com/1118897" }, { "category": "external", "summary": "SUSE Bug 1118898 for CVE-2018-16875", "url": "https://bugzilla.suse.com/1118898" }, { "category": "external", "summary": "SUSE Bug 1118899 for CVE-2018-16875", "url": "https://bugzilla.suse.com/1118899" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-16875" }, { "cve": "CVE-2018-6574", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-6574" } ], "notes": [ { "category": "general", "text": "Go before 1.8.7, Go 1.9.x before 1.9.4, and Go 1.10 pre-releases before Go 1.10rc2 allow \"go get\" remote command execution during source code build, by leveraging the gcc or clang plugin feature, because -fplugin= and -plugin= arguments were not blocked.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-6574", "url": "https://www.suse.com/security/cve/CVE-2018-6574" }, { "category": "external", "summary": "SUSE Bug 1080006 for CVE-2018-6574", "url": "https://bugzilla.suse.com/1080006" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-6574" }, { "cve": "CVE-2019-11888", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11888" } ], "notes": [ { "category": "general", "text": "Go through 1.12.5 on Windows mishandles process creation with a nil environment in conjunction with a non-nil token, which allows attackers to obtain sensitive information or gain privileges.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11888", "url": "https://www.suse.com/security/cve/CVE-2019-11888" }, { "category": "external", "summary": "SUSE Bug 1146203 for CVE-2019-11888", "url": "https://bugzilla.suse.com/1146203" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2019-11888" }, { "cve": "CVE-2019-14809", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14809" } ], "notes": [ { "category": "general", "text": "net/url in Go before 1.11.13 and 1.12.x before 1.12.8 mishandles malformed hosts in URLs, leading to an authorization bypass in some applications. This is related to a Host field with a suffix appearing in neither Hostname() nor Port(), and is related to a non-numeric port number. For example, an attacker can compose a crafted javascript:// URL that results in a hostname of google.com.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14809", "url": "https://www.suse.com/security/cve/CVE-2019-14809" }, { "category": "external", "summary": "SUSE Bug 1146123 for CVE-2019-14809", "url": "https://bugzilla.suse.com/1146123" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2019-14809" }, { "cve": "CVE-2019-16276", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16276" } ], "notes": [ { "category": "general", "text": "Go before 1.12.10 and 1.13.x before 1.13.1 allow HTTP Request Smuggling.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16276", "url": "https://www.suse.com/security/cve/CVE-2019-16276" }, { "category": "external", "summary": "SUSE Bug 1152082 for CVE-2019-16276", "url": "https://bugzilla.suse.com/1152082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-16276" }, { "cve": "CVE-2019-17596", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-17596" } ], "notes": [ { "category": "general", "text": "Go before 1.12.11 and 1.3.x before 1.13.2 can panic upon an attempt to process network traffic containing an invalid DSA public key. There are several attack scenarios, such as traffic from a client to a server that verifies client certificates.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-17596", "url": "https://www.suse.com/security/cve/CVE-2019-17596" }, { "category": "external", "summary": "SUSE Bug 1154402 for CVE-2019-17596", "url": "https://bugzilla.suse.com/1154402" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-17596" }, { "cve": "CVE-2019-6486", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-6486" } ], "notes": [ { "category": "general", "text": "Go before 1.10.8 and 1.11.x before 1.11.5 mishandles P-521 and P-384 elliptic curves, which allows attackers to cause a denial of service (CPU consumption) or possibly conduct ECDH private key recovery attacks.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-6486", "url": "https://www.suse.com/security/cve/CVE-2019-6486" }, { "category": "external", "summary": "SUSE Bug 1123013 for CVE-2019-6486", "url": "https://bugzilla.suse.com/1123013" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-6486" }, { "cve": "CVE-2019-9512", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9512" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9512", "url": "https://www.suse.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146099 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1146099" }, { "category": "external", "summary": "SUSE Bug 1146111 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1146111" }, { "category": "external", "summary": "SUSE Bug 1147142 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1147142" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-9512" }, { "cve": "CVE-2019-9514", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9514" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9514", "url": "https://www.suse.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "SUSE Bug 1145662 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1145662" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146095 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1146095" }, { "category": "external", "summary": "SUSE Bug 1146115 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1146115" }, { "category": "external", "summary": "SUSE Bug 1147142 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1147142" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x", "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-9514" } ] }
opensuse-su-2019:2114-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for nodejs10", "title": "Title of the patch" }, { "category": "description", "text": "This update for nodejs10 to version 10.16.3 fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2019-9511: Fixed HTTP/2 implementations that are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service (bsc#1146091).\n- CVE-2019-9512: Fixed HTTP/2 flood using PING frames results in unbounded memory growth (bsc#1146099).\n- CVE-2019-9513: Fixed HTTP/2 implementation that is vulnerable to resource loops, potentially leading to a denial of service. (bsc#1146094).\n- CVE-2019-9514: Fixed HTTP/2 implementation that is vulnerable to a reset flood, potentially leading to a denial of service (bsc#1146095).\n- CVE-2019-9515: Fixed HTTP/2 flood using SETTINGS frames results in unbounded memory growth (bsc#1146100).\n- CVE-2019-9516: Fixed HTTP/2 implementation that is vulnerable to a header leak, potentially leading to a denial of service (bsc#1146090).\n- CVE-2019-9517: Fixed HTTP/2 implementations that are vulnerable to unconstrained interal data buffering (bsc#1146097).\n- CVE-2019-9518: Fixed HTTP/2 implementation that is vulnerable to a flood of empty frames, potentially leading to a denial of service (bsc#1146093).\n\nThis update was imported from the SUSE:SLE-15:Update update project.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2019-2114", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_2114-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2019:2114-1", "url": "https://lists.opensuse.org/archives/list/[email protected]/thread/R3H4KAW53AW5JRYOIFARBV2NZCYA2XCC/#R3H4KAW53AW5JRYOIFARBV2NZCYA2XCC" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2019:2114-1", "url": "https://lists.opensuse.org/archives/list/[email protected]/thread/R3H4KAW53AW5JRYOIFARBV2NZCYA2XCC/#R3H4KAW53AW5JRYOIFARBV2NZCYA2XCC" }, { "category": "self", "summary": "SUSE Bug 1146090", "url": "https://bugzilla.suse.com/1146090" }, { "category": "self", "summary": "SUSE Bug 1146091", "url": "https://bugzilla.suse.com/1146091" }, { "category": "self", "summary": "SUSE Bug 1146093", "url": "https://bugzilla.suse.com/1146093" }, { "category": "self", "summary": "SUSE Bug 1146094", "url": "https://bugzilla.suse.com/1146094" }, { "category": "self", "summary": "SUSE Bug 1146095", "url": "https://bugzilla.suse.com/1146095" }, { "category": "self", "summary": "SUSE Bug 1146097", "url": "https://bugzilla.suse.com/1146097" }, { "category": "self", "summary": "SUSE Bug 1146099", "url": "https://bugzilla.suse.com/1146099" }, { "category": "self", "summary": "SUSE Bug 1146100", "url": "https://bugzilla.suse.com/1146100" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9511 page", "url": "https://www.suse.com/security/cve/CVE-2019-9511/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9512 page", "url": "https://www.suse.com/security/cve/CVE-2019-9512/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9513 page", "url": "https://www.suse.com/security/cve/CVE-2019-9513/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9514 page", "url": "https://www.suse.com/security/cve/CVE-2019-9514/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9515 page", "url": "https://www.suse.com/security/cve/CVE-2019-9515/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9516 page", "url": "https://www.suse.com/security/cve/CVE-2019-9516/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9517 page", "url": "https://www.suse.com/security/cve/CVE-2019-9517/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9518 page", "url": "https://www.suse.com/security/cve/CVE-2019-9518/" } ], "title": "Security update for nodejs10", "tracking": { "current_release_date": "2019-09-10T16:22:24Z", "generator": { "date": "2019-09-10T16:22:24Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2019:2114-1", "initial_release_date": "2019-09-10T16:22:24Z", "revision_history": [ { "date": "2019-09-10T16:22:24Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "nodejs10-10.16.3-lp151.2.6.1.i586", "product": { "name": "nodejs10-10.16.3-lp151.2.6.1.i586", "product_id": "nodejs10-10.16.3-lp151.2.6.1.i586" } }, { "category": "product_version", "name": "nodejs10-devel-10.16.3-lp151.2.6.1.i586", "product": { "name": "nodejs10-devel-10.16.3-lp151.2.6.1.i586", "product_id": "nodejs10-devel-10.16.3-lp151.2.6.1.i586" } }, { "category": "product_version", "name": "npm10-10.16.3-lp151.2.6.1.i586", "product": { "name": "npm10-10.16.3-lp151.2.6.1.i586", "product_id": "npm10-10.16.3-lp151.2.6.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "product": { "name": "nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "product_id": "nodejs10-docs-10.16.3-lp151.2.6.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "nodejs10-10.16.3-lp151.2.6.1.x86_64", "product": { "name": "nodejs10-10.16.3-lp151.2.6.1.x86_64", "product_id": "nodejs10-10.16.3-lp151.2.6.1.x86_64" } }, { "category": "product_version", "name": "nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "product": { "name": "nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "product_id": "nodejs10-devel-10.16.3-lp151.2.6.1.x86_64" } }, { "category": "product_version", "name": "npm10-10.16.3-lp151.2.6.1.x86_64", "product": { "name": "npm10-10.16.3-lp151.2.6.1.x86_64", "product_id": "npm10-10.16.3-lp151.2.6.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.0", "product": { "name": "openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.0" } } }, { "category": "product_name", "name": "openSUSE Leap 15.1", "product": { "name": "openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.16.3-lp151.2.6.1.i586 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.i586" }, "product_reference": "nodejs10-10.16.3-lp151.2.6.1.i586", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.16.3-lp151.2.6.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.x86_64" }, "product_reference": "nodejs10-10.16.3-lp151.2.6.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.16.3-lp151.2.6.1.i586 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.i586" }, "product_reference": "nodejs10-devel-10.16.3-lp151.2.6.1.i586", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.16.3-lp151.2.6.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64" }, "product_reference": "nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-docs-10.16.3-lp151.2.6.1.noarch as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:nodejs10-docs-10.16.3-lp151.2.6.1.noarch" }, "product_reference": "nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.16.3-lp151.2.6.1.i586 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.i586" }, "product_reference": "npm10-10.16.3-lp151.2.6.1.i586", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.16.3-lp151.2.6.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.x86_64" }, "product_reference": "npm10-10.16.3-lp151.2.6.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.16.3-lp151.2.6.1.i586 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.i586" }, "product_reference": "nodejs10-10.16.3-lp151.2.6.1.i586", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.16.3-lp151.2.6.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.x86_64" }, "product_reference": "nodejs10-10.16.3-lp151.2.6.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.16.3-lp151.2.6.1.i586 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.i586" }, "product_reference": "nodejs10-devel-10.16.3-lp151.2.6.1.i586", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.16.3-lp151.2.6.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64" }, "product_reference": "nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-docs-10.16.3-lp151.2.6.1.noarch as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:nodejs10-docs-10.16.3-lp151.2.6.1.noarch" }, "product_reference": "nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.16.3-lp151.2.6.1.i586 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.i586" }, "product_reference": "npm10-10.16.3-lp151.2.6.1.i586", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.16.3-lp151.2.6.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.x86_64" }, "product_reference": "npm10-10.16.3-lp151.2.6.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-9511", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9511" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9511", "url": "https://www.suse.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "SUSE Bug 1145579 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1145579" }, { "category": "external", "summary": "SUSE Bug 1146091 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1146091" }, { "category": "external", "summary": "SUSE Bug 1146182 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1146182" }, { "category": "external", "summary": "SUSE Bug 1193427 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1193427" }, { "category": "external", "summary": "SUSE Bug 1202787 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1202787" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-10T16:22:24Z", "details": "important" } ], "title": "CVE-2019-9511" }, { "cve": "CVE-2019-9512", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9512" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9512", "url": "https://www.suse.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146099 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1146099" }, { "category": "external", "summary": "SUSE Bug 1146111 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1146111" }, { "category": "external", "summary": "SUSE Bug 1147142 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1147142" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-10T16:22:24Z", "details": "important" } ], "title": "CVE-2019-9512" }, { "cve": "CVE-2019-9513", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9513" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9513", "url": "https://www.suse.com/security/cve/CVE-2019-9513" }, { "category": "external", "summary": "SUSE Bug 1145580 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1145580" }, { "category": "external", "summary": "SUSE Bug 1146094 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1146094" }, { "category": "external", "summary": "SUSE Bug 1146184 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1146184" }, { "category": "external", "summary": "SUSE Bug 1193427 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1193427" }, { "category": "external", "summary": "SUSE Bug 1202787 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1202787" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-10T16:22:24Z", "details": "important" } ], "title": "CVE-2019-9513" }, { "cve": "CVE-2019-9514", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9514" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9514", "url": "https://www.suse.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "SUSE Bug 1145662 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1145662" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146095 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1146095" }, { "category": "external", "summary": "SUSE Bug 1146115 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1146115" }, { "category": "external", "summary": "SUSE Bug 1147142 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1147142" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-10T16:22:24Z", "details": "important" } ], "title": "CVE-2019-9514" }, { "cve": "CVE-2019-9515", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9515" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a denial of service. The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the peer reply with one acknowledgement per SETTINGS frame, an empty SETTINGS frame is almost equivalent in behavior to a ping. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9515", "url": "https://www.suse.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9515", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146100 for CVE-2019-9515", "url": "https://bugzilla.suse.com/1146100" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-10T16:22:24Z", "details": "important" } ], "title": "CVE-2019-9515" }, { "cve": "CVE-2019-9516", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9516" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9516", "url": "https://www.suse.com/security/cve/CVE-2019-9516" }, { "category": "external", "summary": "SUSE Bug 1145582 for CVE-2019-9516", "url": "https://bugzilla.suse.com/1145582" }, { "category": "external", "summary": "SUSE Bug 1146090 for CVE-2019-9516", "url": "https://bugzilla.suse.com/1146090" }, { "category": "external", "summary": "SUSE Bug 1193427 for CVE-2019-9516", "url": "https://bugzilla.suse.com/1193427" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-10T16:22:24Z", "details": "important" } ], "title": "CVE-2019-9516" }, { "cve": "CVE-2019-9517", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9517" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to unconstrained interal data buffering, potentially leading to a denial of service. The attacker opens the HTTP/2 window so the peer can send without constraint; however, they leave the TCP window closed so the peer cannot actually write (many of) the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the servers queue the responses, this can consume excess memory, CPU, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9517", "url": "https://www.suse.com/security/cve/CVE-2019-9517" }, { "category": "external", "summary": "SUSE Bug 1145575 for CVE-2019-9517", "url": "https://bugzilla.suse.com/1145575" }, { "category": "external", "summary": "SUSE Bug 1146097 for CVE-2019-9517", "url": "https://bugzilla.suse.com/1146097" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-10T16:22:24Z", "details": "important" } ], "title": "CVE-2019-9517" }, { "cve": "CVE-2019-9518", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9518" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer spends time processing each frame disproportionate to attack bandwidth. This can consume excess CPU.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9518", "url": "https://www.suse.com/security/cve/CVE-2019-9518" }, { "category": "external", "summary": "SUSE Bug 1145662 for CVE-2019-9518", "url": "https://bugzilla.suse.com/1145662" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9518", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146093 for CVE-2019-9518", "url": "https://bugzilla.suse.com/1146093" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-10T16:22:24Z", "details": "important" } ], "title": "CVE-2019-9518" } ] }
opensuse-su-2019:2130-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for go1.12", "title": "Title of the patch" }, { "category": "description", "text": "This update for go1.12 fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2019-9512: Fixed HTTP/2 flood using PING frames that results in unbounded memory growth (bsc#1146111).\n- CVE-2019-9514: Fixed HTTP/2 implementation that is vulnerable to a reset flood, potentially leading to a denial of service (bsc#1146115).\n- CVE-2019-14809: Fixed malformed hosts in URLs that leads to authorization bypass (bsc#1146123).\n\nBugfixes:\n\n- Update to go version 1.12.9 (bsc#1141689).\n- Adding Web Assembly stuff from misc/wasm (bsc#1139210).\n\nThis update was imported from the SUSE:SLE-15:Update update project.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2019-2130", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_2130-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2019:2130-1", "url": "https://lists.opensuse.org/archives/list/[email protected]/thread/STTKQXKGK7AYG47JA3WXKGWSW6TYWICU/#STTKQXKGK7AYG47JA3WXKGWSW6TYWICU" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2019:2130-1", "url": "https://lists.opensuse.org/archives/list/[email protected]/thread/STTKQXKGK7AYG47JA3WXKGWSW6TYWICU/#STTKQXKGK7AYG47JA3WXKGWSW6TYWICU" }, { "category": "self", "summary": "SUSE Bug 1139210", "url": "https://bugzilla.suse.com/1139210" }, { "category": "self", "summary": "SUSE Bug 1141689", "url": "https://bugzilla.suse.com/1141689" }, { "category": "self", "summary": "SUSE Bug 1146111", "url": "https://bugzilla.suse.com/1146111" }, { "category": "self", "summary": "SUSE Bug 1146115", "url": "https://bugzilla.suse.com/1146115" }, { "category": "self", "summary": "SUSE Bug 1146123", "url": "https://bugzilla.suse.com/1146123" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14809 page", "url": "https://www.suse.com/security/cve/CVE-2019-14809/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9512 page", "url": "https://www.suse.com/security/cve/CVE-2019-9512/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9514 page", "url": "https://www.suse.com/security/cve/CVE-2019-9514/" } ], "title": "Security update for go1.12", "tracking": { "current_release_date": "2019-09-14T12:16:57Z", "generator": { "date": "2019-09-14T12:16:57Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2019:2130-1", "initial_release_date": "2019-09-14T12:16:57Z", "revision_history": [ { "date": "2019-09-14T12:16:57Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "go1.12-1.12.9-lp151.2.21.1.x86_64", "product": { "name": "go1.12-1.12.9-lp151.2.21.1.x86_64", "product_id": "go1.12-1.12.9-lp151.2.21.1.x86_64" } }, { "category": "product_version", "name": "go1.12-doc-1.12.9-lp151.2.21.1.x86_64", "product": { "name": "go1.12-doc-1.12.9-lp151.2.21.1.x86_64", "product_id": "go1.12-doc-1.12.9-lp151.2.21.1.x86_64" } }, { "category": "product_version", "name": "go1.12-race-1.12.9-lp151.2.21.1.x86_64", "product": { "name": "go1.12-race-1.12.9-lp151.2.21.1.x86_64", "product_id": "go1.12-race-1.12.9-lp151.2.21.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.1", "product": { "name": "openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "go1.12-1.12.9-lp151.2.21.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:go1.12-1.12.9-lp151.2.21.1.x86_64" }, "product_reference": "go1.12-1.12.9-lp151.2.21.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.12-doc-1.12.9-lp151.2.21.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:go1.12-doc-1.12.9-lp151.2.21.1.x86_64" }, "product_reference": "go1.12-doc-1.12.9-lp151.2.21.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.12-race-1.12.9-lp151.2.21.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:go1.12-race-1.12.9-lp151.2.21.1.x86_64" }, "product_reference": "go1.12-race-1.12.9-lp151.2.21.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-14809", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14809" } ], "notes": [ { "category": "general", "text": "net/url in Go before 1.11.13 and 1.12.x before 1.12.8 mishandles malformed hosts in URLs, leading to an authorization bypass in some applications. This is related to a Host field with a suffix appearing in neither Hostname() nor Port(), and is related to a non-numeric port number. For example, an attacker can compose a crafted javascript:// URL that results in a hostname of google.com.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:go1.12-1.12.9-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:go1.12-doc-1.12.9-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:go1.12-race-1.12.9-lp151.2.21.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14809", "url": "https://www.suse.com/security/cve/CVE-2019-14809" }, { "category": "external", "summary": "SUSE Bug 1146123 for CVE-2019-14809", "url": "https://bugzilla.suse.com/1146123" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:go1.12-1.12.9-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:go1.12-doc-1.12.9-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:go1.12-race-1.12.9-lp151.2.21.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.1:go1.12-1.12.9-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:go1.12-doc-1.12.9-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:go1.12-race-1.12.9-lp151.2.21.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-14T12:16:57Z", "details": "critical" } ], "title": "CVE-2019-14809" }, { "cve": "CVE-2019-9512", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9512" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:go1.12-1.12.9-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:go1.12-doc-1.12.9-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:go1.12-race-1.12.9-lp151.2.21.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9512", "url": "https://www.suse.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146099 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1146099" }, { "category": "external", "summary": "SUSE Bug 1146111 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1146111" }, { "category": "external", "summary": "SUSE Bug 1147142 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1147142" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:go1.12-1.12.9-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:go1.12-doc-1.12.9-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:go1.12-race-1.12.9-lp151.2.21.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:go1.12-1.12.9-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:go1.12-doc-1.12.9-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:go1.12-race-1.12.9-lp151.2.21.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-14T12:16:57Z", "details": "important" } ], "title": "CVE-2019-9512" }, { "cve": "CVE-2019-9514", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9514" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:go1.12-1.12.9-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:go1.12-doc-1.12.9-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:go1.12-race-1.12.9-lp151.2.21.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9514", "url": "https://www.suse.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "SUSE Bug 1145662 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1145662" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146095 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1146095" }, { "category": "external", "summary": "SUSE Bug 1146115 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1146115" }, { "category": "external", "summary": "SUSE Bug 1147142 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1147142" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:go1.12-1.12.9-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:go1.12-doc-1.12.9-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:go1.12-race-1.12.9-lp151.2.21.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:go1.12-1.12.9-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:go1.12-doc-1.12.9-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:go1.12-race-1.12.9-lp151.2.21.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-14T12:16:57Z", "details": "important" } ], "title": "CVE-2019-9514" } ] }
opensuse-su-2019:2056-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for go1.12", "title": "Title of the patch" }, { "category": "description", "text": "This update for go1.12 fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2019-9512: Fixed HTTP/2 flood using PING frames that results in unbounded memory growth (bsc#1146111).\n- CVE-2019-9514: Fixed HTTP/2 implementation that is vulnerable to a reset flood, potentially leading to a denial of service (bsc#1146115).\n- CVE-2019-14809: Fixed malformed hosts in URLs that leads to authorization bypass (bsc#1146123).\n\nBugfixes:\n\n- Update to go version 1.12.9 (bsc#1141689).\n- Adding Web Assembly stuff from misc/wasm (bsc#1139210).\n\nThis update was imported from the SUSE:SLE-15:Update update project.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2019-2056", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_2056-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2019:2056-1", "url": "https://lists.opensuse.org/archives/list/[email protected]/thread/LE2FKAGHX7TQTQPVJRI4PFRX7OYCDOCT/#LE2FKAGHX7TQTQPVJRI4PFRX7OYCDOCT" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2019:2056-1", "url": "https://lists.opensuse.org/archives/list/[email protected]/thread/LE2FKAGHX7TQTQPVJRI4PFRX7OYCDOCT/#LE2FKAGHX7TQTQPVJRI4PFRX7OYCDOCT" }, { "category": "self", "summary": "SUSE Bug 1139210", "url": "https://bugzilla.suse.com/1139210" }, { "category": "self", "summary": "SUSE Bug 1141689", "url": "https://bugzilla.suse.com/1141689" }, { "category": "self", "summary": "SUSE Bug 1146111", "url": "https://bugzilla.suse.com/1146111" }, { "category": "self", "summary": "SUSE Bug 1146115", "url": "https://bugzilla.suse.com/1146115" }, { "category": "self", "summary": "SUSE Bug 1146123", "url": "https://bugzilla.suse.com/1146123" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14809 page", "url": "https://www.suse.com/security/cve/CVE-2019-14809/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9512 page", "url": "https://www.suse.com/security/cve/CVE-2019-9512/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9514 page", "url": "https://www.suse.com/security/cve/CVE-2019-9514/" } ], "title": "Security update for go1.12", "tracking": { "current_release_date": "2019-09-02T12:21:15Z", "generator": { "date": "2019-09-02T12:21:15Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2019:2056-1", "initial_release_date": "2019-09-02T12:21:15Z", "revision_history": [ { "date": "2019-09-02T12:21:15Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "go1.12-1.12.9-lp151.2.13.1.x86_64", "product": { "name": "go1.12-1.12.9-lp151.2.13.1.x86_64", "product_id": "go1.12-1.12.9-lp151.2.13.1.x86_64" } }, { "category": "product_version", "name": "go1.12-doc-1.12.9-lp151.2.13.1.x86_64", "product": { "name": "go1.12-doc-1.12.9-lp151.2.13.1.x86_64", "product_id": "go1.12-doc-1.12.9-lp151.2.13.1.x86_64" } }, { "category": "product_version", "name": "go1.12-race-1.12.9-lp151.2.13.1.x86_64", "product": { "name": "go1.12-race-1.12.9-lp151.2.13.1.x86_64", "product_id": "go1.12-race-1.12.9-lp151.2.13.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.0", "product": { "name": "openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.0" } } }, { "category": "product_name", "name": "openSUSE Leap 15.1", "product": { "name": "openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "go1.12-1.12.9-lp151.2.13.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:go1.12-1.12.9-lp151.2.13.1.x86_64" }, "product_reference": "go1.12-1.12.9-lp151.2.13.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "go1.12-doc-1.12.9-lp151.2.13.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:go1.12-doc-1.12.9-lp151.2.13.1.x86_64" }, "product_reference": "go1.12-doc-1.12.9-lp151.2.13.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "go1.12-race-1.12.9-lp151.2.13.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:go1.12-race-1.12.9-lp151.2.13.1.x86_64" }, "product_reference": "go1.12-race-1.12.9-lp151.2.13.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "go1.12-1.12.9-lp151.2.13.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:go1.12-1.12.9-lp151.2.13.1.x86_64" }, "product_reference": "go1.12-1.12.9-lp151.2.13.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.12-doc-1.12.9-lp151.2.13.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:go1.12-doc-1.12.9-lp151.2.13.1.x86_64" }, "product_reference": "go1.12-doc-1.12.9-lp151.2.13.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.12-race-1.12.9-lp151.2.13.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:go1.12-race-1.12.9-lp151.2.13.1.x86_64" }, "product_reference": "go1.12-race-1.12.9-lp151.2.13.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-14809", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14809" } ], "notes": [ { "category": "general", "text": "net/url in Go before 1.11.13 and 1.12.x before 1.12.8 mishandles malformed hosts in URLs, leading to an authorization bypass in some applications. This is related to a Host field with a suffix appearing in neither Hostname() nor Port(), and is related to a non-numeric port number. For example, an attacker can compose a crafted javascript:// URL that results in a hostname of google.com.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:go1.12-1.12.9-lp151.2.13.1.x86_64", "openSUSE Leap 15.0:go1.12-doc-1.12.9-lp151.2.13.1.x86_64", "openSUSE Leap 15.0:go1.12-race-1.12.9-lp151.2.13.1.x86_64", "openSUSE Leap 15.1:go1.12-1.12.9-lp151.2.13.1.x86_64", "openSUSE Leap 15.1:go1.12-doc-1.12.9-lp151.2.13.1.x86_64", "openSUSE Leap 15.1:go1.12-race-1.12.9-lp151.2.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14809", "url": "https://www.suse.com/security/cve/CVE-2019-14809" }, { "category": "external", "summary": "SUSE Bug 1146123 for CVE-2019-14809", "url": "https://bugzilla.suse.com/1146123" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:go1.12-1.12.9-lp151.2.13.1.x86_64", "openSUSE Leap 15.0:go1.12-doc-1.12.9-lp151.2.13.1.x86_64", "openSUSE Leap 15.0:go1.12-race-1.12.9-lp151.2.13.1.x86_64", "openSUSE Leap 15.1:go1.12-1.12.9-lp151.2.13.1.x86_64", "openSUSE Leap 15.1:go1.12-doc-1.12.9-lp151.2.13.1.x86_64", "openSUSE Leap 15.1:go1.12-race-1.12.9-lp151.2.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.0:go1.12-1.12.9-lp151.2.13.1.x86_64", "openSUSE Leap 15.0:go1.12-doc-1.12.9-lp151.2.13.1.x86_64", "openSUSE Leap 15.0:go1.12-race-1.12.9-lp151.2.13.1.x86_64", "openSUSE Leap 15.1:go1.12-1.12.9-lp151.2.13.1.x86_64", "openSUSE Leap 15.1:go1.12-doc-1.12.9-lp151.2.13.1.x86_64", "openSUSE Leap 15.1:go1.12-race-1.12.9-lp151.2.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-02T12:21:15Z", "details": "critical" } ], "title": "CVE-2019-14809" }, { "cve": "CVE-2019-9512", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9512" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:go1.12-1.12.9-lp151.2.13.1.x86_64", "openSUSE Leap 15.0:go1.12-doc-1.12.9-lp151.2.13.1.x86_64", "openSUSE Leap 15.0:go1.12-race-1.12.9-lp151.2.13.1.x86_64", "openSUSE Leap 15.1:go1.12-1.12.9-lp151.2.13.1.x86_64", "openSUSE Leap 15.1:go1.12-doc-1.12.9-lp151.2.13.1.x86_64", "openSUSE Leap 15.1:go1.12-race-1.12.9-lp151.2.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9512", "url": "https://www.suse.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146099 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1146099" }, { "category": "external", "summary": "SUSE Bug 1146111 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1146111" }, { "category": "external", "summary": "SUSE Bug 1147142 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1147142" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:go1.12-1.12.9-lp151.2.13.1.x86_64", "openSUSE Leap 15.0:go1.12-doc-1.12.9-lp151.2.13.1.x86_64", "openSUSE Leap 15.0:go1.12-race-1.12.9-lp151.2.13.1.x86_64", "openSUSE Leap 15.1:go1.12-1.12.9-lp151.2.13.1.x86_64", "openSUSE Leap 15.1:go1.12-doc-1.12.9-lp151.2.13.1.x86_64", "openSUSE Leap 15.1:go1.12-race-1.12.9-lp151.2.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.0:go1.12-1.12.9-lp151.2.13.1.x86_64", "openSUSE Leap 15.0:go1.12-doc-1.12.9-lp151.2.13.1.x86_64", "openSUSE Leap 15.0:go1.12-race-1.12.9-lp151.2.13.1.x86_64", "openSUSE Leap 15.1:go1.12-1.12.9-lp151.2.13.1.x86_64", "openSUSE Leap 15.1:go1.12-doc-1.12.9-lp151.2.13.1.x86_64", "openSUSE Leap 15.1:go1.12-race-1.12.9-lp151.2.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-02T12:21:15Z", "details": "important" } ], "title": "CVE-2019-9512" }, { "cve": "CVE-2019-9514", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9514" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:go1.12-1.12.9-lp151.2.13.1.x86_64", "openSUSE Leap 15.0:go1.12-doc-1.12.9-lp151.2.13.1.x86_64", "openSUSE Leap 15.0:go1.12-race-1.12.9-lp151.2.13.1.x86_64", "openSUSE Leap 15.1:go1.12-1.12.9-lp151.2.13.1.x86_64", "openSUSE Leap 15.1:go1.12-doc-1.12.9-lp151.2.13.1.x86_64", "openSUSE Leap 15.1:go1.12-race-1.12.9-lp151.2.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9514", "url": "https://www.suse.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "SUSE Bug 1145662 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1145662" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146095 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1146095" }, { "category": "external", "summary": "SUSE Bug 1146115 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1146115" }, { "category": "external", "summary": "SUSE Bug 1147142 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1147142" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:go1.12-1.12.9-lp151.2.13.1.x86_64", "openSUSE Leap 15.0:go1.12-doc-1.12.9-lp151.2.13.1.x86_64", "openSUSE Leap 15.0:go1.12-race-1.12.9-lp151.2.13.1.x86_64", "openSUSE Leap 15.1:go1.12-1.12.9-lp151.2.13.1.x86_64", "openSUSE Leap 15.1:go1.12-doc-1.12.9-lp151.2.13.1.x86_64", "openSUSE Leap 15.1:go1.12-race-1.12.9-lp151.2.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.0:go1.12-1.12.9-lp151.2.13.1.x86_64", "openSUSE Leap 15.0:go1.12-doc-1.12.9-lp151.2.13.1.x86_64", "openSUSE Leap 15.0:go1.12-race-1.12.9-lp151.2.13.1.x86_64", "openSUSE Leap 15.1:go1.12-1.12.9-lp151.2.13.1.x86_64", "openSUSE Leap 15.1:go1.12-doc-1.12.9-lp151.2.13.1.x86_64", "openSUSE Leap 15.1:go1.12-race-1.12.9-lp151.2.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-02T12:21:15Z", "details": "important" } ], "title": "CVE-2019-9514" } ] }
opensuse-su-2019:2085-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for go1.12", "title": "Title of the patch" }, { "category": "description", "text": "This update for go1.12 fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2019-9512: Fixed HTTP/2 flood using PING frames that results in unbounded memory growth (bsc#1146111).\n- CVE-2019-9514: Fixed HTTP/2 implementation that is vulnerable to a reset flood, potentially leading to a denial of service (bsc#1146115).\n- CVE-2019-14809: Fixed malformed hosts in URLs that leads to authorization bypass (bsc#1146123).\n\nBugfixes:\n\n- Update to go version 1.12.9 (bsc#1141689).\n- Adding Web Assembly stuff from misc/wasm (bsc#1139210).\n\nThis update was imported from the SUSE:SLE-15:Update update project.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2019-2085", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_2085-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2019:2085-1", "url": "https://lists.opensuse.org/archives/list/[email protected]/thread/CFMNCQ6JJUWWGAM7EXLET5I2K3DIJU5W/#CFMNCQ6JJUWWGAM7EXLET5I2K3DIJU5W" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2019:2085-1", "url": "https://lists.opensuse.org/archives/list/[email protected]/thread/CFMNCQ6JJUWWGAM7EXLET5I2K3DIJU5W/#CFMNCQ6JJUWWGAM7EXLET5I2K3DIJU5W" }, { "category": "self", "summary": "SUSE Bug 1139210", "url": "https://bugzilla.suse.com/1139210" }, { "category": "self", "summary": "SUSE Bug 1141689", "url": "https://bugzilla.suse.com/1141689" }, { "category": "self", "summary": "SUSE Bug 1146111", "url": "https://bugzilla.suse.com/1146111" }, { "category": "self", "summary": "SUSE Bug 1146115", "url": "https://bugzilla.suse.com/1146115" }, { "category": "self", "summary": "SUSE Bug 1146123", "url": "https://bugzilla.suse.com/1146123" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14809 page", "url": "https://www.suse.com/security/cve/CVE-2019-14809/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9512 page", "url": "https://www.suse.com/security/cve/CVE-2019-9512/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9514 page", "url": "https://www.suse.com/security/cve/CVE-2019-9514/" } ], "title": "Security update for go1.12", "tracking": { "current_release_date": "2019-09-07T14:22:30Z", "generator": { "date": "2019-09-07T14:22:30Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2019:2085-1", "initial_release_date": "2019-09-07T14:22:30Z", "revision_history": [ { "date": "2019-09-07T14:22:30Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "go1.12-1.12.9-lp151.2.17.1.x86_64", "product": { "name": "go1.12-1.12.9-lp151.2.17.1.x86_64", "product_id": "go1.12-1.12.9-lp151.2.17.1.x86_64" } }, { "category": "product_version", "name": "go1.12-doc-1.12.9-lp151.2.17.1.x86_64", "product": { "name": "go1.12-doc-1.12.9-lp151.2.17.1.x86_64", "product_id": "go1.12-doc-1.12.9-lp151.2.17.1.x86_64" } }, { "category": "product_version", "name": "go1.12-race-1.12.9-lp151.2.17.1.x86_64", "product": { "name": "go1.12-race-1.12.9-lp151.2.17.1.x86_64", "product_id": "go1.12-race-1.12.9-lp151.2.17.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.1", "product": { "name": "openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "go1.12-1.12.9-lp151.2.17.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:go1.12-1.12.9-lp151.2.17.1.x86_64" }, "product_reference": "go1.12-1.12.9-lp151.2.17.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.12-doc-1.12.9-lp151.2.17.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:go1.12-doc-1.12.9-lp151.2.17.1.x86_64" }, "product_reference": "go1.12-doc-1.12.9-lp151.2.17.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.12-race-1.12.9-lp151.2.17.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:go1.12-race-1.12.9-lp151.2.17.1.x86_64" }, "product_reference": "go1.12-race-1.12.9-lp151.2.17.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-14809", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14809" } ], "notes": [ { "category": "general", "text": "net/url in Go before 1.11.13 and 1.12.x before 1.12.8 mishandles malformed hosts in URLs, leading to an authorization bypass in some applications. This is related to a Host field with a suffix appearing in neither Hostname() nor Port(), and is related to a non-numeric port number. For example, an attacker can compose a crafted javascript:// URL that results in a hostname of google.com.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:go1.12-1.12.9-lp151.2.17.1.x86_64", "openSUSE Leap 15.1:go1.12-doc-1.12.9-lp151.2.17.1.x86_64", "openSUSE Leap 15.1:go1.12-race-1.12.9-lp151.2.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14809", "url": "https://www.suse.com/security/cve/CVE-2019-14809" }, { "category": "external", "summary": "SUSE Bug 1146123 for CVE-2019-14809", "url": "https://bugzilla.suse.com/1146123" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:go1.12-1.12.9-lp151.2.17.1.x86_64", "openSUSE Leap 15.1:go1.12-doc-1.12.9-lp151.2.17.1.x86_64", "openSUSE Leap 15.1:go1.12-race-1.12.9-lp151.2.17.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.1:go1.12-1.12.9-lp151.2.17.1.x86_64", "openSUSE Leap 15.1:go1.12-doc-1.12.9-lp151.2.17.1.x86_64", "openSUSE Leap 15.1:go1.12-race-1.12.9-lp151.2.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-07T14:22:30Z", "details": "critical" } ], "title": "CVE-2019-14809" }, { "cve": "CVE-2019-9512", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9512" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:go1.12-1.12.9-lp151.2.17.1.x86_64", "openSUSE Leap 15.1:go1.12-doc-1.12.9-lp151.2.17.1.x86_64", "openSUSE Leap 15.1:go1.12-race-1.12.9-lp151.2.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9512", "url": "https://www.suse.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146099 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1146099" }, { "category": "external", "summary": "SUSE Bug 1146111 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1146111" }, { "category": "external", "summary": "SUSE Bug 1147142 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1147142" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:go1.12-1.12.9-lp151.2.17.1.x86_64", "openSUSE Leap 15.1:go1.12-doc-1.12.9-lp151.2.17.1.x86_64", "openSUSE Leap 15.1:go1.12-race-1.12.9-lp151.2.17.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:go1.12-1.12.9-lp151.2.17.1.x86_64", "openSUSE Leap 15.1:go1.12-doc-1.12.9-lp151.2.17.1.x86_64", "openSUSE Leap 15.1:go1.12-race-1.12.9-lp151.2.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-07T14:22:30Z", "details": "important" } ], "title": "CVE-2019-9512" }, { "cve": "CVE-2019-9514", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9514" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:go1.12-1.12.9-lp151.2.17.1.x86_64", "openSUSE Leap 15.1:go1.12-doc-1.12.9-lp151.2.17.1.x86_64", "openSUSE Leap 15.1:go1.12-race-1.12.9-lp151.2.17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9514", "url": "https://www.suse.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "SUSE Bug 1145662 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1145662" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146095 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1146095" }, { "category": "external", "summary": "SUSE Bug 1146115 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1146115" }, { "category": "external", "summary": "SUSE Bug 1147142 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1147142" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:go1.12-1.12.9-lp151.2.17.1.x86_64", "openSUSE Leap 15.1:go1.12-doc-1.12.9-lp151.2.17.1.x86_64", "openSUSE Leap 15.1:go1.12-race-1.12.9-lp151.2.17.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:go1.12-1.12.9-lp151.2.17.1.x86_64", "openSUSE Leap 15.1:go1.12-doc-1.12.9-lp151.2.17.1.x86_64", "openSUSE Leap 15.1:go1.12-race-1.12.9-lp151.2.17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-07T14:22:30Z", "details": "important" } ], "title": "CVE-2019-9514" } ] }
opensuse-su-2019:2000-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for go1.12", "title": "Title of the patch" }, { "category": "description", "text": "This update for go1.12 fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2019-9512: Fixed HTTP/2 flood using PING frames that results in unbounded memory growth. (bsc#1146111)\n- CVE-2019-9514: Fixed HTTP/2 implementation is vulnerable to a reset flood, potentially leading to a denial of service. (bsc#1146115)\n- CVE-2019-14809: Fixed authorization bypass due to malformed hosts in URLs. (bsc#1146123)\n", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2019-2000", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_2000-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2019:2000-1", "url": "https://lists.opensuse.org/archives/list/[email protected]/thread/XQV7XTKIELHQ3WYN6US2FNRX7SHXE46J/#XQV7XTKIELHQ3WYN6US2FNRX7SHXE46J" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2019:2000-1", "url": "https://lists.opensuse.org/archives/list/[email protected]/thread/XQV7XTKIELHQ3WYN6US2FNRX7SHXE46J/#XQV7XTKIELHQ3WYN6US2FNRX7SHXE46J" }, { "category": "self", "summary": "SUSE Bug 1139210", "url": "https://bugzilla.suse.com/1139210" }, { "category": "self", "summary": "SUSE Bug 1141689", "url": "https://bugzilla.suse.com/1141689" }, { "category": "self", "summary": "SUSE Bug 1146111", "url": "https://bugzilla.suse.com/1146111" }, { "category": "self", "summary": "SUSE Bug 1146115", "url": "https://bugzilla.suse.com/1146115" }, { "category": "self", "summary": "SUSE Bug 1146123", "url": "https://bugzilla.suse.com/1146123" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14809 page", "url": "https://www.suse.com/security/cve/CVE-2019-14809/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9512 page", "url": "https://www.suse.com/security/cve/CVE-2019-9512/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9514 page", "url": "https://www.suse.com/security/cve/CVE-2019-9514/" } ], "title": "Security update for go1.12", "tracking": { "current_release_date": "2019-08-24T12:18:42Z", "generator": { "date": "2019-08-24T12:18:42Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2019:2000-1", "initial_release_date": "2019-08-24T12:18:42Z", "revision_history": [ { "date": "2019-08-24T12:18:42Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "go1.12-1.12.9-lp151.2.9.1.x86_64", "product": { "name": "go1.12-1.12.9-lp151.2.9.1.x86_64", "product_id": "go1.12-1.12.9-lp151.2.9.1.x86_64" } }, { "category": "product_version", "name": "go1.12-doc-1.12.9-lp151.2.9.1.x86_64", "product": { "name": "go1.12-doc-1.12.9-lp151.2.9.1.x86_64", "product_id": "go1.12-doc-1.12.9-lp151.2.9.1.x86_64" } }, { "category": "product_version", "name": "go1.12-race-1.12.9-lp151.2.9.1.x86_64", "product": { "name": "go1.12-race-1.12.9-lp151.2.9.1.x86_64", "product_id": "go1.12-race-1.12.9-lp151.2.9.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.1", "product": { "name": "openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "go1.12-1.12.9-lp151.2.9.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:go1.12-1.12.9-lp151.2.9.1.x86_64" }, "product_reference": "go1.12-1.12.9-lp151.2.9.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.12-doc-1.12.9-lp151.2.9.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:go1.12-doc-1.12.9-lp151.2.9.1.x86_64" }, "product_reference": "go1.12-doc-1.12.9-lp151.2.9.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.12-race-1.12.9-lp151.2.9.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:go1.12-race-1.12.9-lp151.2.9.1.x86_64" }, "product_reference": "go1.12-race-1.12.9-lp151.2.9.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-14809", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14809" } ], "notes": [ { "category": "general", "text": "net/url in Go before 1.11.13 and 1.12.x before 1.12.8 mishandles malformed hosts in URLs, leading to an authorization bypass in some applications. This is related to a Host field with a suffix appearing in neither Hostname() nor Port(), and is related to a non-numeric port number. For example, an attacker can compose a crafted javascript:// URL that results in a hostname of google.com.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:go1.12-1.12.9-lp151.2.9.1.x86_64", "openSUSE Leap 15.1:go1.12-doc-1.12.9-lp151.2.9.1.x86_64", "openSUSE Leap 15.1:go1.12-race-1.12.9-lp151.2.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14809", "url": "https://www.suse.com/security/cve/CVE-2019-14809" }, { "category": "external", "summary": "SUSE Bug 1146123 for CVE-2019-14809", "url": "https://bugzilla.suse.com/1146123" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:go1.12-1.12.9-lp151.2.9.1.x86_64", "openSUSE Leap 15.1:go1.12-doc-1.12.9-lp151.2.9.1.x86_64", "openSUSE Leap 15.1:go1.12-race-1.12.9-lp151.2.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.1:go1.12-1.12.9-lp151.2.9.1.x86_64", "openSUSE Leap 15.1:go1.12-doc-1.12.9-lp151.2.9.1.x86_64", "openSUSE Leap 15.1:go1.12-race-1.12.9-lp151.2.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-24T12:18:42Z", "details": "critical" } ], "title": "CVE-2019-14809" }, { "cve": "CVE-2019-9512", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9512" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:go1.12-1.12.9-lp151.2.9.1.x86_64", "openSUSE Leap 15.1:go1.12-doc-1.12.9-lp151.2.9.1.x86_64", "openSUSE Leap 15.1:go1.12-race-1.12.9-lp151.2.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9512", "url": "https://www.suse.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146099 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1146099" }, { "category": "external", "summary": "SUSE Bug 1146111 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1146111" }, { "category": "external", "summary": "SUSE Bug 1147142 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1147142" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:go1.12-1.12.9-lp151.2.9.1.x86_64", "openSUSE Leap 15.1:go1.12-doc-1.12.9-lp151.2.9.1.x86_64", "openSUSE Leap 15.1:go1.12-race-1.12.9-lp151.2.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:go1.12-1.12.9-lp151.2.9.1.x86_64", "openSUSE Leap 15.1:go1.12-doc-1.12.9-lp151.2.9.1.x86_64", "openSUSE Leap 15.1:go1.12-race-1.12.9-lp151.2.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-24T12:18:42Z", "details": "important" } ], "title": "CVE-2019-9512" }, { "cve": "CVE-2019-9514", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9514" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:go1.12-1.12.9-lp151.2.9.1.x86_64", "openSUSE Leap 15.1:go1.12-doc-1.12.9-lp151.2.9.1.x86_64", "openSUSE Leap 15.1:go1.12-race-1.12.9-lp151.2.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9514", "url": "https://www.suse.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "SUSE Bug 1145662 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1145662" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146095 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1146095" }, { "category": "external", "summary": "SUSE Bug 1146115 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1146115" }, { "category": "external", "summary": "SUSE Bug 1147142 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1147142" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:go1.12-1.12.9-lp151.2.9.1.x86_64", "openSUSE Leap 15.1:go1.12-doc-1.12.9-lp151.2.9.1.x86_64", "openSUSE Leap 15.1:go1.12-race-1.12.9-lp151.2.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:go1.12-1.12.9-lp151.2.9.1.x86_64", "openSUSE Leap 15.1:go1.12-doc-1.12.9-lp151.2.9.1.x86_64", "openSUSE Leap 15.1:go1.12-race-1.12.9-lp151.2.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-24T12:18:42Z", "details": "important" } ], "title": "CVE-2019-9514" } ] }
opensuse-su-2019:2115-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for nodejs8", "title": "Title of the patch" }, { "category": "description", "text": "This update for nodejs8 to version 8.16.1 fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2019-9511: Fixed HTTP/2 implementations that are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service (bsc#1146091).\n- CVE-2019-9512: Fixed HTTP/2 flood using PING frames results in unbounded memory growth (bsc#1146099).\n- CVE-2019-9513: Fixed HTTP/2 implementation that is vulnerable to resource loops, potentially leading to a denial of service. (bsc#1146094).\n- CVE-2019-9514: Fixed HTTP/2 implementation that is vulnerable to a reset flood, potentially leading to a denial of service (bsc#1146095).\n- CVE-2019-9515: Fixed HTTP/2 flood using SETTINGS frames results in unbounded memory growth (bsc#1146100).\n- CVE-2019-9516: Fixed HTTP/2 implementation that is vulnerable to a header leak, potentially leading to a denial of service (bsc#1146090).\n- CVE-2019-9517: Fixed HTTP/2 implementations that are vulnerable to unconstrained interal data buffering (bsc#1146097).\n- CVE-2019-9518: Fixed HTTP/2 implementation that is vulnerable to a flood of empty frames, potentially leading to a denial of service (bsc#1146093).\n\nBug fixes:\n\n- Fixed that npm resolves its default config file like in all other versions, as /etc/nodejs/npmrc (bsc#1144919).\n\nThis update was imported from the SUSE:SLE-15:Update update project.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2019-2115", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_2115-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2019:2115-1", "url": "https://lists.opensuse.org/archives/list/[email protected]/thread/TLFKC75QWUPCRCPS6I4CH5LO7W5G2JQK/#TLFKC75QWUPCRCPS6I4CH5LO7W5G2JQK" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2019:2115-1", "url": "https://lists.opensuse.org/archives/list/[email protected]/thread/TLFKC75QWUPCRCPS6I4CH5LO7W5G2JQK/#TLFKC75QWUPCRCPS6I4CH5LO7W5G2JQK" }, { "category": "self", "summary": "SUSE Bug 1144919", "url": "https://bugzilla.suse.com/1144919" }, { "category": "self", "summary": "SUSE Bug 1146090", "url": "https://bugzilla.suse.com/1146090" }, { "category": "self", "summary": "SUSE Bug 1146091", "url": "https://bugzilla.suse.com/1146091" }, { "category": "self", "summary": "SUSE Bug 1146093", "url": "https://bugzilla.suse.com/1146093" }, { "category": "self", "summary": "SUSE Bug 1146094", "url": "https://bugzilla.suse.com/1146094" }, { "category": "self", "summary": "SUSE Bug 1146095", "url": "https://bugzilla.suse.com/1146095" }, { "category": "self", "summary": "SUSE Bug 1146097", "url": "https://bugzilla.suse.com/1146097" }, { "category": "self", "summary": "SUSE Bug 1146099", "url": "https://bugzilla.suse.com/1146099" }, { "category": "self", "summary": "SUSE Bug 1146100", "url": "https://bugzilla.suse.com/1146100" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9511 page", "url": "https://www.suse.com/security/cve/CVE-2019-9511/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9512 page", "url": "https://www.suse.com/security/cve/CVE-2019-9512/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9513 page", "url": "https://www.suse.com/security/cve/CVE-2019-9513/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9514 page", "url": "https://www.suse.com/security/cve/CVE-2019-9514/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9515 page", "url": "https://www.suse.com/security/cve/CVE-2019-9515/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9516 page", "url": "https://www.suse.com/security/cve/CVE-2019-9516/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9517 page", "url": "https://www.suse.com/security/cve/CVE-2019-9517/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9518 page", "url": "https://www.suse.com/security/cve/CVE-2019-9518/" } ], "title": "Security update for nodejs8", "tracking": { "current_release_date": "2019-09-10T16:22:52Z", "generator": { "date": "2019-09-10T16:22:52Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2019:2115-1", "initial_release_date": "2019-09-10T16:22:52Z", "revision_history": [ { "date": "2019-09-10T16:22:52Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "nodejs8-8.16.1-lp151.2.6.1.i586", "product": { "name": "nodejs8-8.16.1-lp151.2.6.1.i586", "product_id": "nodejs8-8.16.1-lp151.2.6.1.i586" } }, { "category": "product_version", "name": "nodejs8-devel-8.16.1-lp151.2.6.1.i586", "product": { "name": "nodejs8-devel-8.16.1-lp151.2.6.1.i586", "product_id": "nodejs8-devel-8.16.1-lp151.2.6.1.i586" } }, { "category": "product_version", "name": "npm8-8.16.1-lp151.2.6.1.i586", "product": { "name": "npm8-8.16.1-lp151.2.6.1.i586", "product_id": "npm8-8.16.1-lp151.2.6.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "product": { "name": "nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "product_id": "nodejs8-docs-8.16.1-lp151.2.6.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "nodejs8-8.16.1-lp151.2.6.1.x86_64", "product": { "name": "nodejs8-8.16.1-lp151.2.6.1.x86_64", "product_id": "nodejs8-8.16.1-lp151.2.6.1.x86_64" } }, { "category": "product_version", "name": "nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "product": { "name": "nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "product_id": "nodejs8-devel-8.16.1-lp151.2.6.1.x86_64" } }, { "category": "product_version", "name": "npm8-8.16.1-lp151.2.6.1.x86_64", "product": { "name": "npm8-8.16.1-lp151.2.6.1.x86_64", "product_id": "npm8-8.16.1-lp151.2.6.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.0", "product": { "name": "openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.0" } } }, { "category": "product_name", "name": "openSUSE Leap 15.1", "product": { "name": "openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nodejs8-8.16.1-lp151.2.6.1.i586 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.i586" }, "product_reference": "nodejs8-8.16.1-lp151.2.6.1.i586", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-8.16.1-lp151.2.6.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.x86_64" }, "product_reference": "nodejs8-8.16.1-lp151.2.6.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-devel-8.16.1-lp151.2.6.1.i586 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.i586" }, "product_reference": "nodejs8-devel-8.16.1-lp151.2.6.1.i586", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-devel-8.16.1-lp151.2.6.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64" }, "product_reference": "nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-docs-8.16.1-lp151.2.6.1.noarch as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:nodejs8-docs-8.16.1-lp151.2.6.1.noarch" }, "product_reference": "nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "npm8-8.16.1-lp151.2.6.1.i586 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.i586" }, "product_reference": "npm8-8.16.1-lp151.2.6.1.i586", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "npm8-8.16.1-lp151.2.6.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.x86_64" }, "product_reference": "npm8-8.16.1-lp151.2.6.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-8.16.1-lp151.2.6.1.i586 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.i586" }, "product_reference": "nodejs8-8.16.1-lp151.2.6.1.i586", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-8.16.1-lp151.2.6.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.x86_64" }, "product_reference": "nodejs8-8.16.1-lp151.2.6.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-devel-8.16.1-lp151.2.6.1.i586 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.i586" }, "product_reference": "nodejs8-devel-8.16.1-lp151.2.6.1.i586", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-devel-8.16.1-lp151.2.6.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64" }, "product_reference": "nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-docs-8.16.1-lp151.2.6.1.noarch as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:nodejs8-docs-8.16.1-lp151.2.6.1.noarch" }, "product_reference": "nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "npm8-8.16.1-lp151.2.6.1.i586 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.i586" }, "product_reference": "npm8-8.16.1-lp151.2.6.1.i586", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "npm8-8.16.1-lp151.2.6.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.x86_64" }, "product_reference": "npm8-8.16.1-lp151.2.6.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-9511", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9511" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9511", "url": "https://www.suse.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "SUSE Bug 1145579 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1145579" }, { "category": "external", "summary": "SUSE Bug 1146091 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1146091" }, { "category": "external", "summary": "SUSE Bug 1146182 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1146182" }, { "category": "external", "summary": "SUSE Bug 1193427 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1193427" }, { "category": "external", "summary": "SUSE Bug 1202787 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1202787" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-10T16:22:52Z", "details": "important" } ], "title": "CVE-2019-9511" }, { "cve": "CVE-2019-9512", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9512" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9512", "url": "https://www.suse.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146099 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1146099" }, { "category": "external", "summary": "SUSE Bug 1146111 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1146111" }, { "category": "external", "summary": "SUSE Bug 1147142 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1147142" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-10T16:22:52Z", "details": "important" } ], "title": "CVE-2019-9512" }, { "cve": "CVE-2019-9513", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9513" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9513", "url": "https://www.suse.com/security/cve/CVE-2019-9513" }, { "category": "external", "summary": "SUSE Bug 1145580 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1145580" }, { "category": "external", "summary": "SUSE Bug 1146094 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1146094" }, { "category": "external", "summary": "SUSE Bug 1146184 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1146184" }, { "category": "external", "summary": "SUSE Bug 1193427 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1193427" }, { "category": "external", "summary": "SUSE Bug 1202787 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1202787" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-10T16:22:52Z", "details": "important" } ], "title": "CVE-2019-9513" }, { "cve": "CVE-2019-9514", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9514" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9514", "url": "https://www.suse.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "SUSE Bug 1145662 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1145662" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146095 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1146095" }, { "category": "external", "summary": "SUSE Bug 1146115 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1146115" }, { "category": "external", "summary": "SUSE Bug 1147142 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1147142" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-10T16:22:52Z", "details": "important" } ], "title": "CVE-2019-9514" }, { "cve": "CVE-2019-9515", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9515" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a denial of service. The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the peer reply with one acknowledgement per SETTINGS frame, an empty SETTINGS frame is almost equivalent in behavior to a ping. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9515", "url": "https://www.suse.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9515", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146100 for CVE-2019-9515", "url": "https://bugzilla.suse.com/1146100" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-10T16:22:52Z", "details": "important" } ], "title": "CVE-2019-9515" }, { "cve": "CVE-2019-9516", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9516" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9516", "url": "https://www.suse.com/security/cve/CVE-2019-9516" }, { "category": "external", "summary": "SUSE Bug 1145582 for CVE-2019-9516", "url": "https://bugzilla.suse.com/1145582" }, { "category": "external", "summary": "SUSE Bug 1146090 for CVE-2019-9516", "url": "https://bugzilla.suse.com/1146090" }, { "category": "external", "summary": "SUSE Bug 1193427 for CVE-2019-9516", "url": "https://bugzilla.suse.com/1193427" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-10T16:22:52Z", "details": "important" } ], "title": "CVE-2019-9516" }, { "cve": "CVE-2019-9517", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9517" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to unconstrained interal data buffering, potentially leading to a denial of service. The attacker opens the HTTP/2 window so the peer can send without constraint; however, they leave the TCP window closed so the peer cannot actually write (many of) the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the servers queue the responses, this can consume excess memory, CPU, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9517", "url": "https://www.suse.com/security/cve/CVE-2019-9517" }, { "category": "external", "summary": "SUSE Bug 1145575 for CVE-2019-9517", "url": "https://bugzilla.suse.com/1145575" }, { "category": "external", "summary": "SUSE Bug 1146097 for CVE-2019-9517", "url": "https://bugzilla.suse.com/1146097" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-10T16:22:52Z", "details": "important" } ], "title": "CVE-2019-9517" }, { "cve": "CVE-2019-9518", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9518" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer spends time processing each frame disproportionate to attack bandwidth. This can consume excess CPU.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9518", "url": "https://www.suse.com/security/cve/CVE-2019-9518" }, { "category": "external", "summary": "SUSE Bug 1145662 for CVE-2019-9518", "url": "https://bugzilla.suse.com/1145662" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9518", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146093 for CVE-2019-9518", "url": "https://bugzilla.suse.com/1146093" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-10T16:22:52Z", "details": "important" } ], "title": "CVE-2019-9518" } ] }
opensuse-su-2024:10804-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "go1.11-1.11.13-10.5 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the go1.11-1.11.13-10.5 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-10804", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10804-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2014-7189 page", "url": "https://www.suse.com/security/cve/CVE-2014-7189/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8618 page", "url": "https://www.suse.com/security/cve/CVE-2015-8618/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3959 page", "url": "https://www.suse.com/security/cve/CVE-2016-3959/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5386 page", "url": "https://www.suse.com/security/cve/CVE-2016-5386/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-15041 page", "url": "https://www.suse.com/security/cve/CVE-2017-15041/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-15042 page", "url": "https://www.suse.com/security/cve/CVE-2017-15042/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-8932 page", "url": "https://www.suse.com/security/cve/CVE-2017-8932/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16873 page", "url": "https://www.suse.com/security/cve/CVE-2018-16873/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16874 page", "url": "https://www.suse.com/security/cve/CVE-2018-16874/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16875 page", "url": "https://www.suse.com/security/cve/CVE-2018-16875/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6574 page", "url": "https://www.suse.com/security/cve/CVE-2018-6574/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14809 page", "url": "https://www.suse.com/security/cve/CVE-2019-14809/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-6486 page", "url": "https://www.suse.com/security/cve/CVE-2019-6486/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9512 page", "url": "https://www.suse.com/security/cve/CVE-2019-9512/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9514 page", "url": "https://www.suse.com/security/cve/CVE-2019-9514/" } ], "title": "go1.11-1.11.13-10.5 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:10804-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "go1.11-1.11.13-10.5.aarch64", "product": { "name": "go1.11-1.11.13-10.5.aarch64", "product_id": "go1.11-1.11.13-10.5.aarch64" } }, { "category": "product_version", "name": "go1.11-doc-1.11.13-10.5.aarch64", "product": { "name": "go1.11-doc-1.11.13-10.5.aarch64", "product_id": "go1.11-doc-1.11.13-10.5.aarch64" } }, { "category": "product_version", "name": "go1.11-race-1.11.13-10.5.aarch64", "product": { "name": "go1.11-race-1.11.13-10.5.aarch64", "product_id": "go1.11-race-1.11.13-10.5.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "go1.11-1.11.13-10.5.ppc64le", "product": { "name": "go1.11-1.11.13-10.5.ppc64le", "product_id": "go1.11-1.11.13-10.5.ppc64le" } }, { "category": "product_version", "name": "go1.11-doc-1.11.13-10.5.ppc64le", "product": { "name": "go1.11-doc-1.11.13-10.5.ppc64le", "product_id": "go1.11-doc-1.11.13-10.5.ppc64le" } }, { "category": "product_version", "name": "go1.11-race-1.11.13-10.5.ppc64le", "product": { "name": "go1.11-race-1.11.13-10.5.ppc64le", "product_id": "go1.11-race-1.11.13-10.5.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "go1.11-1.11.13-10.5.s390x", "product": { "name": "go1.11-1.11.13-10.5.s390x", "product_id": "go1.11-1.11.13-10.5.s390x" } }, { "category": "product_version", "name": "go1.11-doc-1.11.13-10.5.s390x", "product": { "name": "go1.11-doc-1.11.13-10.5.s390x", "product_id": "go1.11-doc-1.11.13-10.5.s390x" } }, { "category": "product_version", "name": "go1.11-race-1.11.13-10.5.s390x", "product": { "name": "go1.11-race-1.11.13-10.5.s390x", "product_id": "go1.11-race-1.11.13-10.5.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "go1.11-1.11.13-10.5.x86_64", "product": { "name": "go1.11-1.11.13-10.5.x86_64", "product_id": "go1.11-1.11.13-10.5.x86_64" } }, { "category": "product_version", "name": "go1.11-doc-1.11.13-10.5.x86_64", "product": { "name": "go1.11-doc-1.11.13-10.5.x86_64", "product_id": "go1.11-doc-1.11.13-10.5.x86_64" } }, { "category": "product_version", "name": "go1.11-race-1.11.13-10.5.x86_64", "product": { "name": "go1.11-race-1.11.13-10.5.x86_64", "product_id": "go1.11-race-1.11.13-10.5.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "go1.11-1.11.13-10.5.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.11-1.11.13-10.5.aarch64" }, "product_reference": "go1.11-1.11.13-10.5.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.11-1.11.13-10.5.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.11-1.11.13-10.5.ppc64le" }, "product_reference": "go1.11-1.11.13-10.5.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.11-1.11.13-10.5.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.11-1.11.13-10.5.s390x" }, "product_reference": "go1.11-1.11.13-10.5.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.11-1.11.13-10.5.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.11-1.11.13-10.5.x86_64" }, "product_reference": "go1.11-1.11.13-10.5.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.11-doc-1.11.13-10.5.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.aarch64" }, "product_reference": "go1.11-doc-1.11.13-10.5.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.11-doc-1.11.13-10.5.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.ppc64le" }, "product_reference": "go1.11-doc-1.11.13-10.5.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.11-doc-1.11.13-10.5.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.s390x" }, "product_reference": "go1.11-doc-1.11.13-10.5.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.11-doc-1.11.13-10.5.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.x86_64" }, "product_reference": "go1.11-doc-1.11.13-10.5.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.11-race-1.11.13-10.5.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.aarch64" }, "product_reference": "go1.11-race-1.11.13-10.5.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.11-race-1.11.13-10.5.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.ppc64le" }, "product_reference": "go1.11-race-1.11.13-10.5.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.11-race-1.11.13-10.5.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.s390x" }, "product_reference": "go1.11-race-1.11.13-10.5.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.11-race-1.11.13-10.5.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.x86_64" }, "product_reference": "go1.11-race-1.11.13-10.5.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2014-7189", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-7189" } ], "notes": [ { "category": "general", "text": "crpyto/tls in Go 1.1 before 1.3.2, when SessionTicketsDisabled is enabled, allows man-in-the-middle attackers to spoof clients via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:go1.11-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-7189", "url": "https://www.suse.com/security/cve/CVE-2014-7189" }, { "category": "external", "summary": "SUSE Bug 898901 for CVE-2014-7189", "url": "https://bugzilla.suse.com/898901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:go1.11-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-7189" }, { "cve": "CVE-2015-8618", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8618" } ], "notes": [ { "category": "general", "text": "The Int.Exp Montgomery code in the math/big library in Go 1.5.x before 1.5.3 mishandles carry propagation and produces incorrect output, which makes it easier for attackers to obtain private RSA keys via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:go1.11-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8618", "url": "https://www.suse.com/security/cve/CVE-2015-8618" }, { "category": "external", "summary": "SUSE Bug 957814 for CVE-2015-8618", "url": "https://bugzilla.suse.com/957814" }, { "category": "external", "summary": "SUSE Bug 960151 for CVE-2015-8618", "url": "https://bugzilla.suse.com/960151" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:go1.11-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-8618" }, { "cve": "CVE-2016-3959", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3959" } ], "notes": [ { "category": "general", "text": "The Verify function in crypto/dsa/dsa.go in Go before 1.5.4 and 1.6.x before 1.6.1 does not properly check parameters passed to the big integer library, which might allow remote attackers to cause a denial of service (infinite loop) via a crafted public key to a program that uses HTTPS client certificates or SSH server libraries.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:go1.11-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3959", "url": "https://www.suse.com/security/cve/CVE-2016-3959" }, { "category": "external", "summary": "SUSE Bug 974232 for CVE-2016-3959", "url": "https://bugzilla.suse.com/974232" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:go1.11-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:go1.11-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-3959" }, { "cve": "CVE-2016-5386", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5386" } ], "notes": [ { "category": "general", "text": "The net/http package in Go through 1.6 does not attempt to address RFC 3875 section 4.1.18 namespace conflicts and therefore does not protect CGI applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect a CGI application\u0027s outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an \"httpoxy\" issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:go1.11-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5386", "url": "https://www.suse.com/security/cve/CVE-2016-5386" }, { "category": "external", "summary": "SUSE Bug 988484 for CVE-2016-5386", "url": "https://bugzilla.suse.com/988484" }, { "category": "external", "summary": "SUSE Bug 988486 for CVE-2016-5386", "url": "https://bugzilla.suse.com/988486" }, { "category": "external", "summary": "SUSE Bug 988487 for CVE-2016-5386", "url": "https://bugzilla.suse.com/988487" }, { "category": "external", "summary": "SUSE Bug 988488 for CVE-2016-5386", "url": "https://bugzilla.suse.com/988488" }, { "category": "external", "summary": "SUSE Bug 988489 for CVE-2016-5386", "url": "https://bugzilla.suse.com/988489" }, { "category": "external", "summary": "SUSE Bug 988491 for CVE-2016-5386", "url": "https://bugzilla.suse.com/988491" }, { "category": "external", "summary": "SUSE Bug 988492 for CVE-2016-5386", "url": "https://bugzilla.suse.com/988492" }, { "category": "external", "summary": "SUSE Bug 989125 for CVE-2016-5386", "url": "https://bugzilla.suse.com/989125" }, { "category": "external", "summary": "SUSE Bug 989174 for CVE-2016-5386", "url": "https://bugzilla.suse.com/989174" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:go1.11-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:go1.11-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-5386" }, { "cve": "CVE-2017-15041", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-15041" } ], "notes": [ { "category": "general", "text": "Go before 1.8.4 and 1.9.x before 1.9.1 allows \"go get\" remote command execution. Using custom domains, it is possible to arrange things so that example.com/pkg1 points to a Subversion repository but example.com/pkg1/pkg2 points to a Git repository. If the Subversion repository includes a Git checkout in its pkg2 directory and some other work is done to ensure the proper ordering of operations, \"go get\" can be tricked into reusing this Git checkout for the fetch of code from pkg2. If the Subversion repository\u0027s Git checkout has malicious commands in .git/hooks/, they will execute on the system running \"go get.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:go1.11-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-15041", "url": "https://www.suse.com/security/cve/CVE-2017-15041" }, { "category": "external", "summary": "SUSE Bug 1062085 for CVE-2017-15041", "url": "https://bugzilla.suse.com/1062085" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:go1.11-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:go1.11-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2017-15041" }, { "cve": "CVE-2017-15042", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-15042" } ], "notes": [ { "category": "general", "text": "An unintended cleartext issue exists in Go before 1.8.4 and 1.9.x before 1.9.1. RFC 4954 requires that, during SMTP, the PLAIN auth scheme must only be used on network connections secured with TLS. The original implementation of smtp.PlainAuth in Go 1.0 enforced this requirement, and it was documented to do so. In 2013, upstream issue #5184, this was changed so that the server may decide whether PLAIN is acceptable. The result is that if you set up a man-in-the-middle SMTP server that doesn\u0027t advertise STARTTLS and does advertise that PLAIN auth is OK, the smtp.PlainAuth implementation sends the username and password.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:go1.11-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-15042", "url": "https://www.suse.com/security/cve/CVE-2017-15042" }, { "category": "external", "summary": "SUSE Bug 1062087 for CVE-2017-15042", "url": "https://bugzilla.suse.com/1062087" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:go1.11-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:go1.11-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-15042" }, { "cve": "CVE-2017-8932", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-8932" } ], "notes": [ { "category": "general", "text": "A bug in the standard library ScalarMult implementation of curve P-256 for amd64 architectures in Go before 1.7.6 and 1.8.x before 1.8.2 causes incorrect results to be generated for specific input points. An adaptive attack can be mounted to progressively extract the scalar input to ScalarMult by submitting crafted points and observing failures to the derive correct output. This leads to a full key recovery attack against static ECDH, as used in popular JWT libraries.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:go1.11-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-8932", "url": "https://www.suse.com/security/cve/CVE-2017-8932" }, { "category": "external", "summary": "SUSE Bug 1040618 for CVE-2017-8932", "url": "https://bugzilla.suse.com/1040618" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:go1.11-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:go1.11-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-8932" }, { "cve": "CVE-2018-16873", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16873" } ], "notes": [ { "category": "general", "text": "In Go before 1.10.6 and 1.11.x before 1.11.3, the \"go get\" command is vulnerable to remote code execution when executed with the -u flag and the import path of a malicious Go package, or a package that imports it directly or indirectly. Specifically, it is only vulnerable in GOPATH mode, but not in module mode (the distinction is documented at https://golang.org/cmd/go/#hdr-Module_aware_go_get). Using custom domains, it\u0027s possible to arrange things so that a Git repository is cloned to a folder named \".git\" by using a vanity import path that ends with \"/.git\". If the Git repository root contains a \"HEAD\" file, a \"config\" file, an \"objects\" directory, a \"refs\" directory, with some work to ensure the proper ordering of operations, \"go get -u\" can be tricked into considering the parent directory as a repository root, and running Git commands on it. That will use the \"config\" file in the original Git repository root for its configuration, and if that config file contains malicious commands, they will execute on the system running \"go get -u\".", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:go1.11-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16873", "url": "https://www.suse.com/security/cve/CVE-2018-16873" }, { "category": "external", "summary": "SUSE Bug 1118897 for CVE-2018-16873", "url": "https://bugzilla.suse.com/1118897" }, { "category": "external", "summary": "SUSE Bug 1118898 for CVE-2018-16873", "url": "https://bugzilla.suse.com/1118898" }, { "category": "external", "summary": "SUSE Bug 1118899 for CVE-2018-16873", "url": "https://bugzilla.suse.com/1118899" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:go1.11-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:go1.11-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-16873" }, { "cve": "CVE-2018-16874", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16874" } ], "notes": [ { "category": "general", "text": "In Go before 1.10.6 and 1.11.x before 1.11.3, the \"go get\" command is vulnerable to directory traversal when executed with the import path of a malicious Go package which contains curly braces (both \u0027{\u0027 and \u0027}\u0027 characters). Specifically, it is only vulnerable in GOPATH mode, but not in module mode (the distinction is documented at https://golang.org/cmd/go/#hdr-Module_aware_go_get). The attacker can cause an arbitrary filesystem write, which can lead to code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:go1.11-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16874", "url": "https://www.suse.com/security/cve/CVE-2018-16874" }, { "category": "external", "summary": "SUSE Bug 1118897 for CVE-2018-16874", "url": "https://bugzilla.suse.com/1118897" }, { "category": "external", "summary": "SUSE Bug 1118898 for CVE-2018-16874", "url": "https://bugzilla.suse.com/1118898" }, { "category": "external", "summary": "SUSE Bug 1118899 for CVE-2018-16874", "url": "https://bugzilla.suse.com/1118899" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:go1.11-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:go1.11-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-16874" }, { "cve": "CVE-2018-16875", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16875" } ], "notes": [ { "category": "general", "text": "The crypto/x509 package of Go before 1.10.6 and 1.11.x before 1.11.3 does not limit the amount of work performed for each chain verification, which might allow attackers to craft pathological inputs leading to a CPU denial of service. Go TLS servers accepting client certificates and TLS clients are affected.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:go1.11-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16875", "url": "https://www.suse.com/security/cve/CVE-2018-16875" }, { "category": "external", "summary": "SUSE Bug 1118897 for CVE-2018-16875", "url": "https://bugzilla.suse.com/1118897" }, { "category": "external", "summary": "SUSE Bug 1118898 for CVE-2018-16875", "url": "https://bugzilla.suse.com/1118898" }, { "category": "external", "summary": "SUSE Bug 1118899 for CVE-2018-16875", "url": "https://bugzilla.suse.com/1118899" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:go1.11-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:go1.11-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-16875" }, { "cve": "CVE-2018-6574", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-6574" } ], "notes": [ { "category": "general", "text": "Go before 1.8.7, Go 1.9.x before 1.9.4, and Go 1.10 pre-releases before Go 1.10rc2 allow \"go get\" remote command execution during source code build, by leveraging the gcc or clang plugin feature, because -fplugin= and -plugin= arguments were not blocked.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:go1.11-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-6574", "url": "https://www.suse.com/security/cve/CVE-2018-6574" }, { "category": "external", "summary": "SUSE Bug 1080006 for CVE-2018-6574", "url": "https://bugzilla.suse.com/1080006" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:go1.11-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:go1.11-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-6574" }, { "cve": "CVE-2019-14809", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14809" } ], "notes": [ { "category": "general", "text": "net/url in Go before 1.11.13 and 1.12.x before 1.12.8 mishandles malformed hosts in URLs, leading to an authorization bypass in some applications. This is related to a Host field with a suffix appearing in neither Hostname() nor Port(), and is related to a non-numeric port number. For example, an attacker can compose a crafted javascript:// URL that results in a hostname of google.com.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:go1.11-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14809", "url": "https://www.suse.com/security/cve/CVE-2019-14809" }, { "category": "external", "summary": "SUSE Bug 1146123 for CVE-2019-14809", "url": "https://bugzilla.suse.com/1146123" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:go1.11-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:go1.11-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2019-14809" }, { "cve": "CVE-2019-6486", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-6486" } ], "notes": [ { "category": "general", "text": "Go before 1.10.8 and 1.11.x before 1.11.5 mishandles P-521 and P-384 elliptic curves, which allows attackers to cause a denial of service (CPU consumption) or possibly conduct ECDH private key recovery attacks.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:go1.11-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-6486", "url": "https://www.suse.com/security/cve/CVE-2019-6486" }, { "category": "external", "summary": "SUSE Bug 1123013 for CVE-2019-6486", "url": "https://bugzilla.suse.com/1123013" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:go1.11-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:go1.11-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-6486" }, { "cve": "CVE-2019-9512", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9512" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:go1.11-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9512", "url": "https://www.suse.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146099 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1146099" }, { "category": "external", "summary": "SUSE Bug 1146111 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1146111" }, { "category": "external", "summary": "SUSE Bug 1147142 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1147142" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:go1.11-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:go1.11-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-9512" }, { "cve": "CVE-2019-9514", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9514" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:go1.11-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9514", "url": "https://www.suse.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "SUSE Bug 1145662 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1145662" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146095 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1146095" }, { "category": "external", "summary": "SUSE Bug 1146115 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1146115" }, { "category": "external", "summary": "SUSE Bug 1147142 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1147142" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:go1.11-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:go1.11-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-doc-1.11.13-10.5.x86_64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.aarch64", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.ppc64le", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.s390x", "openSUSE Tumbleweed:go1.11-race-1.11.13-10.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-9514" } ] }
opensuse-su-2019:2072-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for go1.11", "title": "Title of the patch" }, { "category": "description", "text": "This update for go1.11 fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2019-9512: Fixed HTTP/2 flood using PING frames that results in unbounded memory growth (bsc#1146111).\n- CVE-2019-9514: Fixed HTTP/2 implementation that is vulnerable to a reset flood, potentially leading to a denial of service (bsc#1146115).\n- CVE-2019-14809: Fixed malformed hosts in URLs that leads to authorization bypass (bsc#1146123).\n\nBugfixes:\n\n- Update to go version 1.11.13 (bsc#1141688).\n\nThis update was imported from the SUSE:SLE-15:Update update project.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2019-2072", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_2072-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2019:2072-1", "url": "https://lists.opensuse.org/archives/list/[email protected]/thread/BI24YEOJ5PH7KNJKSQBX7VWR2MF4QCUT/#BI24YEOJ5PH7KNJKSQBX7VWR2MF4QCUT" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2019:2072-1", "url": "https://lists.opensuse.org/archives/list/[email protected]/thread/BI24YEOJ5PH7KNJKSQBX7VWR2MF4QCUT/#BI24YEOJ5PH7KNJKSQBX7VWR2MF4QCUT" }, { "category": "self", "summary": "SUSE Bug 1141688", "url": "https://bugzilla.suse.com/1141688" }, { "category": "self", "summary": "SUSE Bug 1146111", "url": "https://bugzilla.suse.com/1146111" }, { "category": "self", "summary": "SUSE Bug 1146115", "url": "https://bugzilla.suse.com/1146115" }, { "category": "self", "summary": "SUSE Bug 1146123", "url": "https://bugzilla.suse.com/1146123" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14809 page", "url": "https://www.suse.com/security/cve/CVE-2019-14809/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9512 page", "url": "https://www.suse.com/security/cve/CVE-2019-9512/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9514 page", "url": "https://www.suse.com/security/cve/CVE-2019-9514/" } ], "title": "Security update for go1.11", "tracking": { "current_release_date": "2019-09-05T08:24:15Z", "generator": { "date": "2019-09-05T08:24:15Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2019:2072-1", "initial_release_date": "2019-09-05T08:24:15Z", "revision_history": [ { "date": "2019-09-05T08:24:15Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "go1.11-1.11.13-lp151.2.9.1.x86_64", "product": { "name": "go1.11-1.11.13-lp151.2.9.1.x86_64", "product_id": "go1.11-1.11.13-lp151.2.9.1.x86_64" } }, { "category": "product_version", "name": "go1.11-doc-1.11.13-lp151.2.9.1.x86_64", "product": { "name": "go1.11-doc-1.11.13-lp151.2.9.1.x86_64", "product_id": "go1.11-doc-1.11.13-lp151.2.9.1.x86_64" } }, { "category": "product_version", "name": "go1.11-race-1.11.13-lp151.2.9.1.x86_64", "product": { "name": "go1.11-race-1.11.13-lp151.2.9.1.x86_64", "product_id": "go1.11-race-1.11.13-lp151.2.9.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.0", "product": { "name": "openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.0" } } }, { "category": "product_name", "name": "openSUSE Leap 15.1", "product": { "name": "openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "go1.11-1.11.13-lp151.2.9.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:go1.11-1.11.13-lp151.2.9.1.x86_64" }, "product_reference": "go1.11-1.11.13-lp151.2.9.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "go1.11-doc-1.11.13-lp151.2.9.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:go1.11-doc-1.11.13-lp151.2.9.1.x86_64" }, "product_reference": "go1.11-doc-1.11.13-lp151.2.9.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "go1.11-race-1.11.13-lp151.2.9.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:go1.11-race-1.11.13-lp151.2.9.1.x86_64" }, "product_reference": "go1.11-race-1.11.13-lp151.2.9.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "go1.11-1.11.13-lp151.2.9.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:go1.11-1.11.13-lp151.2.9.1.x86_64" }, "product_reference": "go1.11-1.11.13-lp151.2.9.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.11-doc-1.11.13-lp151.2.9.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:go1.11-doc-1.11.13-lp151.2.9.1.x86_64" }, "product_reference": "go1.11-doc-1.11.13-lp151.2.9.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.11-race-1.11.13-lp151.2.9.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:go1.11-race-1.11.13-lp151.2.9.1.x86_64" }, "product_reference": "go1.11-race-1.11.13-lp151.2.9.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-14809", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14809" } ], "notes": [ { "category": "general", "text": "net/url in Go before 1.11.13 and 1.12.x before 1.12.8 mishandles malformed hosts in URLs, leading to an authorization bypass in some applications. This is related to a Host field with a suffix appearing in neither Hostname() nor Port(), and is related to a non-numeric port number. For example, an attacker can compose a crafted javascript:// URL that results in a hostname of google.com.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:go1.11-1.11.13-lp151.2.9.1.x86_64", "openSUSE Leap 15.0:go1.11-doc-1.11.13-lp151.2.9.1.x86_64", "openSUSE Leap 15.0:go1.11-race-1.11.13-lp151.2.9.1.x86_64", "openSUSE Leap 15.1:go1.11-1.11.13-lp151.2.9.1.x86_64", "openSUSE Leap 15.1:go1.11-doc-1.11.13-lp151.2.9.1.x86_64", "openSUSE Leap 15.1:go1.11-race-1.11.13-lp151.2.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14809", "url": "https://www.suse.com/security/cve/CVE-2019-14809" }, { "category": "external", "summary": "SUSE Bug 1146123 for CVE-2019-14809", "url": "https://bugzilla.suse.com/1146123" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:go1.11-1.11.13-lp151.2.9.1.x86_64", "openSUSE Leap 15.0:go1.11-doc-1.11.13-lp151.2.9.1.x86_64", "openSUSE Leap 15.0:go1.11-race-1.11.13-lp151.2.9.1.x86_64", "openSUSE Leap 15.1:go1.11-1.11.13-lp151.2.9.1.x86_64", "openSUSE Leap 15.1:go1.11-doc-1.11.13-lp151.2.9.1.x86_64", "openSUSE Leap 15.1:go1.11-race-1.11.13-lp151.2.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.0:go1.11-1.11.13-lp151.2.9.1.x86_64", "openSUSE Leap 15.0:go1.11-doc-1.11.13-lp151.2.9.1.x86_64", "openSUSE Leap 15.0:go1.11-race-1.11.13-lp151.2.9.1.x86_64", "openSUSE Leap 15.1:go1.11-1.11.13-lp151.2.9.1.x86_64", "openSUSE Leap 15.1:go1.11-doc-1.11.13-lp151.2.9.1.x86_64", "openSUSE Leap 15.1:go1.11-race-1.11.13-lp151.2.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-05T08:24:15Z", "details": "critical" } ], "title": "CVE-2019-14809" }, { "cve": "CVE-2019-9512", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9512" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:go1.11-1.11.13-lp151.2.9.1.x86_64", "openSUSE Leap 15.0:go1.11-doc-1.11.13-lp151.2.9.1.x86_64", "openSUSE Leap 15.0:go1.11-race-1.11.13-lp151.2.9.1.x86_64", "openSUSE Leap 15.1:go1.11-1.11.13-lp151.2.9.1.x86_64", "openSUSE Leap 15.1:go1.11-doc-1.11.13-lp151.2.9.1.x86_64", "openSUSE Leap 15.1:go1.11-race-1.11.13-lp151.2.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9512", "url": "https://www.suse.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146099 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1146099" }, { "category": "external", "summary": "SUSE Bug 1146111 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1146111" }, { "category": "external", "summary": "SUSE Bug 1147142 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1147142" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:go1.11-1.11.13-lp151.2.9.1.x86_64", "openSUSE Leap 15.0:go1.11-doc-1.11.13-lp151.2.9.1.x86_64", "openSUSE Leap 15.0:go1.11-race-1.11.13-lp151.2.9.1.x86_64", "openSUSE Leap 15.1:go1.11-1.11.13-lp151.2.9.1.x86_64", "openSUSE Leap 15.1:go1.11-doc-1.11.13-lp151.2.9.1.x86_64", "openSUSE Leap 15.1:go1.11-race-1.11.13-lp151.2.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.0:go1.11-1.11.13-lp151.2.9.1.x86_64", "openSUSE Leap 15.0:go1.11-doc-1.11.13-lp151.2.9.1.x86_64", "openSUSE Leap 15.0:go1.11-race-1.11.13-lp151.2.9.1.x86_64", "openSUSE Leap 15.1:go1.11-1.11.13-lp151.2.9.1.x86_64", "openSUSE Leap 15.1:go1.11-doc-1.11.13-lp151.2.9.1.x86_64", "openSUSE Leap 15.1:go1.11-race-1.11.13-lp151.2.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-05T08:24:15Z", "details": "important" } ], "title": "CVE-2019-9512" }, { "cve": "CVE-2019-9514", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9514" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:go1.11-1.11.13-lp151.2.9.1.x86_64", "openSUSE Leap 15.0:go1.11-doc-1.11.13-lp151.2.9.1.x86_64", "openSUSE Leap 15.0:go1.11-race-1.11.13-lp151.2.9.1.x86_64", "openSUSE Leap 15.1:go1.11-1.11.13-lp151.2.9.1.x86_64", "openSUSE Leap 15.1:go1.11-doc-1.11.13-lp151.2.9.1.x86_64", "openSUSE Leap 15.1:go1.11-race-1.11.13-lp151.2.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9514", "url": "https://www.suse.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "SUSE Bug 1145662 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1145662" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146095 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1146095" }, { "category": "external", "summary": "SUSE Bug 1146115 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1146115" }, { "category": "external", "summary": "SUSE Bug 1147142 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1147142" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:go1.11-1.11.13-lp151.2.9.1.x86_64", "openSUSE Leap 15.0:go1.11-doc-1.11.13-lp151.2.9.1.x86_64", "openSUSE Leap 15.0:go1.11-race-1.11.13-lp151.2.9.1.x86_64", "openSUSE Leap 15.1:go1.11-1.11.13-lp151.2.9.1.x86_64", "openSUSE Leap 15.1:go1.11-doc-1.11.13-lp151.2.9.1.x86_64", "openSUSE Leap 15.1:go1.11-race-1.11.13-lp151.2.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.0:go1.11-1.11.13-lp151.2.9.1.x86_64", "openSUSE Leap 15.0:go1.11-doc-1.11.13-lp151.2.9.1.x86_64", "openSUSE Leap 15.0:go1.11-race-1.11.13-lp151.2.9.1.x86_64", "openSUSE Leap 15.1:go1.11-1.11.13-lp151.2.9.1.x86_64", "openSUSE Leap 15.1:go1.11-doc-1.11.13-lp151.2.9.1.x86_64", "openSUSE Leap 15.1:go1.11-race-1.11.13-lp151.2.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-05T08:24:15Z", "details": "important" } ], "title": "CVE-2019-9514" } ] }
suse-su-2020:0059-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for nodejs12", "title": "Title of the patch" }, { "category": "description", "text": "This update for nodejs12 fixes the following issues:\n\nUpdate to LTS release 12.13.0 (jsc#SLE-8947).\n\nSecurity issues fixed:\n\n- CVE-2019-9511: Fixed the HTTP/2 implementation that was vulnerable to window size manipulations (bsc#1146091).\n- CVE-2019-9512: Fixed the HTTP/2 implementation that was vulnerable to floods using PING frames (bsc#1146099).\n- CVE-2019-9513: Fixed the HTTP/2 implementation that was vulnerable to resource loops, potentially leading to a denial of service (bsc#1146094).\n- CVE-2019-9514: Fixed the HTTP/2 implementation that was vulnerable to a reset flood, potentially leading to a denial of service (bsc#1146095).\n- CVE-2019-9515: Fixed the HTTP/2 implementation that was vulnerable to a SETTINGS frame flood (bsc#1146100).\n- CVE-2019-9516: Fixed the HTTP/2 implementation that was vulnerable to a header leak, potentially leading to a denial of service (bsc#1146090).\n- CVE-2019-9517: Fixed the HTTP/2 implementation that was vulnerable to unconstrained interal data buffering (bsc#1146097).\n- CVE-2019-9518: Fixed the HTTP/2 implementation that was vulnerable to a flood of empty frames, potentially leading to a denial of service (bsc#1146093).\n- CVE-2019-13173: Fixed a file overwrite in the fstream.DirWriter() function (bsc#1140290).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-59,SUSE-SLE-Module-Web-Scripting-12-2020-59", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_0059-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:0059-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20200059-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:0059-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-January/006320.html" }, { "category": "self", "summary": "SUSE Bug 1140290", "url": "https://bugzilla.suse.com/1140290" }, { "category": "self", "summary": "SUSE Bug 1146090", "url": "https://bugzilla.suse.com/1146090" }, { "category": "self", "summary": "SUSE Bug 1146091", "url": "https://bugzilla.suse.com/1146091" }, { "category": "self", "summary": "SUSE Bug 1146093", "url": "https://bugzilla.suse.com/1146093" }, { "category": "self", "summary": "SUSE Bug 1146094", "url": "https://bugzilla.suse.com/1146094" }, { "category": "self", "summary": "SUSE Bug 1146095", "url": "https://bugzilla.suse.com/1146095" }, { "category": "self", "summary": "SUSE Bug 1146097", "url": "https://bugzilla.suse.com/1146097" }, { "category": "self", "summary": "SUSE Bug 1146099", "url": "https://bugzilla.suse.com/1146099" }, { "category": "self", "summary": "SUSE Bug 1146100", "url": "https://bugzilla.suse.com/1146100" }, { "category": "self", "summary": "SUSE Bug 1149792", "url": "https://bugzilla.suse.com/1149792" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13173 page", "url": "https://www.suse.com/security/cve/CVE-2019-13173/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9511 page", "url": "https://www.suse.com/security/cve/CVE-2019-9511/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9512 page", "url": "https://www.suse.com/security/cve/CVE-2019-9512/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9513 page", "url": "https://www.suse.com/security/cve/CVE-2019-9513/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9514 page", "url": "https://www.suse.com/security/cve/CVE-2019-9514/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9515 page", "url": "https://www.suse.com/security/cve/CVE-2019-9515/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9516 page", "url": "https://www.suse.com/security/cve/CVE-2019-9516/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9517 page", "url": "https://www.suse.com/security/cve/CVE-2019-9517/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9518 page", "url": "https://www.suse.com/security/cve/CVE-2019-9518/" }, { "category": "self", "summary": "SUSE Bug SLE-8947", "url": "https://bugzilla.suse.com/SLE-8947" } ], "title": "Security update for nodejs12", "tracking": { "current_release_date": "2020-01-09T12:30:16Z", "generator": { "date": "2020-01-09T12:30:16Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:0059-1", "initial_release_date": "2020-01-09T12:30:16Z", "revision_history": [ { "date": "2020-01-09T12:30:16Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "nodejs12-12.13.0-1.3.1.aarch64", "product": { "name": "nodejs12-12.13.0-1.3.1.aarch64", "product_id": "nodejs12-12.13.0-1.3.1.aarch64" } }, { "category": "product_version", "name": "nodejs12-devel-12.13.0-1.3.1.aarch64", "product": { "name": "nodejs12-devel-12.13.0-1.3.1.aarch64", "product_id": "nodejs12-devel-12.13.0-1.3.1.aarch64" } }, { "category": "product_version", "name": "npm12-12.13.0-1.3.1.aarch64", "product": { "name": "npm12-12.13.0-1.3.1.aarch64", "product_id": "npm12-12.13.0-1.3.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "nodejs12-docs-12.13.0-1.3.1.noarch", "product": { "name": "nodejs12-docs-12.13.0-1.3.1.noarch", "product_id": "nodejs12-docs-12.13.0-1.3.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "nodejs12-12.13.0-1.3.1.ppc64le", "product": { "name": "nodejs12-12.13.0-1.3.1.ppc64le", "product_id": "nodejs12-12.13.0-1.3.1.ppc64le" } }, { "category": "product_version", "name": "nodejs12-devel-12.13.0-1.3.1.ppc64le", "product": { "name": "nodejs12-devel-12.13.0-1.3.1.ppc64le", "product_id": "nodejs12-devel-12.13.0-1.3.1.ppc64le" } }, { "category": "product_version", "name": "npm12-12.13.0-1.3.1.ppc64le", "product": { "name": "npm12-12.13.0-1.3.1.ppc64le", "product_id": "npm12-12.13.0-1.3.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "nodejs12-12.13.0-1.3.1.s390x", "product": { "name": "nodejs12-12.13.0-1.3.1.s390x", "product_id": "nodejs12-12.13.0-1.3.1.s390x" } }, { "category": "product_version", "name": "nodejs12-devel-12.13.0-1.3.1.s390x", "product": { "name": "nodejs12-devel-12.13.0-1.3.1.s390x", "product_id": "nodejs12-devel-12.13.0-1.3.1.s390x" } }, { "category": "product_version", "name": "npm12-12.13.0-1.3.1.s390x", "product": { "name": "npm12-12.13.0-1.3.1.s390x", "product_id": "npm12-12.13.0-1.3.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "nodejs12-12.13.0-1.3.1.x86_64", "product": { "name": "nodejs12-12.13.0-1.3.1.x86_64", "product_id": "nodejs12-12.13.0-1.3.1.x86_64" } }, { "category": "product_version", "name": "nodejs12-devel-12.13.0-1.3.1.x86_64", "product": { "name": "nodejs12-devel-12.13.0-1.3.1.x86_64", "product_id": "nodejs12-devel-12.13.0-1.3.1.x86_64" } }, { "category": "product_version", "name": "npm12-12.13.0-1.3.1.x86_64", "product": { "name": "npm12-12.13.0-1.3.1.x86_64", "product_id": "npm12-12.13.0-1.3.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Web and Scripting 12", "product": { "name": "SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-web-scripting:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nodejs12-12.13.0-1.3.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64" }, "product_reference": "nodejs12-12.13.0-1.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-12.13.0-1.3.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le" }, "product_reference": "nodejs12-12.13.0-1.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-12.13.0-1.3.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x" }, "product_reference": "nodejs12-12.13.0-1.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-12.13.0-1.3.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64" }, "product_reference": "nodejs12-12.13.0-1.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-devel-12.13.0-1.3.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64" }, "product_reference": "nodejs12-devel-12.13.0-1.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-devel-12.13.0-1.3.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le" }, "product_reference": "nodejs12-devel-12.13.0-1.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-devel-12.13.0-1.3.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x" }, "product_reference": "nodejs12-devel-12.13.0-1.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-devel-12.13.0-1.3.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64" }, "product_reference": "nodejs12-devel-12.13.0-1.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-docs-12.13.0-1.3.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch" }, "product_reference": "nodejs12-docs-12.13.0-1.3.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "npm12-12.13.0-1.3.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64" }, "product_reference": "npm12-12.13.0-1.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "npm12-12.13.0-1.3.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le" }, "product_reference": "npm12-12.13.0-1.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "npm12-12.13.0-1.3.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x" }, "product_reference": "npm12-12.13.0-1.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "npm12-12.13.0-1.3.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" }, "product_reference": "npm12-12.13.0-1.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-13173", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-13173" } ], "notes": [ { "category": "general", "text": "fstream before 1.0.12 is vulnerable to Arbitrary File Overwrite. Extracting tarballs containing a hardlink to a file that already exists in the system, and a file that matches the hardlink, will overwrite the system\u0027s file with the contents of the extracted file. The fstream.DirWriter() function is vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-13173", "url": "https://www.suse.com/security/cve/CVE-2019-13173" }, { "category": "external", "summary": "SUSE Bug 1140290 for CVE-2019-13173", "url": "https://bugzilla.suse.com/1140290" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-09T12:30:16Z", "details": "important" } ], "title": "CVE-2019-13173" }, { "cve": "CVE-2019-9511", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9511" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9511", "url": "https://www.suse.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "SUSE Bug 1145579 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1145579" }, { "category": "external", "summary": "SUSE Bug 1146091 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1146091" }, { "category": "external", "summary": "SUSE Bug 1146182 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1146182" }, { "category": "external", "summary": "SUSE Bug 1193427 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1193427" }, { "category": "external", "summary": "SUSE Bug 1202787 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1202787" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-09T12:30:16Z", "details": "important" } ], "title": "CVE-2019-9511" }, { "cve": "CVE-2019-9512", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9512" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9512", "url": "https://www.suse.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146099 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1146099" }, { "category": "external", "summary": "SUSE Bug 1146111 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1146111" }, { "category": "external", "summary": "SUSE Bug 1147142 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1147142" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-09T12:30:16Z", "details": "important" } ], "title": "CVE-2019-9512" }, { "cve": "CVE-2019-9513", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9513" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9513", "url": "https://www.suse.com/security/cve/CVE-2019-9513" }, { "category": "external", "summary": "SUSE Bug 1145580 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1145580" }, { "category": "external", "summary": "SUSE Bug 1146094 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1146094" }, { "category": "external", "summary": "SUSE Bug 1146184 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1146184" }, { "category": "external", "summary": "SUSE Bug 1193427 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1193427" }, { "category": "external", "summary": "SUSE Bug 1202787 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1202787" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-09T12:30:16Z", "details": "important" } ], "title": "CVE-2019-9513" }, { "cve": "CVE-2019-9514", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9514" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9514", "url": "https://www.suse.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "SUSE Bug 1145662 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1145662" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146095 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1146095" }, { "category": "external", "summary": "SUSE Bug 1146115 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1146115" }, { "category": "external", "summary": "SUSE Bug 1147142 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1147142" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-09T12:30:16Z", "details": "important" } ], "title": "CVE-2019-9514" }, { "cve": "CVE-2019-9515", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9515" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a denial of service. The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the peer reply with one acknowledgement per SETTINGS frame, an empty SETTINGS frame is almost equivalent in behavior to a ping. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9515", "url": "https://www.suse.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9515", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146100 for CVE-2019-9515", "url": "https://bugzilla.suse.com/1146100" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-09T12:30:16Z", "details": "important" } ], "title": "CVE-2019-9515" }, { "cve": "CVE-2019-9516", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9516" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9516", "url": "https://www.suse.com/security/cve/CVE-2019-9516" }, { "category": "external", "summary": "SUSE Bug 1145582 for CVE-2019-9516", "url": "https://bugzilla.suse.com/1145582" }, { "category": "external", "summary": "SUSE Bug 1146090 for CVE-2019-9516", "url": "https://bugzilla.suse.com/1146090" }, { "category": "external", "summary": "SUSE Bug 1193427 for CVE-2019-9516", "url": "https://bugzilla.suse.com/1193427" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-09T12:30:16Z", "details": "important" } ], "title": "CVE-2019-9516" }, { "cve": "CVE-2019-9517", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9517" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to unconstrained interal data buffering, potentially leading to a denial of service. The attacker opens the HTTP/2 window so the peer can send without constraint; however, they leave the TCP window closed so the peer cannot actually write (many of) the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the servers queue the responses, this can consume excess memory, CPU, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9517", "url": "https://www.suse.com/security/cve/CVE-2019-9517" }, { "category": "external", "summary": "SUSE Bug 1145575 for CVE-2019-9517", "url": "https://bugzilla.suse.com/1145575" }, { "category": "external", "summary": "SUSE Bug 1146097 for CVE-2019-9517", "url": "https://bugzilla.suse.com/1146097" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-09T12:30:16Z", "details": "important" } ], "title": "CVE-2019-9517" }, { "cve": "CVE-2019-9518", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9518" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer spends time processing each frame disproportionate to attack bandwidth. This can consume excess CPU.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9518", "url": "https://www.suse.com/security/cve/CVE-2019-9518" }, { "category": "external", "summary": "SUSE Bug 1145662 for CVE-2019-9518", "url": "https://bugzilla.suse.com/1145662" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9518", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146093 for CVE-2019-9518", "url": "https://bugzilla.suse.com/1146093" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-09T12:30:16Z", "details": "important" } ], "title": "CVE-2019-9518" } ] }
suse-su-2019:2260-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for nodejs8", "title": "Title of the patch" }, { "category": "description", "text": "This update for nodejs8 to version 8.16.1 fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2019-9511: Fixed HTTP/2 implementations that are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service (bsc#1146091).\n- CVE-2019-9512: Fixed HTTP/2 flood using PING frames results in unbounded memory growth (bsc#1146099).\n- CVE-2019-9513: Fixed HTTP/2 implementation that is vulnerable to resource loops, potentially leading to a denial of service. (bsc#1146094).\n- CVE-2019-9514: Fixed HTTP/2 implementation that is vulnerable to a reset flood, potentially leading to a denial of service (bsc#1146095).\n- CVE-2019-9515: Fixed HTTP/2 flood using SETTINGS frames results in unbounded memory growth (bsc#1146100).\n- CVE-2019-9516: Fixed HTTP/2 implementation that is vulnerable to a header leak, potentially leading to a denial of service (bsc#1146090).\n- CVE-2019-9517: Fixed HTTP/2 implementations that are vulnerable to unconstrained interal data buffering (bsc#1146097).\n- CVE-2019-9518: Fixed HTTP/2 implementation that is vulnerable to a flood of empty frames, potentially leading to a denial of service (bsc#1146093).\n\nBug fixes:\n\n- Fixed that npm resolves its default config file like in all other versions, as /etc/nodejs/npmrc (bsc#1144919).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-2260,SUSE-SLE-Module-Web-Scripting-15-2019-2260,SUSE-SLE-Module-Web-Scripting-15-SP1-2019-2260", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2260-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:2260-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192260-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:2260-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-September/005862.html" }, { "category": "self", "summary": "SUSE Bug 1144919", "url": "https://bugzilla.suse.com/1144919" }, { "category": "self", "summary": "SUSE Bug 1146090", "url": "https://bugzilla.suse.com/1146090" }, { "category": "self", "summary": "SUSE Bug 1146091", "url": "https://bugzilla.suse.com/1146091" }, { "category": "self", "summary": "SUSE Bug 1146093", "url": "https://bugzilla.suse.com/1146093" }, { "category": "self", "summary": "SUSE Bug 1146094", "url": "https://bugzilla.suse.com/1146094" }, { "category": "self", "summary": "SUSE Bug 1146095", "url": "https://bugzilla.suse.com/1146095" }, { "category": "self", "summary": "SUSE Bug 1146097", "url": "https://bugzilla.suse.com/1146097" }, { "category": "self", "summary": "SUSE Bug 1146099", "url": "https://bugzilla.suse.com/1146099" }, { "category": "self", "summary": "SUSE Bug 1146100", "url": "https://bugzilla.suse.com/1146100" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9511 page", "url": "https://www.suse.com/security/cve/CVE-2019-9511/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9512 page", "url": "https://www.suse.com/security/cve/CVE-2019-9512/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9513 page", "url": "https://www.suse.com/security/cve/CVE-2019-9513/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9514 page", "url": "https://www.suse.com/security/cve/CVE-2019-9514/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9515 page", "url": "https://www.suse.com/security/cve/CVE-2019-9515/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9516 page", "url": "https://www.suse.com/security/cve/CVE-2019-9516/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9517 page", "url": "https://www.suse.com/security/cve/CVE-2019-9517/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9518 page", "url": "https://www.suse.com/security/cve/CVE-2019-9518/" } ], "title": "Security update for nodejs8", "tracking": { "current_release_date": "2019-09-02T07:04:20Z", "generator": { "date": "2019-09-02T07:04:20Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:2260-1", "initial_release_date": "2019-09-02T07:04:20Z", "revision_history": [ { "date": "2019-09-02T07:04:20Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "nodejs8-8.16.1-3.20.1.aarch64", "product": { "name": "nodejs8-8.16.1-3.20.1.aarch64", "product_id": "nodejs8-8.16.1-3.20.1.aarch64" } }, { "category": "product_version", "name": "nodejs8-devel-8.16.1-3.20.1.aarch64", "product": { "name": "nodejs8-devel-8.16.1-3.20.1.aarch64", "product_id": "nodejs8-devel-8.16.1-3.20.1.aarch64" } }, { "category": "product_version", "name": "npm8-8.16.1-3.20.1.aarch64", "product": { "name": "npm8-8.16.1-3.20.1.aarch64", "product_id": "npm8-8.16.1-3.20.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "nodejs8-8.16.1-3.20.1.i586", "product": { "name": "nodejs8-8.16.1-3.20.1.i586", "product_id": "nodejs8-8.16.1-3.20.1.i586" } }, { "category": "product_version", "name": "nodejs8-devel-8.16.1-3.20.1.i586", "product": { "name": "nodejs8-devel-8.16.1-3.20.1.i586", "product_id": "nodejs8-devel-8.16.1-3.20.1.i586" } }, { "category": "product_version", "name": "npm8-8.16.1-3.20.1.i586", "product": { "name": "npm8-8.16.1-3.20.1.i586", "product_id": "npm8-8.16.1-3.20.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "nodejs8-docs-8.16.1-3.20.1.noarch", "product": { "name": "nodejs8-docs-8.16.1-3.20.1.noarch", "product_id": "nodejs8-docs-8.16.1-3.20.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "nodejs8-8.16.1-3.20.1.ppc64le", "product": { "name": "nodejs8-8.16.1-3.20.1.ppc64le", "product_id": "nodejs8-8.16.1-3.20.1.ppc64le" } }, { "category": "product_version", "name": "nodejs8-devel-8.16.1-3.20.1.ppc64le", "product": { "name": "nodejs8-devel-8.16.1-3.20.1.ppc64le", "product_id": "nodejs8-devel-8.16.1-3.20.1.ppc64le" } }, { "category": "product_version", "name": "npm8-8.16.1-3.20.1.ppc64le", "product": { "name": "npm8-8.16.1-3.20.1.ppc64le", "product_id": "npm8-8.16.1-3.20.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "nodejs8-8.16.1-3.20.1.s390x", "product": { "name": "nodejs8-8.16.1-3.20.1.s390x", "product_id": "nodejs8-8.16.1-3.20.1.s390x" } }, { "category": "product_version", "name": "nodejs8-devel-8.16.1-3.20.1.s390x", "product": { "name": "nodejs8-devel-8.16.1-3.20.1.s390x", "product_id": "nodejs8-devel-8.16.1-3.20.1.s390x" } }, { "category": "product_version", "name": "npm8-8.16.1-3.20.1.s390x", "product": { "name": "npm8-8.16.1-3.20.1.s390x", "product_id": "npm8-8.16.1-3.20.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "nodejs8-8.16.1-3.20.1.x86_64", "product": { "name": "nodejs8-8.16.1-3.20.1.x86_64", "product_id": "nodejs8-8.16.1-3.20.1.x86_64" } }, { "category": "product_version", "name": "nodejs8-devel-8.16.1-3.20.1.x86_64", "product": { "name": "nodejs8-devel-8.16.1-3.20.1.x86_64", "product_id": "nodejs8-devel-8.16.1-3.20.1.x86_64" } }, { "category": "product_version", "name": "npm8-8.16.1-3.20.1.x86_64", "product": { "name": "npm8-8.16.1-3.20.1.x86_64", "product_id": "npm8-8.16.1-3.20.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Web and Scripting 15", "product": { "name": "SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-web-scripting:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product": { "name": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-web-scripting:15:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nodejs8-8.16.1-3.20.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.aarch64" }, "product_reference": "nodejs8-8.16.1-3.20.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-8.16.1-3.20.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.ppc64le" }, "product_reference": "nodejs8-8.16.1-3.20.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-8.16.1-3.20.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.s390x" }, "product_reference": "nodejs8-8.16.1-3.20.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-8.16.1-3.20.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.x86_64" }, "product_reference": "nodejs8-8.16.1-3.20.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-devel-8.16.1-3.20.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.aarch64" }, "product_reference": "nodejs8-devel-8.16.1-3.20.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-devel-8.16.1-3.20.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.ppc64le" }, "product_reference": "nodejs8-devel-8.16.1-3.20.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-devel-8.16.1-3.20.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.s390x" }, "product_reference": "nodejs8-devel-8.16.1-3.20.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-devel-8.16.1-3.20.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.x86_64" }, "product_reference": "nodejs8-devel-8.16.1-3.20.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-docs-8.16.1-3.20.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-docs-8.16.1-3.20.1.noarch" }, "product_reference": "nodejs8-docs-8.16.1-3.20.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15" }, { "category": "default_component_of", "full_product_name": { "name": "npm8-8.16.1-3.20.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.aarch64" }, "product_reference": "npm8-8.16.1-3.20.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15" }, { "category": "default_component_of", "full_product_name": { "name": "npm8-8.16.1-3.20.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.ppc64le" }, "product_reference": "npm8-8.16.1-3.20.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15" }, { "category": "default_component_of", "full_product_name": { "name": "npm8-8.16.1-3.20.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.s390x" }, "product_reference": "npm8-8.16.1-3.20.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15" }, { "category": "default_component_of", "full_product_name": { "name": "npm8-8.16.1-3.20.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.x86_64" }, "product_reference": "npm8-8.16.1-3.20.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-8.16.1-3.20.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.aarch64" }, "product_reference": "nodejs8-8.16.1-3.20.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-8.16.1-3.20.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.ppc64le" }, "product_reference": "nodejs8-8.16.1-3.20.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-8.16.1-3.20.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.s390x" }, "product_reference": "nodejs8-8.16.1-3.20.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-8.16.1-3.20.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.x86_64" }, "product_reference": "nodejs8-8.16.1-3.20.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-devel-8.16.1-3.20.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.aarch64" }, "product_reference": "nodejs8-devel-8.16.1-3.20.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-devel-8.16.1-3.20.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.ppc64le" }, "product_reference": "nodejs8-devel-8.16.1-3.20.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-devel-8.16.1-3.20.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.s390x" }, "product_reference": "nodejs8-devel-8.16.1-3.20.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-devel-8.16.1-3.20.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.x86_64" }, "product_reference": "nodejs8-devel-8.16.1-3.20.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-docs-8.16.1-3.20.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-docs-8.16.1-3.20.1.noarch" }, "product_reference": "nodejs8-docs-8.16.1-3.20.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "npm8-8.16.1-3.20.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.aarch64" }, "product_reference": "npm8-8.16.1-3.20.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "npm8-8.16.1-3.20.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.ppc64le" }, "product_reference": "npm8-8.16.1-3.20.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "npm8-8.16.1-3.20.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.s390x" }, "product_reference": "npm8-8.16.1-3.20.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "npm8-8.16.1-3.20.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.x86_64" }, "product_reference": "npm8-8.16.1-3.20.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-9511", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9511" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9511", "url": "https://www.suse.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "SUSE Bug 1145579 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1145579" }, { "category": "external", "summary": "SUSE Bug 1146091 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1146091" }, { "category": "external", "summary": "SUSE Bug 1146182 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1146182" }, { "category": "external", "summary": "SUSE Bug 1193427 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1193427" }, { "category": "external", "summary": "SUSE Bug 1202787 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1202787" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-02T07:04:20Z", "details": "important" } ], "title": "CVE-2019-9511" }, { "cve": "CVE-2019-9512", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9512" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9512", "url": "https://www.suse.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146099 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1146099" }, { "category": "external", "summary": "SUSE Bug 1146111 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1146111" }, { "category": "external", "summary": "SUSE Bug 1147142 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1147142" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-02T07:04:20Z", "details": "important" } ], "title": "CVE-2019-9512" }, { "cve": "CVE-2019-9513", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9513" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9513", "url": "https://www.suse.com/security/cve/CVE-2019-9513" }, { "category": "external", "summary": "SUSE Bug 1145580 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1145580" }, { "category": "external", "summary": "SUSE Bug 1146094 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1146094" }, { "category": "external", "summary": "SUSE Bug 1146184 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1146184" }, { "category": "external", "summary": "SUSE Bug 1193427 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1193427" }, { "category": "external", "summary": "SUSE Bug 1202787 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1202787" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-02T07:04:20Z", "details": "important" } ], "title": "CVE-2019-9513" }, { "cve": "CVE-2019-9514", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9514" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9514", "url": "https://www.suse.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "SUSE Bug 1145662 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1145662" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146095 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1146095" }, { "category": "external", "summary": "SUSE Bug 1146115 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1146115" }, { "category": "external", "summary": "SUSE Bug 1147142 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1147142" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-02T07:04:20Z", "details": "important" } ], "title": "CVE-2019-9514" }, { "cve": "CVE-2019-9515", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9515" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a denial of service. The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the peer reply with one acknowledgement per SETTINGS frame, an empty SETTINGS frame is almost equivalent in behavior to a ping. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9515", "url": "https://www.suse.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9515", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146100 for CVE-2019-9515", "url": "https://bugzilla.suse.com/1146100" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-02T07:04:20Z", "details": "important" } ], "title": "CVE-2019-9515" }, { "cve": "CVE-2019-9516", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9516" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9516", "url": "https://www.suse.com/security/cve/CVE-2019-9516" }, { "category": "external", "summary": "SUSE Bug 1145582 for CVE-2019-9516", "url": "https://bugzilla.suse.com/1145582" }, { "category": "external", "summary": "SUSE Bug 1146090 for CVE-2019-9516", "url": "https://bugzilla.suse.com/1146090" }, { "category": "external", "summary": "SUSE Bug 1193427 for CVE-2019-9516", "url": "https://bugzilla.suse.com/1193427" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-02T07:04:20Z", "details": "important" } ], "title": "CVE-2019-9516" }, { "cve": "CVE-2019-9517", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9517" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to unconstrained interal data buffering, potentially leading to a denial of service. The attacker opens the HTTP/2 window so the peer can send without constraint; however, they leave the TCP window closed so the peer cannot actually write (many of) the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the servers queue the responses, this can consume excess memory, CPU, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9517", "url": "https://www.suse.com/security/cve/CVE-2019-9517" }, { "category": "external", "summary": "SUSE Bug 1145575 for CVE-2019-9517", "url": "https://bugzilla.suse.com/1145575" }, { "category": "external", "summary": "SUSE Bug 1146097 for CVE-2019-9517", "url": "https://bugzilla.suse.com/1146097" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-02T07:04:20Z", "details": "important" } ], "title": "CVE-2019-9517" }, { "cve": "CVE-2019-9518", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9518" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer spends time processing each frame disproportionate to attack bandwidth. This can consume excess CPU.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9518", "url": "https://www.suse.com/security/cve/CVE-2019-9518" }, { "category": "external", "summary": "SUSE Bug 1145662 for CVE-2019-9518", "url": "https://bugzilla.suse.com/1145662" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9518", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146093 for CVE-2019-9518", "url": "https://bugzilla.suse.com/1146093" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-02T07:04:20Z", "details": "important" } ], "title": "CVE-2019-9518" } ] }
suse-su-2019:2254-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for nodejs10", "title": "Title of the patch" }, { "category": "description", "text": "This update for nodejs10 to version 10.16.3 fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2019-9511: Fixed HTTP/2 implementations that are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service (bsc#1146091).\n- CVE-2019-9512: Fixed HTTP/2 flood using PING frames results in unbounded memory growth (bsc#1146099).\n- CVE-2019-9513: Fixed HTTP/2 implementation that is vulnerable to resource loops, potentially leading to a denial of service. (bsc#1146094).\n- CVE-2019-9514: Fixed HTTP/2 implementation that is vulnerable to a reset flood, potentially leading to a denial of service (bsc#1146095).\n- CVE-2019-9515: Fixed HTTP/2 flood using SETTINGS frames results in unbounded memory growth (bsc#1146100).\n- CVE-2019-9516: Fixed HTTP/2 implementation that is vulnerable to a header leak, potentially leading to a denial of service (bsc#1146090).\n- CVE-2019-9517: Fixed HTTP/2 implementations that are vulnerable to unconstrained interal data buffering (bsc#1146097).\n- CVE-2019-9518: Fixed HTTP/2 implementation that is vulnerable to a flood of empty frames, potentially leading to a denial of service (bsc#1146093).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-2254,SUSE-SLE-Module-Web-Scripting-12-2019-2254", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2254-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:2254-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192254-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:2254-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-August/005861.html" }, { "category": "self", "summary": "SUSE Bug 1146090", "url": "https://bugzilla.suse.com/1146090" }, { "category": "self", "summary": "SUSE Bug 1146091", "url": "https://bugzilla.suse.com/1146091" }, { "category": "self", "summary": "SUSE Bug 1146093", "url": "https://bugzilla.suse.com/1146093" }, { "category": "self", "summary": "SUSE Bug 1146094", "url": "https://bugzilla.suse.com/1146094" }, { "category": "self", "summary": "SUSE Bug 1146095", "url": "https://bugzilla.suse.com/1146095" }, { "category": "self", "summary": "SUSE Bug 1146097", "url": "https://bugzilla.suse.com/1146097" }, { "category": "self", "summary": "SUSE Bug 1146099", "url": "https://bugzilla.suse.com/1146099" }, { "category": "self", "summary": "SUSE Bug 1146100", "url": "https://bugzilla.suse.com/1146100" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9511 page", "url": "https://www.suse.com/security/cve/CVE-2019-9511/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9512 page", "url": "https://www.suse.com/security/cve/CVE-2019-9512/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9513 page", "url": "https://www.suse.com/security/cve/CVE-2019-9513/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9514 page", "url": "https://www.suse.com/security/cve/CVE-2019-9514/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9515 page", "url": "https://www.suse.com/security/cve/CVE-2019-9515/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9516 page", "url": "https://www.suse.com/security/cve/CVE-2019-9516/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9517 page", "url": "https://www.suse.com/security/cve/CVE-2019-9517/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9518 page", "url": "https://www.suse.com/security/cve/CVE-2019-9518/" } ], "title": "Security update for nodejs10", "tracking": { "current_release_date": "2019-08-29T16:53:45Z", "generator": { "date": "2019-08-29T16:53:45Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:2254-1", "initial_release_date": "2019-08-29T16:53:45Z", "revision_history": [ { "date": "2019-08-29T16:53:45Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "nodejs10-10.16.3-1.12.1.aarch64", "product": { "name": "nodejs10-10.16.3-1.12.1.aarch64", "product_id": "nodejs10-10.16.3-1.12.1.aarch64" } }, { "category": "product_version", "name": "nodejs10-devel-10.16.3-1.12.1.aarch64", "product": { "name": "nodejs10-devel-10.16.3-1.12.1.aarch64", "product_id": "nodejs10-devel-10.16.3-1.12.1.aarch64" } }, { "category": "product_version", "name": "npm10-10.16.3-1.12.1.aarch64", "product": { "name": "npm10-10.16.3-1.12.1.aarch64", "product_id": "npm10-10.16.3-1.12.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "nodejs10-10.16.3-1.12.1.i586", "product": { "name": "nodejs10-10.16.3-1.12.1.i586", "product_id": "nodejs10-10.16.3-1.12.1.i586" } }, { "category": "product_version", "name": "nodejs10-devel-10.16.3-1.12.1.i586", "product": { "name": "nodejs10-devel-10.16.3-1.12.1.i586", "product_id": "nodejs10-devel-10.16.3-1.12.1.i586" } }, { "category": "product_version", "name": "npm10-10.16.3-1.12.1.i586", "product": { "name": "npm10-10.16.3-1.12.1.i586", "product_id": "npm10-10.16.3-1.12.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "nodejs10-docs-10.16.3-1.12.1.noarch", "product": { "name": "nodejs10-docs-10.16.3-1.12.1.noarch", "product_id": "nodejs10-docs-10.16.3-1.12.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "nodejs10-10.16.3-1.12.1.ppc64le", "product": { "name": "nodejs10-10.16.3-1.12.1.ppc64le", "product_id": "nodejs10-10.16.3-1.12.1.ppc64le" } }, { "category": "product_version", "name": "nodejs10-devel-10.16.3-1.12.1.ppc64le", "product": { "name": "nodejs10-devel-10.16.3-1.12.1.ppc64le", "product_id": "nodejs10-devel-10.16.3-1.12.1.ppc64le" } }, { "category": "product_version", "name": "npm10-10.16.3-1.12.1.ppc64le", "product": { "name": "npm10-10.16.3-1.12.1.ppc64le", "product_id": "npm10-10.16.3-1.12.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "nodejs10-10.16.3-1.12.1.s390", "product": { "name": "nodejs10-10.16.3-1.12.1.s390", "product_id": "nodejs10-10.16.3-1.12.1.s390" } }, { "category": "product_version", "name": "nodejs10-devel-10.16.3-1.12.1.s390", "product": { "name": "nodejs10-devel-10.16.3-1.12.1.s390", "product_id": "nodejs10-devel-10.16.3-1.12.1.s390" } }, { "category": "product_version", "name": "npm10-10.16.3-1.12.1.s390", "product": { "name": "npm10-10.16.3-1.12.1.s390", "product_id": "npm10-10.16.3-1.12.1.s390" } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "nodejs10-10.16.3-1.12.1.s390x", "product": { "name": "nodejs10-10.16.3-1.12.1.s390x", "product_id": "nodejs10-10.16.3-1.12.1.s390x" } }, { "category": "product_version", "name": "nodejs10-devel-10.16.3-1.12.1.s390x", "product": { "name": "nodejs10-devel-10.16.3-1.12.1.s390x", "product_id": "nodejs10-devel-10.16.3-1.12.1.s390x" } }, { "category": "product_version", "name": "npm10-10.16.3-1.12.1.s390x", "product": { "name": "npm10-10.16.3-1.12.1.s390x", "product_id": "npm10-10.16.3-1.12.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "nodejs10-10.16.3-1.12.1.x86_64", "product": { "name": "nodejs10-10.16.3-1.12.1.x86_64", "product_id": "nodejs10-10.16.3-1.12.1.x86_64" } }, { "category": "product_version", "name": "nodejs10-devel-10.16.3-1.12.1.x86_64", "product": { "name": "nodejs10-devel-10.16.3-1.12.1.x86_64", "product_id": "nodejs10-devel-10.16.3-1.12.1.x86_64" } }, { "category": "product_version", "name": "npm10-10.16.3-1.12.1.x86_64", "product": { "name": "npm10-10.16.3-1.12.1.x86_64", "product_id": "npm10-10.16.3-1.12.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Web and Scripting 12", "product": { "name": "SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-web-scripting:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.16.3-1.12.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.aarch64" }, "product_reference": "nodejs10-10.16.3-1.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.16.3-1.12.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.ppc64le" }, "product_reference": "nodejs10-10.16.3-1.12.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.16.3-1.12.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.s390x" }, "product_reference": "nodejs10-10.16.3-1.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.16.3-1.12.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.x86_64" }, "product_reference": "nodejs10-10.16.3-1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.16.3-1.12.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.aarch64" }, "product_reference": "nodejs10-devel-10.16.3-1.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.16.3-1.12.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.ppc64le" }, "product_reference": "nodejs10-devel-10.16.3-1.12.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.16.3-1.12.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.s390x" }, "product_reference": "nodejs10-devel-10.16.3-1.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.16.3-1.12.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.x86_64" }, "product_reference": "nodejs10-devel-10.16.3-1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-docs-10.16.3-1.12.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.16.3-1.12.1.noarch" }, "product_reference": "nodejs10-docs-10.16.3-1.12.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.16.3-1.12.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.aarch64" }, "product_reference": "npm10-10.16.3-1.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.16.3-1.12.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.ppc64le" }, "product_reference": "npm10-10.16.3-1.12.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.16.3-1.12.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.s390x" }, "product_reference": "npm10-10.16.3-1.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.16.3-1.12.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.x86_64" }, "product_reference": "npm10-10.16.3-1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-9511", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9511" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9511", "url": "https://www.suse.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "SUSE Bug 1145579 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1145579" }, { "category": "external", "summary": "SUSE Bug 1146091 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1146091" }, { "category": "external", "summary": "SUSE Bug 1146182 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1146182" }, { "category": "external", "summary": "SUSE Bug 1193427 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1193427" }, { "category": "external", "summary": "SUSE Bug 1202787 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1202787" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-29T16:53:45Z", "details": "important" } ], "title": "CVE-2019-9511" }, { "cve": "CVE-2019-9512", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9512" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9512", "url": "https://www.suse.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146099 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1146099" }, { "category": "external", "summary": "SUSE Bug 1146111 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1146111" }, { "category": "external", "summary": "SUSE Bug 1147142 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1147142" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-29T16:53:45Z", "details": "important" } ], "title": "CVE-2019-9512" }, { "cve": "CVE-2019-9513", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9513" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9513", "url": "https://www.suse.com/security/cve/CVE-2019-9513" }, { "category": "external", "summary": "SUSE Bug 1145580 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1145580" }, { "category": "external", "summary": "SUSE Bug 1146094 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1146094" }, { "category": "external", "summary": "SUSE Bug 1146184 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1146184" }, { "category": "external", "summary": "SUSE Bug 1193427 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1193427" }, { "category": "external", "summary": "SUSE Bug 1202787 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1202787" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-29T16:53:45Z", "details": "important" } ], "title": "CVE-2019-9513" }, { "cve": "CVE-2019-9514", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9514" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9514", "url": "https://www.suse.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "SUSE Bug 1145662 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1145662" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146095 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1146095" }, { "category": "external", "summary": "SUSE Bug 1146115 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1146115" }, { "category": "external", "summary": "SUSE Bug 1147142 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1147142" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-29T16:53:45Z", "details": "important" } ], "title": "CVE-2019-9514" }, { "cve": "CVE-2019-9515", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9515" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a denial of service. The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the peer reply with one acknowledgement per SETTINGS frame, an empty SETTINGS frame is almost equivalent in behavior to a ping. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9515", "url": "https://www.suse.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9515", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146100 for CVE-2019-9515", "url": "https://bugzilla.suse.com/1146100" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-29T16:53:45Z", "details": "important" } ], "title": "CVE-2019-9515" }, { "cve": "CVE-2019-9516", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9516" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9516", "url": "https://www.suse.com/security/cve/CVE-2019-9516" }, { "category": "external", "summary": "SUSE Bug 1145582 for CVE-2019-9516", "url": "https://bugzilla.suse.com/1145582" }, { "category": "external", "summary": "SUSE Bug 1146090 for CVE-2019-9516", "url": "https://bugzilla.suse.com/1146090" }, { "category": "external", "summary": "SUSE Bug 1193427 for CVE-2019-9516", "url": "https://bugzilla.suse.com/1193427" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-29T16:53:45Z", "details": "important" } ], "title": "CVE-2019-9516" }, { "cve": "CVE-2019-9517", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9517" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to unconstrained interal data buffering, potentially leading to a denial of service. The attacker opens the HTTP/2 window so the peer can send without constraint; however, they leave the TCP window closed so the peer cannot actually write (many of) the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the servers queue the responses, this can consume excess memory, CPU, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9517", "url": "https://www.suse.com/security/cve/CVE-2019-9517" }, { "category": "external", "summary": "SUSE Bug 1145575 for CVE-2019-9517", "url": "https://bugzilla.suse.com/1145575" }, { "category": "external", "summary": "SUSE Bug 1146097 for CVE-2019-9517", "url": "https://bugzilla.suse.com/1146097" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-29T16:53:45Z", "details": "important" } ], "title": "CVE-2019-9517" }, { "cve": "CVE-2019-9518", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9518" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer spends time processing each frame disproportionate to attack bandwidth. This can consume excess CPU.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9518", "url": "https://www.suse.com/security/cve/CVE-2019-9518" }, { "category": "external", "summary": "SUSE Bug 1145662 for CVE-2019-9518", "url": "https://bugzilla.suse.com/1145662" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9518", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146093 for CVE-2019-9518", "url": "https://bugzilla.suse.com/1146093" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-29T16:53:45Z", "details": "important" } ], "title": "CVE-2019-9518" } ] }
suse-su-2019:14246-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Mozilla Firefox", "title": "Title of the patch" }, { "category": "description", "text": "\nThis update contains the Mozilla Firefox ESR 68.2 release.\n\nMozilla Firefox was updated to ESR 68.2 release:\n\n* Enterprise: New administrative policies were added. More\n information and templates are available at the Policy\n Templates page.\n\n* Various security fixes:\n MFSA 2019-33 (bsc#1154738)\n * CVE-2019-15903: Heap overflow in expat library in XML_GetCurrentLineNumber\n * CVE-2019-11757: Use-after-free when creating index updates in IndexedDB\n * CVE-2019-11758: Potentially exploitable crash due to 360 Total Security\n * CVE-2019-11759: Stack buffer overflow in HKDF output\n * CVE-2019-11760: Stack buffer overflow in WebRTC networking\n * CVE-2019-11761: Unintended access to a privileged JSONView object\n * CVE-2019-11762: document.domain-based origin isolation has same-origin- property violation\n * CVE-2019-11763: Incorrect HTML parsing results in XSS bypass technique\n * CVE-2019-11764: Memory safety bugs fixed in Firefox 70 and Firefox ESR 68.2\n\nOther Issues resolved:\n\n* [bsc#1104841] Newer versions of firefox have a dependency on\n GLIBCXX_3.4.20\n* [bsc#1074235] MozillaFirefox: background tab crash reports sent\n inadvertently without user opt-in\n* [bsc#1043008] Firefox hangs randomly when browsing and\n scrolling\n* [bsc#1025108] Firefox stops loading page until mouse is moved\n* [bsc#905528] Firefox malfunctions due to broken omni.ja\n archives\n\n", "title": "Description of the patch" }, { "category": "details", "text": "slessp4-firefox-201910-14246", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_14246-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:14246-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-201914246-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:14246-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" }, { "category": "self", "summary": "SUSE Bug 1000036", "url": "https://bugzilla.suse.com/1000036" }, { "category": "self", "summary": "SUSE Bug 1001652", "url": "https://bugzilla.suse.com/1001652" }, { "category": "self", "summary": "SUSE Bug 1025108", "url": "https://bugzilla.suse.com/1025108" }, { "category": "self", "summary": "SUSE Bug 1029377", "url": "https://bugzilla.suse.com/1029377" }, { "category": "self", "summary": "SUSE Bug 1029902", "url": "https://bugzilla.suse.com/1029902" }, { "category": "self", "summary": "SUSE Bug 1040164", "url": "https://bugzilla.suse.com/1040164" }, { "category": "self", "summary": "SUSE Bug 104105", "url": "https://bugzilla.suse.com/104105" }, { "category": "self", "summary": "SUSE Bug 1042670", "url": "https://bugzilla.suse.com/1042670" }, { "category": "self", "summary": "SUSE Bug 1043008", "url": "https://bugzilla.suse.com/1043008" }, { "category": "self", "summary": "SUSE Bug 1044946", "url": "https://bugzilla.suse.com/1044946" }, { "category": "self", "summary": "SUSE Bug 1047925", "url": "https://bugzilla.suse.com/1047925" }, { "category": "self", "summary": "SUSE Bug 1047936", "url": "https://bugzilla.suse.com/1047936" }, { "category": "self", "summary": "SUSE Bug 1048299", "url": "https://bugzilla.suse.com/1048299" }, { "category": "self", "summary": "SUSE Bug 1049186", "url": "https://bugzilla.suse.com/1049186" }, { "category": "self", "summary": "SUSE Bug 1050653", "url": "https://bugzilla.suse.com/1050653" }, { "category": "self", "summary": "SUSE Bug 1056058", "url": "https://bugzilla.suse.com/1056058" }, { "category": "self", "summary": "SUSE Bug 1058013", "url": "https://bugzilla.suse.com/1058013" }, { "category": "self", "summary": "SUSE Bug 1066242", "url": "https://bugzilla.suse.com/1066242" }, { "category": "self", "summary": "SUSE Bug 1066953", "url": "https://bugzilla.suse.com/1066953" }, { "category": "self", "summary": "SUSE Bug 1070738", "url": "https://bugzilla.suse.com/1070738" }, { "category": "self", "summary": "SUSE Bug 1070853", "url": "https://bugzilla.suse.com/1070853" }, { "category": "self", "summary": "SUSE Bug 1072320", "url": "https://bugzilla.suse.com/1072320" }, { "category": "self", "summary": "SUSE Bug 1072322", "url": "https://bugzilla.suse.com/1072322" }, { "category": "self", "summary": "SUSE Bug 1073796", "url": "https://bugzilla.suse.com/1073796" }, { "category": "self", "summary": "SUSE Bug 1073798", "url": "https://bugzilla.suse.com/1073798" }, { "category": "self", "summary": "SUSE Bug 1073799", "url": "https://bugzilla.suse.com/1073799" }, { "category": "self", "summary": "SUSE Bug 1073803", "url": "https://bugzilla.suse.com/1073803" }, { "category": "self", "summary": "SUSE Bug 1073808", "url": "https://bugzilla.suse.com/1073808" }, { "category": "self", "summary": "SUSE Bug 1073818", "url": "https://bugzilla.suse.com/1073818" }, { "category": "self", "summary": "SUSE Bug 1073823", "url": "https://bugzilla.suse.com/1073823" }, { "category": "self", "summary": "SUSE Bug 1073829", "url": "https://bugzilla.suse.com/1073829" }, { "category": "self", "summary": "SUSE Bug 1073830", "url": "https://bugzilla.suse.com/1073830" }, { "category": "self", "summary": "SUSE Bug 1073832", "url": "https://bugzilla.suse.com/1073832" }, { "category": "self", "summary": "SUSE Bug 1073846", "url": "https://bugzilla.suse.com/1073846" }, { "category": "self", "summary": "SUSE Bug 1074235", "url": "https://bugzilla.suse.com/1074235" }, { "category": "self", "summary": "SUSE Bug 1077230", "url": "https://bugzilla.suse.com/1077230" }, { "category": "self", "summary": "SUSE Bug 1079761", "url": "https://bugzilla.suse.com/1079761" }, { "category": "self", "summary": "SUSE Bug 1081750", "url": "https://bugzilla.suse.com/1081750" }, { "category": "self", "summary": "SUSE Bug 1082318", "url": "https://bugzilla.suse.com/1082318" }, { "category": "self", "summary": "SUSE Bug 1087453", "url": "https://bugzilla.suse.com/1087453" }, { "category": "self", "summary": "SUSE Bug 1087459", "url": "https://bugzilla.suse.com/1087459" }, { "category": "self", "summary": "SUSE Bug 1087463", "url": "https://bugzilla.suse.com/1087463" }, { "category": "self", "summary": "SUSE Bug 1088573", "url": "https://bugzilla.suse.com/1088573" }, { "category": "self", "summary": "SUSE Bug 1091764", "url": "https://bugzilla.suse.com/1091764" }, { "category": "self", "summary": "SUSE Bug 1094814", "url": "https://bugzilla.suse.com/1094814" }, { "category": "self", "summary": "SUSE Bug 1097158", "url": "https://bugzilla.suse.com/1097158" }, { "category": "self", "summary": "SUSE Bug 1097375", "url": "https://bugzilla.suse.com/1097375" }, { "category": "self", "summary": "SUSE Bug 1097401", "url": "https://bugzilla.suse.com/1097401" }, { "category": "self", "summary": "SUSE Bug 1097404", "url": "https://bugzilla.suse.com/1097404" }, { "category": "self", "summary": "SUSE Bug 1097748", "url": "https://bugzilla.suse.com/1097748" }, { "category": "self", "summary": "SUSE Bug 1104841", "url": "https://bugzilla.suse.com/1104841" }, { "category": "self", "summary": "SUSE Bug 1105019", "url": "https://bugzilla.suse.com/1105019" }, { "category": "self", "summary": "SUSE Bug 1107030", "url": "https://bugzilla.suse.com/1107030" }, { "category": "self", "summary": "SUSE Bug 1109465", "url": "https://bugzilla.suse.com/1109465" }, { "category": "self", "summary": "SUSE Bug 1117473", "url": "https://bugzilla.suse.com/1117473" }, { "category": "self", "summary": "SUSE Bug 1117626", "url": "https://bugzilla.suse.com/1117626" }, { "category": "self", "summary": "SUSE Bug 1117627", "url": "https://bugzilla.suse.com/1117627" }, { "category": "self", "summary": "SUSE Bug 1117629", "url": "https://bugzilla.suse.com/1117629" }, { "category": "self", "summary": "SUSE Bug 1117630", "url": "https://bugzilla.suse.com/1117630" }, { "category": "self", "summary": "SUSE Bug 1120644", "url": "https://bugzilla.suse.com/1120644" }, { "category": "self", "summary": "SUSE Bug 1122191", "url": "https://bugzilla.suse.com/1122191" }, { "category": "self", "summary": "SUSE Bug 1123482", "url": "https://bugzilla.suse.com/1123482" }, { "category": "self", "summary": "SUSE Bug 1124525", "url": "https://bugzilla.suse.com/1124525" }, { "category": "self", "summary": "SUSE Bug 1127532", "url": "https://bugzilla.suse.com/1127532" }, { "category": "self", "summary": "SUSE Bug 1129346", "url": "https://bugzilla.suse.com/1129346" }, { "category": "self", "summary": "SUSE Bug 1130694", "url": "https://bugzilla.suse.com/1130694" }, { "category": "self", "summary": "SUSE Bug 1130840", "url": "https://bugzilla.suse.com/1130840" }, { "category": "self", "summary": "SUSE Bug 1133452", "url": "https://bugzilla.suse.com/1133452" }, { "category": "self", "summary": "SUSE Bug 1133810", "url": "https://bugzilla.suse.com/1133810" }, { "category": "self", "summary": "SUSE Bug 1134209", "url": "https://bugzilla.suse.com/1134209" }, { "category": "self", "summary": "SUSE Bug 1138459", "url": "https://bugzilla.suse.com/1138459" }, { "category": "self", "summary": "SUSE Bug 1140290", "url": "https://bugzilla.suse.com/1140290" }, { "category": "self", "summary": "SUSE Bug 1140868", "url": "https://bugzilla.suse.com/1140868" }, { "category": "self", "summary": "SUSE Bug 1141853", "url": "https://bugzilla.suse.com/1141853" }, { "category": "self", "summary": "SUSE Bug 1144919", "url": "https://bugzilla.suse.com/1144919" }, { "category": "self", "summary": "SUSE Bug 1145665", "url": "https://bugzilla.suse.com/1145665" }, { "category": "self", "summary": "SUSE Bug 1146090", "url": "https://bugzilla.suse.com/1146090" }, { "category": "self", "summary": "SUSE Bug 1146091", "url": "https://bugzilla.suse.com/1146091" }, { "category": "self", "summary": "SUSE Bug 1146093", "url": "https://bugzilla.suse.com/1146093" }, { "category": "self", "summary": "SUSE Bug 1146094", "url": "https://bugzilla.suse.com/1146094" }, { "category": "self", "summary": "SUSE Bug 1146095", "url": "https://bugzilla.suse.com/1146095" }, { "category": "self", "summary": "SUSE Bug 1146097", "url": "https://bugzilla.suse.com/1146097" }, { "category": "self", "summary": "SUSE Bug 1146099", "url": "https://bugzilla.suse.com/1146099" }, { "category": "self", "summary": "SUSE Bug 1146100", "url": "https://bugzilla.suse.com/1146100" }, { "category": "self", "summary": "SUSE Bug 1149323", "url": "https://bugzilla.suse.com/1149323" }, { "category": "self", "summary": "SUSE Bug 1153423", "url": "https://bugzilla.suse.com/1153423" }, { "category": "self", "summary": "SUSE Bug 1154738", "url": "https://bugzilla.suse.com/1154738" }, { "category": "self", "summary": "SUSE Bug 1447070", "url": "https://bugzilla.suse.com/1447070" }, { "category": "self", "summary": "SUSE Bug 1447409", "url": "https://bugzilla.suse.com/1447409" }, { "category": "self", "summary": "SUSE Bug 744625", "url": "https://bugzilla.suse.com/744625" }, { "category": "self", "summary": "SUSE Bug 744629", "url": "https://bugzilla.suse.com/744629" }, { "category": "self", "summary": "SUSE Bug 845955", "url": "https://bugzilla.suse.com/845955" }, { "category": "self", "summary": "SUSE Bug 865853", "url": "https://bugzilla.suse.com/865853" }, { "category": "self", "summary": "SUSE Bug 905528", "url": "https://bugzilla.suse.com/905528" }, { "category": "self", "summary": "SUSE Bug 917607", "url": "https://bugzilla.suse.com/917607" }, { "category": "self", "summary": "SUSE Bug 935856", "url": "https://bugzilla.suse.com/935856" }, { "category": "self", "summary": "SUSE Bug 937414", "url": "https://bugzilla.suse.com/937414" }, { "category": "self", "summary": "SUSE Bug 947747", "url": "https://bugzilla.suse.com/947747" }, { "category": "self", "summary": "SUSE Bug 948045", "url": "https://bugzilla.suse.com/948045" }, { "category": "self", "summary": "SUSE Bug 948602", "url": "https://bugzilla.suse.com/948602" }, { "category": "self", "summary": "SUSE Bug 955142", "url": "https://bugzilla.suse.com/955142" }, { "category": "self", "summary": "SUSE Bug 957814", "url": "https://bugzilla.suse.com/957814" }, { "category": "self", "summary": "SUSE Bug 957815", "url": "https://bugzilla.suse.com/957815" }, { "category": "self", "summary": "SUSE Bug 961254", "url": "https://bugzilla.suse.com/961254" }, { "category": "self", "summary": "SUSE Bug 962297", "url": "https://bugzilla.suse.com/962297" }, { "category": "self", "summary": "SUSE Bug 966076", "url": "https://bugzilla.suse.com/966076" }, { "category": "self", "summary": "SUSE Bug 966077", "url": "https://bugzilla.suse.com/966077" }, { "category": "self", "summary": "SUSE Bug 985201", "url": "https://bugzilla.suse.com/985201" }, { "category": "self", "summary": "SUSE Bug 986541", "url": "https://bugzilla.suse.com/986541" }, { "category": "self", "summary": "SUSE Bug 991344", "url": "https://bugzilla.suse.com/991344" }, { "category": "self", "summary": "SUSE Bug 998743", "url": "https://bugzilla.suse.com/998743" }, { "category": "self", "summary": "SUSE CVE CVE-2013-2882 page", "url": "https://www.suse.com/security/cve/CVE-2013-2882/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6639 page", "url": "https://www.suse.com/security/cve/CVE-2013-6639/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6640 page", "url": "https://www.suse.com/security/cve/CVE-2013-6640/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6668 page", "url": "https://www.suse.com/security/cve/CVE-2013-6668/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0224 page", "url": "https://www.suse.com/security/cve/CVE-2014-0224/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3193 page", "url": "https://www.suse.com/security/cve/CVE-2015-3193/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3194 page", "url": "https://www.suse.com/security/cve/CVE-2015-3194/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5380 page", "url": "https://www.suse.com/security/cve/CVE-2015-5380/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7384 page", "url": "https://www.suse.com/security/cve/CVE-2015-7384/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2086 page", "url": "https://www.suse.com/security/cve/CVE-2016-2086/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2178 page", "url": "https://www.suse.com/security/cve/CVE-2016-2178/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2183 page", "url": "https://www.suse.com/security/cve/CVE-2016-2183/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2216 page", "url": "https://www.suse.com/security/cve/CVE-2016-2216/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5172 page", "url": "https://www.suse.com/security/cve/CVE-2016-5172/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5325 page", "url": "https://www.suse.com/security/cve/CVE-2016-5325/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6304 page", "url": "https://www.suse.com/security/cve/CVE-2016-6304/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6306 page", "url": "https://www.suse.com/security/cve/CVE-2016-6306/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7052 page", "url": "https://www.suse.com/security/cve/CVE-2016-7052/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7099 page", "url": "https://www.suse.com/security/cve/CVE-2016-7099/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-1000381 page", "url": "https://www.suse.com/security/cve/CVE-2017-1000381/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10686 page", "url": "https://www.suse.com/security/cve/CVE-2017-10686/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-11111 page", "url": "https://www.suse.com/security/cve/CVE-2017-11111/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-11499 page", "url": "https://www.suse.com/security/cve/CVE-2017-11499/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-14228 page", "url": "https://www.suse.com/security/cve/CVE-2017-14228/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-14849 page", "url": "https://www.suse.com/security/cve/CVE-2017-14849/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-14919 page", "url": "https://www.suse.com/security/cve/CVE-2017-14919/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-15896 page", "url": "https://www.suse.com/security/cve/CVE-2017-15896/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-15897 page", "url": "https://www.suse.com/security/cve/CVE-2017-15897/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17810 page", "url": "https://www.suse.com/security/cve/CVE-2017-17810/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17811 page", "url": "https://www.suse.com/security/cve/CVE-2017-17811/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17812 page", "url": "https://www.suse.com/security/cve/CVE-2017-17812/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17813 page", "url": "https://www.suse.com/security/cve/CVE-2017-17813/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17814 page", "url": "https://www.suse.com/security/cve/CVE-2017-17814/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17815 page", "url": "https://www.suse.com/security/cve/CVE-2017-17815/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17816 page", "url": "https://www.suse.com/security/cve/CVE-2017-17816/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17817 page", "url": "https://www.suse.com/security/cve/CVE-2017-17817/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17818 page", "url": "https://www.suse.com/security/cve/CVE-2017-17818/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17819 page", "url": "https://www.suse.com/security/cve/CVE-2017-17819/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17820 page", "url": "https://www.suse.com/security/cve/CVE-2017-17820/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18207 page", "url": "https://www.suse.com/security/cve/CVE-2017-18207/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-3735 page", "url": "https://www.suse.com/security/cve/CVE-2017-3735/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-3736 page", "url": "https://www.suse.com/security/cve/CVE-2017-3736/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-3738 page", "url": "https://www.suse.com/security/cve/CVE-2017-3738/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-0732 page", "url": "https://www.suse.com/security/cve/CVE-2018-0732/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000168 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000168/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12115 page", "url": "https://www.suse.com/security/cve/CVE-2018-12115/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12116 page", "url": "https://www.suse.com/security/cve/CVE-2018-12116/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12121 page", "url": "https://www.suse.com/security/cve/CVE-2018-12121/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12122 page", "url": "https://www.suse.com/security/cve/CVE-2018-12122/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12123 page", "url": "https://www.suse.com/security/cve/CVE-2018-12123/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-20406 page", "url": "https://www.suse.com/security/cve/CVE-2018-20406/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-20852 page", "url": "https://www.suse.com/security/cve/CVE-2018-20852/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7158 page", "url": "https://www.suse.com/security/cve/CVE-2018-7158/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7159 page", "url": "https://www.suse.com/security/cve/CVE-2018-7159/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7160 page", "url": "https://www.suse.com/security/cve/CVE-2018-7160/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7161 page", "url": "https://www.suse.com/security/cve/CVE-2018-7161/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7167 page", "url": "https://www.suse.com/security/cve/CVE-2018-7167/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10160 page", "url": "https://www.suse.com/security/cve/CVE-2019-10160/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11709 page", "url": "https://www.suse.com/security/cve/CVE-2019-11709/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11710 page", "url": "https://www.suse.com/security/cve/CVE-2019-11710/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11711 page", "url": "https://www.suse.com/security/cve/CVE-2019-11711/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11712 page", "url": "https://www.suse.com/security/cve/CVE-2019-11712/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11713 page", "url": "https://www.suse.com/security/cve/CVE-2019-11713/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11714 page", "url": "https://www.suse.com/security/cve/CVE-2019-11714/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11715 page", "url": "https://www.suse.com/security/cve/CVE-2019-11715/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11716 page", "url": "https://www.suse.com/security/cve/CVE-2019-11716/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11717 page", "url": "https://www.suse.com/security/cve/CVE-2019-11717/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11718 page", "url": "https://www.suse.com/security/cve/CVE-2019-11718/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11719 page", "url": "https://www.suse.com/security/cve/CVE-2019-11719/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11720 page", "url": "https://www.suse.com/security/cve/CVE-2019-11720/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11721 page", "url": "https://www.suse.com/security/cve/CVE-2019-11721/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11723 page", "url": "https://www.suse.com/security/cve/CVE-2019-11723/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11724 page", "url": "https://www.suse.com/security/cve/CVE-2019-11724/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11725 page", "url": "https://www.suse.com/security/cve/CVE-2019-11725/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11727 page", "url": "https://www.suse.com/security/cve/CVE-2019-11727/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11728 page", "url": "https://www.suse.com/security/cve/CVE-2019-11728/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11729 page", "url": "https://www.suse.com/security/cve/CVE-2019-11729/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11730 page", "url": "https://www.suse.com/security/cve/CVE-2019-11730/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11733 page", "url": "https://www.suse.com/security/cve/CVE-2019-11733/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11735 page", "url": "https://www.suse.com/security/cve/CVE-2019-11735/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11736 page", "url": "https://www.suse.com/security/cve/CVE-2019-11736/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11738 page", "url": "https://www.suse.com/security/cve/CVE-2019-11738/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11740 page", "url": "https://www.suse.com/security/cve/CVE-2019-11740/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11742 page", "url": "https://www.suse.com/security/cve/CVE-2019-11742/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11743 page", "url": "https://www.suse.com/security/cve/CVE-2019-11743/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11744 page", "url": "https://www.suse.com/security/cve/CVE-2019-11744/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11746 page", "url": "https://www.suse.com/security/cve/CVE-2019-11746/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11747 page", "url": "https://www.suse.com/security/cve/CVE-2019-11747/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11748 page", "url": "https://www.suse.com/security/cve/CVE-2019-11748/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11749 page", "url": "https://www.suse.com/security/cve/CVE-2019-11749/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11750 page", "url": "https://www.suse.com/security/cve/CVE-2019-11750/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11751 page", "url": "https://www.suse.com/security/cve/CVE-2019-11751/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11752 page", "url": "https://www.suse.com/security/cve/CVE-2019-11752/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11753 page", "url": "https://www.suse.com/security/cve/CVE-2019-11753/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11757 page", "url": "https://www.suse.com/security/cve/CVE-2019-11757/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11758 page", "url": "https://www.suse.com/security/cve/CVE-2019-11758/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11759 page", "url": "https://www.suse.com/security/cve/CVE-2019-11759/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11760 page", "url": "https://www.suse.com/security/cve/CVE-2019-11760/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11761 page", "url": "https://www.suse.com/security/cve/CVE-2019-11761/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11762 page", "url": "https://www.suse.com/security/cve/CVE-2019-11762/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11763 page", "url": "https://www.suse.com/security/cve/CVE-2019-11763/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11764 page", "url": "https://www.suse.com/security/cve/CVE-2019-11764/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13173 page", "url": "https://www.suse.com/security/cve/CVE-2019-13173/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15903 page", "url": "https://www.suse.com/security/cve/CVE-2019-15903/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5010 page", "url": "https://www.suse.com/security/cve/CVE-2019-5010/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5737 page", "url": "https://www.suse.com/security/cve/CVE-2019-5737/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9511 page", "url": "https://www.suse.com/security/cve/CVE-2019-9511/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9512 page", "url": "https://www.suse.com/security/cve/CVE-2019-9512/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9513 page", "url": "https://www.suse.com/security/cve/CVE-2019-9513/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9514 page", "url": "https://www.suse.com/security/cve/CVE-2019-9514/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9515 page", "url": "https://www.suse.com/security/cve/CVE-2019-9515/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9516 page", "url": "https://www.suse.com/security/cve/CVE-2019-9516/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9517 page", "url": "https://www.suse.com/security/cve/CVE-2019-9517/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9518 page", "url": "https://www.suse.com/security/cve/CVE-2019-9518/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9636 page", "url": "https://www.suse.com/security/cve/CVE-2019-9636/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9811 page", "url": "https://www.suse.com/security/cve/CVE-2019-9811/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9812 page", "url": "https://www.suse.com/security/cve/CVE-2019-9812/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9947 page", "url": "https://www.suse.com/security/cve/CVE-2019-9947/" } ], "title": "Security update for Mozilla Firefox", "tracking": { "current_release_date": "2020-01-17T17:07:38Z", "generator": { "date": "2020-01-17T17:07:38Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:14246-1", "initial_release_date": "2020-01-17T17:07:38Z", "revision_history": [ { "date": "2020-01-17T17:07:38Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "MozillaFirefox-68.2.0-78.51.4.x86_64", "product": { "name": "MozillaFirefox-68.2.0-78.51.4.x86_64", "product_id": "MozillaFirefox-68.2.0-78.51.4.x86_64" } }, { "category": "product_version", "name": "MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "product": { "name": "MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "product_id": "MozillaFirefox-branding-SLED-68-21.9.8.x86_64" } }, { "category": "product_version", "name": "MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "product": { "name": "MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "product_id": "MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64" } }, { "category": "product_version", "name": "MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "product": { "name": "MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "product_id": "MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64" } }, { "category": "product_version", "name": "firefox-atk-lang-2.26.1-2.8.4.x86_64", "product": { "name": "firefox-atk-lang-2.26.1-2.8.4.x86_64", "product_id": "firefox-atk-lang-2.26.1-2.8.4.x86_64" } }, { "category": "product_version", "name": "firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "product": { "name": "firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "product_id": "firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64" } }, { "category": "product_version", "name": "firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "product": { "name": "firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "product_id": "firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64" } }, { "category": "product_version", "name": "firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "product": { "name": "firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "product_id": "firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64" } }, { "category": "product_version", "name": "firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "product": { "name": "firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "product_id": "firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64" } }, { "category": "product_version", "name": "firefox-glib2-lang-2.54.3-2.14.7.x86_64", "product": { "name": "firefox-glib2-lang-2.54.3-2.14.7.x86_64", "product_id": "firefox-glib2-lang-2.54.3-2.14.7.x86_64" } }, { "category": "product_version", "name": "firefox-glib2-tools-2.54.3-2.14.7.x86_64", "product": { "name": "firefox-glib2-tools-2.54.3-2.14.7.x86_64", "product_id": "firefox-glib2-tools-2.54.3-2.14.7.x86_64" } }, { "category": "product_version", "name": "firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "product": { "name": "firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "product_id": "firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64" } }, { "category": "product_version", "name": "firefox-gtk3-data-3.10.9-2.15.3.x86_64", "product": { "name": "firefox-gtk3-data-3.10.9-2.15.3.x86_64", "product_id": "firefox-gtk3-data-3.10.9-2.15.3.x86_64" } }, { "category": "product_version", "name": "firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "product": { "name": "firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "product_id": "firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64" } }, { "category": "product_version", "name": "firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "product": { "name": "firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "product_id": "firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64" } }, { "category": "product_version", "name": "firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "product": { "name": "firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "product_id": "firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64" } }, { "category": "product_version", "name": "firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "product": { "name": "firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "product_id": "firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64" } }, { "category": "product_version", "name": "firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "product": { "name": "firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "product_id": "firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64" } }, { "category": "product_version", "name": "firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "product": { "name": "firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "product_id": "firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64" } }, { "category": "product_version", "name": "firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "product": { "name": "firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "product_id": "firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64" } }, { "category": "product_version", "name": "firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "product": { "name": "firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "product_id": "firefox-gtk3-lang-3.10.9-2.15.3.x86_64" } }, { "category": "product_version", "name": "firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "product": { "name": "firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "product_id": "firefox-gtk3-tools-3.10.9-2.15.3.x86_64" } }, { "category": "product_version", "name": "firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "product": { "name": "firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "product_id": "firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64" } }, { "category": "product_version", "name": "firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "product": { "name": "firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "product_id": "firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64" } }, { "category": "product_version", "name": "firefox-libcairo2-1.15.10-2.13.4.x86_64", "product": { "name": "firefox-libcairo2-1.15.10-2.13.4.x86_64", "product_id": "firefox-libcairo2-1.15.10-2.13.4.x86_64" } }, { "category": "product_version", "name": "firefox-libffi4-5.3.1+r233831-14.1.x86_64", "product": { "name": "firefox-libffi4-5.3.1+r233831-14.1.x86_64", "product_id": "firefox-libffi4-5.3.1+r233831-14.1.x86_64" } }, { "category": "product_version", "name": "firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "product": { "name": "firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "product_id": "firefox-libffi7-3.2.1.git259-2.3.3.x86_64" } }, { "category": "product_version", "name": "firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "product": { "name": "firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "product_id": "firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64" } }, { "category": "product_version", "name": "firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "product": { "name": "firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "product_id": "firefox-libgtk-3-0-3.10.9-2.15.3.x86_64" } }, { "category": "product_version", "name": "firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "product": { "name": "firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "product_id": "firefox-libharfbuzz0-1.7.5-2.7.4.x86_64" } }, { "category": "product_version", "name": "firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "product": { "name": "firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "product_id": "firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64" } }, { "category": "product_version", "name": "libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "product": { "name": "libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "product_id": "libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64" } }, { "category": "product_version", "name": "libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "product": { "name": "libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "product_id": "libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64" } }, { "category": "product_version", "name": "libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "product": { "name": "libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "product_id": "libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64" } }, { "category": "product_version", "name": "libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "product": { "name": "libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "product_id": "libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64" } }, { "category": "product_version", "name": "libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "product": { "name": "libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "product_id": "libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64" } }, { "category": "product_version", "name": "libfreebl3-3.45-38.9.3.x86_64", "product": { "name": "libfreebl3-3.45-38.9.3.x86_64", "product_id": "libfreebl3-3.45-38.9.3.x86_64" } }, { "category": "product_version", "name": "libfreebl3-32bit-3.45-38.9.3.x86_64", "product": { "name": "libfreebl3-32bit-3.45-38.9.3.x86_64", "product_id": "libfreebl3-32bit-3.45-38.9.3.x86_64" } }, { "category": "product_version", "name": "libsoftokn3-3.45-38.9.3.x86_64", "product": { "name": "libsoftokn3-3.45-38.9.3.x86_64", "product_id": "libsoftokn3-3.45-38.9.3.x86_64" } }, { "category": "product_version", "name": "libsoftokn3-32bit-3.45-38.9.3.x86_64", "product": { "name": "libsoftokn3-32bit-3.45-38.9.3.x86_64", "product_id": "libsoftokn3-32bit-3.45-38.9.3.x86_64" } }, { "category": "product_version", "name": "mozilla-nspr-4.21-29.6.1.x86_64", "product": { "name": "mozilla-nspr-4.21-29.6.1.x86_64", "product_id": "mozilla-nspr-4.21-29.6.1.x86_64" } }, { "category": "product_version", "name": "mozilla-nspr-32bit-4.21-29.6.1.x86_64", "product": { "name": "mozilla-nspr-32bit-4.21-29.6.1.x86_64", "product_id": "mozilla-nspr-32bit-4.21-29.6.1.x86_64" } }, { "category": "product_version", "name": "mozilla-nspr-devel-4.21-29.6.1.x86_64", "product": { "name": "mozilla-nspr-devel-4.21-29.6.1.x86_64", "product_id": "mozilla-nspr-devel-4.21-29.6.1.x86_64" } }, { "category": "product_version", "name": "mozilla-nss-3.45-38.9.3.x86_64", "product": { "name": "mozilla-nss-3.45-38.9.3.x86_64", "product_id": "mozilla-nss-3.45-38.9.3.x86_64" } }, { "category": "product_version", "name": "mozilla-nss-32bit-3.45-38.9.3.x86_64", "product": { "name": "mozilla-nss-32bit-3.45-38.9.3.x86_64", "product_id": "mozilla-nss-32bit-3.45-38.9.3.x86_64" } }, { "category": "product_version", "name": "mozilla-nss-certs-3.45-38.9.3.x86_64", "product": { "name": "mozilla-nss-certs-3.45-38.9.3.x86_64", "product_id": "mozilla-nss-certs-3.45-38.9.3.x86_64" } }, { "category": "product_version", "name": "mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "product": { "name": "mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "product_id": "mozilla-nss-certs-32bit-3.45-38.9.3.x86_64" } }, { "category": "product_version", "name": "mozilla-nss-devel-3.45-38.9.3.x86_64", "product": { "name": "mozilla-nss-devel-3.45-38.9.3.x86_64", "product_id": "mozilla-nss-devel-3.45-38.9.3.x86_64" } }, { "category": "product_version", "name": "mozilla-nss-tools-3.45-38.9.3.x86_64", "product": { "name": "mozilla-nss-tools-3.45-38.9.3.x86_64", "product_id": "mozilla-nss-tools-3.45-38.9.3.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles:11:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "MozillaFirefox-68.2.0-78.51.4.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64" }, "product_reference": "MozillaFirefox-68.2.0-78.51.4.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "MozillaFirefox-branding-SLED-68-21.9.8.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64" }, "product_reference": "MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64" }, "product_reference": "MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64" }, "product_reference": "MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-atk-lang-2.26.1-2.8.4.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64" }, "product_reference": "firefox-atk-lang-2.26.1-2.8.4.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64" }, "product_reference": "firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64" }, "product_reference": "firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64" }, "product_reference": "firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64" }, "product_reference": "firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-glib2-lang-2.54.3-2.14.7.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64" }, "product_reference": "firefox-glib2-lang-2.54.3-2.14.7.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-glib2-tools-2.54.3-2.14.7.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64" }, "product_reference": "firefox-glib2-tools-2.54.3-2.14.7.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64" }, "product_reference": "firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-gtk3-data-3.10.9-2.15.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64" }, "product_reference": "firefox-gtk3-data-3.10.9-2.15.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64" }, "product_reference": "firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64" }, "product_reference": "firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64" }, "product_reference": "firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64" }, "product_reference": "firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64" }, "product_reference": "firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64" }, "product_reference": "firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64" }, "product_reference": "firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-gtk3-lang-3.10.9-2.15.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64" }, "product_reference": "firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-gtk3-tools-3.10.9-2.15.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64" }, "product_reference": "firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64" }, "product_reference": "firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64" }, "product_reference": "firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-libcairo2-1.15.10-2.13.4.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64" }, "product_reference": "firefox-libcairo2-1.15.10-2.13.4.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-libffi4-5.3.1+r233831-14.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64" }, "product_reference": "firefox-libffi4-5.3.1+r233831-14.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-libffi7-3.2.1.git259-2.3.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64" }, "product_reference": "firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64" }, "product_reference": "firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-libgtk-3-0-3.10.9-2.15.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64" }, "product_reference": "firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-libharfbuzz0-1.7.5-2.7.4.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64" }, "product_reference": "firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64" }, "product_reference": "firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64" }, "product_reference": "libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64" }, "product_reference": "libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64" }, "product_reference": "libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64" }, "product_reference": "libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64" }, "product_reference": "libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libfreebl3-3.45-38.9.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64" }, "product_reference": "libfreebl3-3.45-38.9.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libfreebl3-32bit-3.45-38.9.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64" }, "product_reference": "libfreebl3-32bit-3.45-38.9.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libsoftokn3-3.45-38.9.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64" }, "product_reference": "libsoftokn3-3.45-38.9.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libsoftokn3-32bit-3.45-38.9.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64" }, "product_reference": "libsoftokn3-32bit-3.45-38.9.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "mozilla-nspr-4.21-29.6.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64" }, "product_reference": "mozilla-nspr-4.21-29.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "mozilla-nspr-32bit-4.21-29.6.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64" }, "product_reference": "mozilla-nspr-32bit-4.21-29.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "mozilla-nspr-devel-4.21-29.6.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64" }, "product_reference": "mozilla-nspr-devel-4.21-29.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "mozilla-nss-3.45-38.9.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64" }, "product_reference": "mozilla-nss-3.45-38.9.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "mozilla-nss-32bit-3.45-38.9.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64" }, "product_reference": "mozilla-nss-32bit-3.45-38.9.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "mozilla-nss-certs-3.45-38.9.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64" }, "product_reference": "mozilla-nss-certs-3.45-38.9.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "mozilla-nss-certs-32bit-3.45-38.9.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64" }, "product_reference": "mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "mozilla-nss-devel-3.45-38.9.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64" }, "product_reference": "mozilla-nss-devel-3.45-38.9.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "mozilla-nss-tools-3.45-38.9.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" }, "product_reference": "mozilla-nss-tools-3.45-38.9.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-2882", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-2882" } ], "notes": [ { "category": "general", "text": "Google V8, as used in Google Chrome before 28.0.1500.95, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that leverage \"type confusion.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-2882", "url": "https://www.suse.com/security/cve/CVE-2013-2882" }, { "category": "external", "summary": "SUSE Bug 833343 for CVE-2013-2882", "url": "https://bugzilla.suse.com/833343" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2013-2882" }, { "cve": "CVE-2013-6639", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6639" } ], "notes": [ { "category": "general", "text": "The DehoistArrayIndex function in hydrogen-dehoist.cc (aka hydrogen.cc) in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via JavaScript code that sets the value of an array element with a crafted index.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6639", "url": "https://www.suse.com/security/cve/CVE-2013-6639" }, { "category": "external", "summary": "SUSE Bug 854473 for CVE-2013-6639", "url": "https://bugzilla.suse.com/854473" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2013-6639" }, { "cve": "CVE-2013-6640", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6640" } ], "notes": [ { "category": "general", "text": "The DehoistArrayIndex function in hydrogen-dehoist.cc (aka hydrogen.cc) in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allows remote attackers to cause a denial of service (out-of-bounds read) via JavaScript code that sets a variable to the value of an array element with a crafted index.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6640", "url": "https://www.suse.com/security/cve/CVE-2013-6640" }, { "category": "external", "summary": "SUSE Bug 854473 for CVE-2013-6640", "url": "https://bugzilla.suse.com/854473" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2013-6640" }, { "cve": "CVE-2013-6668", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6668" } ], "notes": [ { "category": "general", "text": "Multiple unspecified vulnerabilities in Google V8 before 3.24.35.10, as used in Google Chrome before 33.0.1750.146, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6668", "url": "https://www.suse.com/security/cve/CVE-2013-6668" }, { "category": "external", "summary": "SUSE Bug 866959 for CVE-2013-6668", "url": "https://bugzilla.suse.com/866959" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2013-6668" }, { "cve": "CVE-2014-0224", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0224" } ], "notes": [ { "category": "general", "text": "OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the \"CCS Injection\" vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0224", "url": "https://www.suse.com/security/cve/CVE-2014-0224" }, { "category": "external", "summary": "SUSE Bug 1146657 for CVE-2014-0224", "url": "https://bugzilla.suse.com/1146657" }, { "category": "external", "summary": "SUSE Bug 880891 for CVE-2014-0224", "url": "https://bugzilla.suse.com/880891" }, { "category": "external", "summary": "SUSE Bug 881743 for CVE-2014-0224", "url": "https://bugzilla.suse.com/881743" }, { "category": "external", "summary": "SUSE Bug 883126 for CVE-2014-0224", "url": "https://bugzilla.suse.com/883126" }, { "category": "external", "summary": "SUSE Bug 885777 for CVE-2014-0224", "url": "https://bugzilla.suse.com/885777" }, { "category": "external", "summary": "SUSE Bug 892403 for CVE-2014-0224", "url": "https://bugzilla.suse.com/892403" }, { "category": "external", "summary": "SUSE Bug 901237 for CVE-2014-0224", "url": "https://bugzilla.suse.com/901237" }, { "category": "external", "summary": "SUSE Bug 903703 for CVE-2014-0224", "url": "https://bugzilla.suse.com/903703" }, { "category": "external", "summary": "SUSE Bug 905018 for CVE-2014-0224", "url": "https://bugzilla.suse.com/905018" }, { "category": "external", "summary": "SUSE Bug 905106 for CVE-2014-0224", "url": "https://bugzilla.suse.com/905106" }, { "category": "external", "summary": "SUSE Bug 914447 for CVE-2014-0224", "url": "https://bugzilla.suse.com/914447" }, { "category": "external", "summary": "SUSE Bug 915913 for CVE-2014-0224", "url": "https://bugzilla.suse.com/915913" }, { "category": "external", "summary": "SUSE Bug 916239 for CVE-2014-0224", "url": "https://bugzilla.suse.com/916239" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2014-0224" }, { "cve": "CVE-2015-3193", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3193" } ], "notes": [ { "category": "general", "text": "The Montgomery squaring implementation in crypto/bn/asm/x86_64-mont5.pl in OpenSSL 1.0.2 before 1.0.2e on the x86_64 platform, as used by the BN_mod_exp function, mishandles carry propagation and produces incorrect output, which makes it easier for remote attackers to obtain sensitive private-key information via an attack against use of a (1) Diffie-Hellman (DH) or (2) Diffie-Hellman Ephemeral (DHE) ciphersuite.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3193", "url": "https://www.suse.com/security/cve/CVE-2015-3193" }, { "category": "external", "summary": "SUSE Bug 1022086 for CVE-2015-3193", "url": "https://bugzilla.suse.com/1022086" }, { "category": "external", "summary": "SUSE Bug 1066242 for CVE-2015-3193", "url": "https://bugzilla.suse.com/1066242" }, { "category": "external", "summary": "SUSE Bug 1071906 for CVE-2015-3193", "url": "https://bugzilla.suse.com/1071906" }, { "category": "external", "summary": "SUSE Bug 957814 for CVE-2015-3193", "url": "https://bugzilla.suse.com/957814" }, { "category": "external", "summary": "SUSE Bug 960151 for CVE-2015-3193", "url": "https://bugzilla.suse.com/960151" }, { "category": "external", "summary": "SUSE Bug 990370 for CVE-2015-3193", "url": "https://bugzilla.suse.com/990370" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2015-3193" }, { "cve": "CVE-2015-3194", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3194" } ], "notes": [ { "category": "general", "text": "crypto/rsa/rsa_ameth.c in OpenSSL 1.0.1 before 1.0.1q and 1.0.2 before 1.0.2e allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an RSA PSS ASN.1 signature that lacks a mask generation function parameter.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3194", "url": "https://www.suse.com/security/cve/CVE-2015-3194" }, { "category": "external", "summary": "SUSE Bug 957812 for CVE-2015-3194", "url": "https://bugzilla.suse.com/957812" }, { "category": "external", "summary": "SUSE Bug 957815 for CVE-2015-3194", "url": "https://bugzilla.suse.com/957815" }, { "category": "external", "summary": "SUSE Bug 958768 for CVE-2015-3194", "url": "https://bugzilla.suse.com/958768" }, { "category": "external", "summary": "SUSE Bug 976341 for CVE-2015-3194", "url": "https://bugzilla.suse.com/976341" }, { "category": "external", "summary": "SUSE Bug 990370 for CVE-2015-3194", "url": "https://bugzilla.suse.com/990370" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2015-3194" }, { "cve": "CVE-2015-5380", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5380" } ], "notes": [ { "category": "general", "text": "The Utf8DecoderBase::WriteUtf16Slow function in unicode-decoder.cc in Google V8, as used in Node.js before 0.12.6, io.js before 1.8.3 and 2.x before 2.3.3, and other products, does not verify that there is memory available for a UTF-16 surrogate pair, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted byte sequence.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5380", "url": "https://www.suse.com/security/cve/CVE-2015-5380" }, { "category": "external", "summary": "SUSE Bug 937414 for CVE-2015-5380", "url": "https://bugzilla.suse.com/937414" }, { "category": "external", "summary": "SUSE Bug 937416 for CVE-2015-5380", "url": "https://bugzilla.suse.com/937416" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2015-5380" }, { "cve": "CVE-2015-7384", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7384" } ], "notes": [ { "category": "general", "text": "Node.js 4.0.0, 4.1.0, and 4.1.1 allows remote attackers to cause a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7384", "url": "https://www.suse.com/security/cve/CVE-2015-7384" }, { "category": "external", "summary": "SUSE Bug 948602 for CVE-2015-7384", "url": "https://bugzilla.suse.com/948602" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2015-7384" }, { "cve": "CVE-2016-2086", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2086" } ], "notes": [ { "category": "general", "text": "Node.js 0.10.x before 0.10.42, 0.12.x before 0.12.10, 4.x before 4.3.0, and 5.x before 5.6.0 allow remote attackers to conduct HTTP request smuggling attacks via a crafted Content-Length HTTP header.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2086", "url": "https://www.suse.com/security/cve/CVE-2016-2086" }, { "category": "external", "summary": "SUSE Bug 966076 for CVE-2016-2086", "url": "https://bugzilla.suse.com/966076" }, { "category": "external", "summary": "SUSE Bug 966077 for CVE-2016-2086", "url": "https://bugzilla.suse.com/966077" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2016-2086" }, { "cve": "CVE-2016-2178", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2178" } ], "notes": [ { "category": "general", "text": "The dsa_sign_setup function in crypto/dsa/dsa_ossl.c in OpenSSL through 1.0.2h does not properly ensure the use of constant-time operations, which makes it easier for local users to discover a DSA private key via a timing side-channel attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2178", "url": "https://www.suse.com/security/cve/CVE-2016-2178" }, { "category": "external", "summary": "SUSE Bug 1004104 for CVE-2016-2178", "url": "https://bugzilla.suse.com/1004104" }, { "category": "external", "summary": "SUSE Bug 983249 for CVE-2016-2178", "url": "https://bugzilla.suse.com/983249" }, { "category": "external", "summary": "SUSE Bug 983519 for CVE-2016-2178", "url": "https://bugzilla.suse.com/983519" }, { "category": "external", "summary": "SUSE Bug 999665 for CVE-2016-2178", "url": "https://bugzilla.suse.com/999665" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "low" } ], "title": "CVE-2016-2178" }, { "cve": "CVE-2016-2183", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2183" } ], "notes": [ { "category": "general", "text": "The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a \"Sweet32\" attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2183", "url": "https://www.suse.com/security/cve/CVE-2016-2183" }, { "category": "external", "summary": "SUSE Bug 1001912 for CVE-2016-2183", "url": "https://bugzilla.suse.com/1001912" }, { "category": "external", "summary": "SUSE Bug 1024218 for CVE-2016-2183", "url": "https://bugzilla.suse.com/1024218" }, { "category": "external", "summary": "SUSE Bug 1027038 for CVE-2016-2183", "url": "https://bugzilla.suse.com/1027038" }, { "category": "external", "summary": "SUSE Bug 1034689 for CVE-2016-2183", "url": "https://bugzilla.suse.com/1034689" }, { "category": "external", "summary": "SUSE Bug 1056614 for CVE-2016-2183", "url": "https://bugzilla.suse.com/1056614" }, { "category": "external", "summary": "SUSE Bug 1171693 for CVE-2016-2183", "url": "https://bugzilla.suse.com/1171693" }, { "category": "external", "summary": "SUSE Bug 994844 for CVE-2016-2183", "url": "https://bugzilla.suse.com/994844" }, { "category": "external", "summary": "SUSE Bug 995359 for CVE-2016-2183", "url": "https://bugzilla.suse.com/995359" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2016-2183" }, { "cve": "CVE-2016-2216", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2216" } ], "notes": [ { "category": "general", "text": "The HTTP header parsing code in Node.js 0.10.x before 0.10.42, 0.11.6 through 0.11.16, 0.12.x before 0.12.10, 4.x before 4.3.0, and 5.x before 5.6.0 allows remote attackers to bypass an HTTP response-splitting protection mechanism via UTF-8 encoded Unicode characters in the HTTP header, as demonstrated by %c4%8d%c4%8a.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2216", "url": "https://www.suse.com/security/cve/CVE-2016-2216" }, { "category": "external", "summary": "SUSE Bug 966076 for CVE-2016-2216", "url": "https://bugzilla.suse.com/966076" }, { "category": "external", "summary": "SUSE Bug 966077 for CVE-2016-2216", "url": "https://bugzilla.suse.com/966077" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2016-2216" }, { "cve": "CVE-2016-5172", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5172" } ], "notes": [ { "category": "general", "text": "The parser in Google V8, as used in Google Chrome before 53.0.2785.113, mishandles scopes, which allows remote attackers to obtain sensitive information from arbitrary memory locations via crafted JavaScript code.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5172", "url": "https://www.suse.com/security/cve/CVE-2016-5172" }, { "category": "external", "summary": "SUSE Bug 998743 for CVE-2016-5172", "url": "https://bugzilla.suse.com/998743" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2016-5172" }, { "cve": "CVE-2016-5325", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5325" } ], "notes": [ { "category": "general", "text": "CRLF injection vulnerability in the ServerResponse#writeHead function in Node.js 0.10.x before 0.10.47, 0.12.x before 0.12.16, 4.x before 4.6.0, and 6.x before 6.7.0 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via the reason argument.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5325", "url": "https://www.suse.com/security/cve/CVE-2016-5325" }, { "category": "external", "summary": "SUSE Bug 985201 for CVE-2016-5325", "url": "https://bugzilla.suse.com/985201" }, { "category": "external", "summary": "SUSE Bug 985202 for CVE-2016-5325", "url": "https://bugzilla.suse.com/985202" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "low" } ], "title": "CVE-2016-5325" }, { "cve": "CVE-2016-6304", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6304" } ], "notes": [ { "category": "general", "text": "Multiple memory leaks in t1_lib.c in OpenSSL before 1.0.1u, 1.0.2 before 1.0.2i, and 1.1.0 before 1.1.0a allow remote attackers to cause a denial of service (memory consumption) via large OCSP Status Request extensions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6304", "url": "https://www.suse.com/security/cve/CVE-2016-6304" }, { "category": "external", "summary": "SUSE Bug 1001706 for CVE-2016-6304", "url": "https://bugzilla.suse.com/1001706" }, { "category": "external", "summary": "SUSE Bug 1003811 for CVE-2016-6304", "url": "https://bugzilla.suse.com/1003811" }, { "category": "external", "summary": "SUSE Bug 1004104 for CVE-2016-6304", "url": "https://bugzilla.suse.com/1004104" }, { "category": "external", "summary": "SUSE Bug 1005579 for CVE-2016-6304", "url": "https://bugzilla.suse.com/1005579" }, { "category": "external", "summary": "SUSE Bug 1021375 for CVE-2016-6304", "url": "https://bugzilla.suse.com/1021375" }, { "category": "external", "summary": "SUSE Bug 999665 for CVE-2016-6304", "url": "https://bugzilla.suse.com/999665" }, { "category": "external", "summary": "SUSE Bug 999666 for CVE-2016-6304", "url": "https://bugzilla.suse.com/999666" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2016-6304" }, { "cve": "CVE-2016-6306", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6306" } ], "notes": [ { "category": "general", "text": "The certificate parser in OpenSSL before 1.0.1u and 1.0.2 before 1.0.2i might allow remote attackers to cause a denial of service (out-of-bounds read) via crafted certificate operations, related to s3_clnt.c and s3_srvr.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6306", "url": "https://www.suse.com/security/cve/CVE-2016-6306" }, { "category": "external", "summary": "SUSE Bug 1004104 for CVE-2016-6306", "url": "https://bugzilla.suse.com/1004104" }, { "category": "external", "summary": "SUSE Bug 999665 for CVE-2016-6306", "url": "https://bugzilla.suse.com/999665" }, { "category": "external", "summary": "SUSE Bug 999668 for CVE-2016-6306", "url": "https://bugzilla.suse.com/999668" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "low" } ], "title": "CVE-2016-6306" }, { "cve": "CVE-2016-7052", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7052" } ], "notes": [ { "category": "general", "text": "crypto/x509/x509_vfy.c in OpenSSL 1.0.2i allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) by triggering a CRL operation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7052", "url": "https://www.suse.com/security/cve/CVE-2016-7052" }, { "category": "external", "summary": "SUSE Bug 1001148 for CVE-2016-7052", "url": "https://bugzilla.suse.com/1001148" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2016-7052" }, { "cve": "CVE-2016-7099", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7099" } ], "notes": [ { "category": "general", "text": "The tls.checkServerIdentity function in Node.js 0.10.x before 0.10.47, 0.12.x before 0.12.16, 4.x before 4.6.0, and 6.x before 6.7.0 does not properly handle wildcards in name fields of X.509 certificates, which allows man-in-the-middle attackers to spoof servers via a crafted certificate.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7099", "url": "https://www.suse.com/security/cve/CVE-2016-7099" }, { "category": "external", "summary": "SUSE Bug 1001652 for CVE-2016-7099", "url": "https://bugzilla.suse.com/1001652" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2016-7099" }, { "cve": "CVE-2017-1000381", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-1000381" } ], "notes": [ { "category": "general", "text": "The c-ares function `ares_parse_naptr_reply()`, which is used for parsing NAPTR responses, could be triggered to read memory outside of the given input buffer if the passed in DNS response packet was crafted in a particular way.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-1000381", "url": "https://www.suse.com/security/cve/CVE-2017-1000381" }, { "category": "external", "summary": "SUSE Bug 1044946 for CVE-2017-1000381", "url": "https://bugzilla.suse.com/1044946" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2017-1000381" }, { "cve": "CVE-2017-10686", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10686" } ], "notes": [ { "category": "general", "text": "In Netwide Assembler (NASM) 2.14rc0, there are multiple heap use after free vulnerabilities in the tool nasm. The related heap is allocated in the token() function and freed in the detoken() function (called by pp_getline()) - it is used again at multiple positions later that could cause multiple damages. For example, it causes a corrupted double-linked list in detoken(), a double free or corruption in delete_Token(), and an out-of-bounds write in detoken(). It has a high possibility to lead to a remote code execution attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10686", "url": "https://www.suse.com/security/cve/CVE-2017-10686" }, { "category": "external", "summary": "SUSE Bug 1047936 for CVE-2017-10686", "url": "https://bugzilla.suse.com/1047936" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2017-10686" }, { "cve": "CVE-2017-11111", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-11111" } ], "notes": [ { "category": "general", "text": "In Netwide Assembler (NASM) 2.14rc0, preproc.c allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-11111", "url": "https://www.suse.com/security/cve/CVE-2017-11111" }, { "category": "external", "summary": "SUSE Bug 1047925 for CVE-2017-11111", "url": "https://bugzilla.suse.com/1047925" }, { "category": "external", "summary": "SUSE Bug 1073798 for CVE-2017-11111", "url": "https://bugzilla.suse.com/1073798" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2017-11111" }, { "cve": "CVE-2017-11499", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-11499" } ], "notes": [ { "category": "general", "text": "Node.js v4.0 through v4.8.3, all versions of v5.x, v6.0 through v6.11.0, v7.0 through v7.10.0, and v8.0 through v8.1.3 was susceptible to hash flooding remote DoS attacks as the HashTable seed was constant across a given released version of Node.js. This was a result of building with V8 snapshots enabled by default which caused the initially randomized seed to be overwritten on startup.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-11499", "url": "https://www.suse.com/security/cve/CVE-2017-11499" }, { "category": "external", "summary": "SUSE Bug 1044849 for CVE-2017-11499", "url": "https://bugzilla.suse.com/1044849" }, { "category": "external", "summary": "SUSE Bug 1048299 for CVE-2017-11499", "url": "https://bugzilla.suse.com/1048299" }, { "category": "external", "summary": "SUSE Bug 1051117 for CVE-2017-11499", "url": "https://bugzilla.suse.com/1051117" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2017-11499" }, { "cve": "CVE-2017-14228", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-14228" } ], "notes": [ { "category": "general", "text": "In Netwide Assembler (NASM) 2.14rc0, there is an illegal address access in the function paste_tokens() in preproc.c, aka a NULL pointer dereference. It will lead to remote denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-14228", "url": "https://www.suse.com/security/cve/CVE-2017-14228" }, { "category": "external", "summary": "SUSE Bug 1058013 for CVE-2017-14228", "url": "https://bugzilla.suse.com/1058013" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2017-14228" }, { "cve": "CVE-2017-14849", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-14849" } ], "notes": [ { "category": "general", "text": "Node.js 8.5.0 before 8.6.0 allows remote attackers to access unintended files, because a change to \"..\" handling was incompatible with the pathname validation used by unspecified community modules.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-14849", "url": "https://www.suse.com/security/cve/CVE-2017-14849" }, { "category": "external", "summary": "SUSE Bug 1060820 for CVE-2017-14849", "url": "https://bugzilla.suse.com/1060820" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2017-14849" }, { "cve": "CVE-2017-14919", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-14919" } ], "notes": [ { "category": "general", "text": "Node.js before 4.8.5, 6.x before 6.11.5, and 8.x before 8.8.0 allows remote attackers to cause a denial of service (uncaught exception and crash) by leveraging a change in the zlib module 1.2.9 making 8 an invalid value for the windowBits parameter.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-14919", "url": "https://www.suse.com/security/cve/CVE-2017-14919" }, { "category": "external", "summary": "SUSE Bug 1059050 for CVE-2017-14919", "url": "https://bugzilla.suse.com/1059050" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2017-14919" }, { "cve": "CVE-2017-15896", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-15896" } ], "notes": [ { "category": "general", "text": "Node.js was affected by OpenSSL vulnerability CVE-2017-3737 in regards to the use of SSL_read() due to TLS handshake failure. The result was that an active network attacker could send application data to Node.js using the TLS or HTTP2 modules in a way that bypassed TLS authentication and encryption.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-15896", "url": "https://www.suse.com/security/cve/CVE-2017-15896" }, { "category": "external", "summary": "SUSE Bug 1071905 for CVE-2017-15896", "url": "https://bugzilla.suse.com/1071905" }, { "category": "external", "summary": "SUSE Bug 1072322 for CVE-2017-15896", "url": "https://bugzilla.suse.com/1072322" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2017-15896" }, { "cve": "CVE-2017-15897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-15897" } ], "notes": [ { "category": "general", "text": "Node.js had a bug in versions 8.X and 9.X which caused buffers to not be initialized when the encoding for the fill value did not match the encoding specified. For example, \u0027Buffer.alloc(0x100, \"This is not correctly encoded\", \"hex\");\u0027 The buffer implementation was updated such that the buffer will be initialized to all zeros in these cases.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-15897", "url": "https://www.suse.com/security/cve/CVE-2017-15897" }, { "category": "external", "summary": "SUSE Bug 1072320 for CVE-2017-15897", "url": "https://bugzilla.suse.com/1072320" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2017-15897" }, { "cve": "CVE-2017-17810", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17810" } ], "notes": [ { "category": "general", "text": "In Netwide Assembler (NASM) 2.14rc0, there is a \"SEGV on unknown address\" that will cause a remote denial of service attack, because asm/preproc.c mishandles macro calls that have the wrong number of arguments.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17810", "url": "https://www.suse.com/security/cve/CVE-2017-17810" }, { "category": "external", "summary": "SUSE Bug 1073796 for CVE-2017-17810", "url": "https://bugzilla.suse.com/1073796" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "low" } ], "title": "CVE-2017-17810" }, { "cve": "CVE-2017-17811", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17811" } ], "notes": [ { "category": "general", "text": "In Netwide Assembler (NASM) 2.14rc0, there is a heap-based buffer overflow that will cause a remote denial of service attack, related to a strcpy in paste_tokens in asm/preproc.c, a similar issue to CVE-2017-11111.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17811", "url": "https://www.suse.com/security/cve/CVE-2017-17811" }, { "category": "external", "summary": "SUSE Bug 1073798 for CVE-2017-17811", "url": "https://bugzilla.suse.com/1073798" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "low" } ], "title": "CVE-2017-17811" }, { "cve": "CVE-2017-17812", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17812" } ], "notes": [ { "category": "general", "text": "In Netwide Assembler (NASM) 2.14rc0, there is a heap-based buffer over-read in the function detoken() in asm/preproc.c that will cause a remote denial of service attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17812", "url": "https://www.suse.com/security/cve/CVE-2017-17812" }, { "category": "external", "summary": "SUSE Bug 1073799 for CVE-2017-17812", "url": "https://bugzilla.suse.com/1073799" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "low" } ], "title": "CVE-2017-17812" }, { "cve": "CVE-2017-17813", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17813" } ], "notes": [ { "category": "general", "text": "In Netwide Assembler (NASM) 2.14rc0, there is a use-after-free in the pp_list_one_macro function in asm/preproc.c that will cause a remote denial of service attack, related to mishandling of line-syntax errors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17813", "url": "https://www.suse.com/security/cve/CVE-2017-17813" }, { "category": "external", "summary": "SUSE Bug 1073803 for CVE-2017-17813", "url": "https://bugzilla.suse.com/1073803" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "low" } ], "title": "CVE-2017-17813" }, { "cve": "CVE-2017-17814", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17814" } ], "notes": [ { "category": "general", "text": "In Netwide Assembler (NASM) 2.14rc0, there is a use-after-free in do_directive in asm/preproc.c that will cause a remote denial of service attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17814", "url": "https://www.suse.com/security/cve/CVE-2017-17814" }, { "category": "external", "summary": "SUSE Bug 1073808 for CVE-2017-17814", "url": "https://bugzilla.suse.com/1073808" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "low" } ], "title": "CVE-2017-17814" }, { "cve": "CVE-2017-17815", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17815" } ], "notes": [ { "category": "general", "text": "In Netwide Assembler (NASM) 2.14rc0, there is an illegal address access in is_mmacro() in asm/preproc.c that will cause a remote denial of service attack, because of a missing check for the relationship between minimum and maximum parameter counts.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17815", "url": "https://www.suse.com/security/cve/CVE-2017-17815" }, { "category": "external", "summary": "SUSE Bug 1073818 for CVE-2017-17815", "url": "https://bugzilla.suse.com/1073818" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "low" } ], "title": "CVE-2017-17815" }, { "cve": "CVE-2017-17816", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17816" } ], "notes": [ { "category": "general", "text": "In Netwide Assembler (NASM) 2.14rc0, there is a use-after-free in pp_getline in asm/preproc.c that will cause a remote denial of service attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17816", "url": "https://www.suse.com/security/cve/CVE-2017-17816" }, { "category": "external", "summary": "SUSE Bug 1073823 for CVE-2017-17816", "url": "https://bugzilla.suse.com/1073823" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "low" } ], "title": "CVE-2017-17816" }, { "cve": "CVE-2017-17817", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17817" } ], "notes": [ { "category": "general", "text": "In Netwide Assembler (NASM) 2.14rc0, there is a use-after-free in pp_verror in asm/preproc.c that will cause a remote denial of service attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17817", "url": "https://www.suse.com/security/cve/CVE-2017-17817" }, { "category": "external", "summary": "SUSE Bug 1073829 for CVE-2017-17817", "url": "https://bugzilla.suse.com/1073829" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "low" } ], "title": "CVE-2017-17817" }, { "cve": "CVE-2017-17818", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17818" } ], "notes": [ { "category": "general", "text": "In Netwide Assembler (NASM) 2.14rc0, there is a heap-based buffer over-read that will cause a remote denial of service attack, related to a while loop in paste_tokens in asm/preproc.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17818", "url": "https://www.suse.com/security/cve/CVE-2017-17818" }, { "category": "external", "summary": "SUSE Bug 1073830 for CVE-2017-17818", "url": "https://bugzilla.suse.com/1073830" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "low" } ], "title": "CVE-2017-17818" }, { "cve": "CVE-2017-17819", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17819" } ], "notes": [ { "category": "general", "text": "In Netwide Assembler (NASM) 2.14rc0, there is an illegal address access in the function find_cc() in asm/preproc.c that will cause a remote denial of service attack, because pointers associated with skip_white_ calls are not validated.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17819", "url": "https://www.suse.com/security/cve/CVE-2017-17819" }, { "category": "external", "summary": "SUSE Bug 1073832 for CVE-2017-17819", "url": "https://bugzilla.suse.com/1073832" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "low" } ], "title": "CVE-2017-17819" }, { "cve": "CVE-2017-17820", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17820" } ], "notes": [ { "category": "general", "text": "In Netwide Assembler (NASM) 2.14rc0, there is a use-after-free in pp_list_one_macro in asm/preproc.c that will lead to a remote denial of service attack, related to mishandling of operand-type errors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17820", "url": "https://www.suse.com/security/cve/CVE-2017-17820" }, { "category": "external", "summary": "SUSE Bug 1073846 for CVE-2017-17820", "url": "https://bugzilla.suse.com/1073846" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "low" } ], "title": "CVE-2017-17820" }, { "cve": "CVE-2017-18207", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18207" } ], "notes": [ { "category": "general", "text": "** DISPUTED ** The Wave_read._read_fmt_chunk function in Lib/wave.py in Python through 3.6.4 does not ensure a nonzero channel value, which allows attackers to cause a denial of service (divide-by-zero and exception) via a crafted wav format audio file. NOTE: the vendor disputes this issue because Python applications \"need to be prepared to handle a wide variety of exceptions.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18207", "url": "https://www.suse.com/security/cve/CVE-2017-18207" }, { "category": "external", "summary": "SUSE Bug 1083507 for CVE-2017-18207", "url": "https://bugzilla.suse.com/1083507" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2017-18207" }, { "cve": "CVE-2017-3735", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-3735" } ], "notes": [ { "category": "general", "text": "While parsing an IPAddressFamily extension in an X.509 certificate, it is possible to do a one-byte overread. This would result in an incorrect text display of the certificate. This bug has been present since 2006 and is present in all versions of OpenSSL before 1.0.2m and 1.1.0g.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-3735", "url": "https://www.suse.com/security/cve/CVE-2017-3735" }, { "category": "external", "summary": "SUSE Bug 1056058 for CVE-2017-3735", "url": "https://bugzilla.suse.com/1056058" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2017-3735" }, { "cve": "CVE-2017-3736", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-3736" } ], "notes": [ { "category": "general", "text": "There is a carry propagating bug in the x86_64 Montgomery squaring procedure in OpenSSL before 1.0.2m and 1.1.0 before 1.1.0g. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be very significant and likely only accessible to a limited number of attackers. An attacker would additionally need online access to an unpatched system using the target private key in a scenario with persistent DH parameters and a private key that is shared between multiple clients. This only affects processors that support the BMI1, BMI2 and ADX extensions like Intel Broadwell (5th generation) and later or AMD Ryzen.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-3736", "url": "https://www.suse.com/security/cve/CVE-2017-3736" }, { "category": "external", "summary": "SUSE Bug 1066242 for CVE-2017-3736", "url": "https://bugzilla.suse.com/1066242" }, { "category": "external", "summary": "SUSE Bug 1071906 for CVE-2017-3736", "url": "https://bugzilla.suse.com/1071906" }, { "category": "external", "summary": "SUSE Bug 1076369 for CVE-2017-3736", "url": "https://bugzilla.suse.com/1076369" }, { "category": "external", "summary": "SUSE Bug 957814 for CVE-2017-3736", "url": "https://bugzilla.suse.com/957814" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2017-3736" }, { "cve": "CVE-2017-3738", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-3738" } ], "notes": [ { "category": "general", "text": "There is an overflow bug in the AVX2 Montgomery multiplication procedure used in exponentiation with 1024-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH1024 are considered just feasible, because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be significant. However, for an attack on TLS to be meaningful, the server would have to share the DH1024 private key among multiple clients, which is no longer an option since CVE-2016-0701. This only affects processors that support the AVX2 but not ADX extensions like Intel Haswell (4th generation). Note: The impact from this issue is similar to CVE-2017-3736, CVE-2017-3732 and CVE-2015-3193. OpenSSL version 1.0.2-1.0.2m and 1.1.0-1.1.0g are affected. Fixed in OpenSSL 1.0.2n. Due to the low severity of this issue we are not issuing a new release of OpenSSL 1.1.0 at this time. The fix will be included in OpenSSL 1.1.0h when it becomes available. The fix is also available in commit e502cc86d in the OpenSSL git repository.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-3738", "url": "https://www.suse.com/security/cve/CVE-2017-3738" }, { "category": "external", "summary": "SUSE Bug 1071906 for CVE-2017-3738", "url": "https://bugzilla.suse.com/1071906" }, { "category": "external", "summary": "SUSE Bug 1097757 for CVE-2017-3738", "url": "https://bugzilla.suse.com/1097757" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "low" } ], "title": "CVE-2017-3738" }, { "cve": "CVE-2018-0732", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-0732" } ], "notes": [ { "category": "general", "text": "During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-0732", "url": "https://www.suse.com/security/cve/CVE-2018-0732" }, { "category": "external", "summary": "SUSE Bug 1077628 for CVE-2018-0732", "url": "https://bugzilla.suse.com/1077628" }, { "category": "external", "summary": "SUSE Bug 1097158 for CVE-2018-0732", "url": "https://bugzilla.suse.com/1097158" }, { "category": "external", "summary": "SUSE Bug 1099502 for CVE-2018-0732", "url": "https://bugzilla.suse.com/1099502" }, { "category": "external", "summary": "SUSE Bug 1106692 for CVE-2018-0732", "url": "https://bugzilla.suse.com/1106692" }, { "category": "external", "summary": "SUSE Bug 1108542 for CVE-2018-0732", "url": "https://bugzilla.suse.com/1108542" }, { "category": "external", "summary": "SUSE Bug 1110163 for CVE-2018-0732", "url": "https://bugzilla.suse.com/1110163" }, { "category": "external", "summary": "SUSE Bug 1112097 for CVE-2018-0732", "url": "https://bugzilla.suse.com/1112097" }, { "category": "external", "summary": "SUSE Bug 1122198 for CVE-2018-0732", "url": "https://bugzilla.suse.com/1122198" }, { "category": "external", "summary": "SUSE Bug 1148697 for CVE-2018-0732", "url": "https://bugzilla.suse.com/1148697" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2018-0732" }, { "cve": "CVE-2018-1000168", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000168" } ], "notes": [ { "category": "general", "text": "nghttp2 version \u003e= 1.10.0 and nghttp2 \u003c= v1.31.0 contains an Improper Input Validation CWE-20 vulnerability in ALTSVC frame handling that can result in segmentation fault leading to denial of service. This attack appears to be exploitable via network client. This vulnerability appears to have been fixed in \u003e= 1.31.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000168", "url": "https://www.suse.com/security/cve/CVE-2018-1000168" }, { "category": "external", "summary": "SUSE Bug 1088639 for CVE-2018-1000168", "url": "https://bugzilla.suse.com/1088639" }, { "category": "external", "summary": "SUSE Bug 1097401 for CVE-2018-1000168", "url": "https://bugzilla.suse.com/1097401" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2018-1000168" }, { "cve": "CVE-2018-12115", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12115" } ], "notes": [ { "category": "general", "text": "In all versions of Node.js prior to 6.14.4, 8.11.4 and 10.9.0 when used with UCS-2 encoding (recognized by Node.js under the names `\u0027ucs2\u0027`, `\u0027ucs-2\u0027`, `\u0027utf16le\u0027` and `\u0027utf-16le\u0027`), `Buffer#write()` can be abused to write outside of the bounds of a single `Buffer`. Writes that start from the second-to-last position of a buffer cause a miscalculation of the maximum length of the input bytes to be written.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12115", "url": "https://www.suse.com/security/cve/CVE-2018-12115" }, { "category": "external", "summary": "SUSE Bug 1105019 for CVE-2018-12115", "url": "https://bugzilla.suse.com/1105019" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2018-12115" }, { "cve": "CVE-2018-12116", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12116" } ], "notes": [ { "category": "general", "text": "Node.js: All versions prior to Node.js 6.15.0 and 8.14.0: HTTP request splitting: If Node.js can be convinced to use unsanitized user-provided Unicode data for the `path` option of an HTTP request, then data can be provided which will trigger a second, unexpected, and user-defined HTTP request to made to the same server.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12116", "url": "https://www.suse.com/security/cve/CVE-2018-12116" }, { "category": "external", "summary": "SUSE Bug 1117630 for CVE-2018-12116", "url": "https://bugzilla.suse.com/1117630" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2018-12116" }, { "cve": "CVE-2018-12121", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12121" } ], "notes": [ { "category": "general", "text": "Node.js: All versions prior to Node.js 6.15.0, 8.14.0, 10.14.0 and 11.3.0: Denial of Service with large HTTP headers: By using a combination of many requests with maximum sized headers (almost 80 KB per connection), and carefully timed completion of the headers, it is possible to cause the HTTP server to abort from heap allocation failure. Attack potential is mitigated by the use of a load balancer or other proxy layer.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12121", "url": "https://www.suse.com/security/cve/CVE-2018-12121" }, { "category": "external", "summary": "SUSE Bug 1117626 for CVE-2018-12121", "url": "https://bugzilla.suse.com/1117626" }, { "category": "external", "summary": "SUSE Bug 1127532 for CVE-2018-12121", "url": "https://bugzilla.suse.com/1127532" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2018-12121" }, { "cve": "CVE-2018-12122", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12122" } ], "notes": [ { "category": "general", "text": "Node.js: All versions prior to Node.js 6.15.0, 8.14.0, 10.14.0 and 11.3.0: Slowloris HTTP Denial of Service: An attacker can cause a Denial of Service (DoS) by sending headers very slowly keeping HTTP or HTTPS connections and associated resources alive for a long period of time.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12122", "url": "https://www.suse.com/security/cve/CVE-2018-12122" }, { "category": "external", "summary": "SUSE Bug 1117627 for CVE-2018-12122", "url": "https://bugzilla.suse.com/1117627" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2018-12122" }, { "cve": "CVE-2018-12123", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12123" } ], "notes": [ { "category": "general", "text": "Node.js: All versions prior to Node.js 6.15.0, 8.14.0, 10.14.0 and 11.3.0: Hostname spoofing in URL parser for javascript protocol: If a Node.js application is using url.parse() to determine the URL hostname, that hostname can be spoofed by using a mixed case \"javascript:\" (e.g. \"javAscript:\") protocol (other protocols are not affected). If security decisions are made about the URL based on the hostname, they may be incorrect.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12123", "url": "https://www.suse.com/security/cve/CVE-2018-12123" }, { "category": "external", "summary": "SUSE Bug 1117629 for CVE-2018-12123", "url": "https://bugzilla.suse.com/1117629" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2018-12123" }, { "cve": "CVE-2018-20406", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-20406" } ], "notes": [ { "category": "general", "text": "Modules/_pickle.c in Python before 3.7.1 has an integer overflow via a large LONG_BINPUT value that is mishandled during a \"resize to twice the size\" attempt. This issue might cause memory exhaustion, but is only relevant if the pickle format is used for serializing tens or hundreds of gigabytes of data. This issue is fixed in: v3.4.10, v3.4.10rc1; v3.5.10, v3.5.10rc1, v3.5.7, v3.5.7rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.7, v3.6.7rc1, v3.6.7rc2, v3.6.8, v3.6.8rc1, v3.6.9, v3.6.9rc1; v3.7.1, v3.7.1rc1, v3.7.1rc2, v3.7.2, v3.7.2rc1, v3.7.3, v3.7.3rc1, v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-20406", "url": "https://www.suse.com/security/cve/CVE-2018-20406" }, { "category": "external", "summary": "SUSE Bug 1120644 for CVE-2018-20406", "url": "https://bugzilla.suse.com/1120644" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "low" } ], "title": "CVE-2018-20406" }, { "cve": "CVE-2018-20852", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-20852" } ], "notes": [ { "category": "general", "text": "http.cookiejar.DefaultPolicy.domain_return_ok in Lib/http/cookiejar.py in Python before 3.7.3 does not correctly validate the domain: it can be tricked into sending existing cookies to the wrong server. An attacker may abuse this flaw by using a server with a hostname that has another valid hostname as a suffix (e.g., pythonicexample.com to steal cookies for example.com). When a program uses http.cookiejar.DefaultPolicy and tries to do an HTTP connection to an attacker-controlled server, existing cookies can be leaked to the attacker. This affects 2.x through 2.7.16, 3.x before 3.4.10, 3.5.x before 3.5.7, 3.6.x before 3.6.9, and 3.7.x before 3.7.3.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-20852", "url": "https://www.suse.com/security/cve/CVE-2018-20852" }, { "category": "external", "summary": "SUSE Bug 1141853 for CVE-2018-20852", "url": "https://bugzilla.suse.com/1141853" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2018-20852" }, { "cve": "CVE-2018-7158", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7158" } ], "notes": [ { "category": "general", "text": "The `\u0027path\u0027` module in the Node.js 4.x release line contains a potential regular expression denial of service (ReDoS) vector. The code in question was replaced in Node.js 6.x and later so this vulnerability only impacts all versions of Node.js 4.x. The regular expression, `splitPathRe`, used within the `\u0027path\u0027` module for the various path parsing functions, including `path.dirname()`, `path.extname()` and `path.parse()` was structured in such a way as to allow an attacker to craft a string, that when passed through one of these functions, could take a significant amount of time to evaluate, potentially leading to a full denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7158", "url": "https://www.suse.com/security/cve/CVE-2018-7158" }, { "category": "external", "summary": "SUSE Bug 1087459 for CVE-2018-7158", "url": "https://bugzilla.suse.com/1087459" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2018-7158" }, { "cve": "CVE-2018-7159", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7159" } ], "notes": [ { "category": "general", "text": "The HTTP parser in all current versions of Node.js ignores spaces in the `Content-Length` header, allowing input such as `Content-Length: 1 2` to be interpreted as having a value of `12`. The HTTP specification does not allow for spaces in the `Content-Length` value and the Node.js HTTP parser has been brought into line on this particular difference. The security risk of this flaw to Node.js users is considered to be VERY LOW as it is difficult, and may be impossible, to craft an attack that makes use of this flaw in a way that could not already be achieved by supplying an incorrect value for `Content-Length`. Vulnerabilities may exist in user-code that make incorrect assumptions about the potential accuracy of this value compared to the actual length of the data supplied. Node.js users crafting lower-level HTTP utilities are advised to re-check the length of any input supplied after parsing is complete.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7159", "url": "https://www.suse.com/security/cve/CVE-2018-7159" }, { "category": "external", "summary": "SUSE Bug 1087453 for CVE-2018-7159", "url": "https://bugzilla.suse.com/1087453" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "low" } ], "title": "CVE-2018-7159" }, { "cve": "CVE-2018-7160", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7160" } ], "notes": [ { "category": "general", "text": "The Node.js inspector, in 6.x and later is vulnerable to a DNS rebinding attack which could be exploited to perform remote code execution. An attack is possible from malicious websites open in a web browser on the same computer, or another computer with network access to the computer running the Node.js process. A malicious website could use a DNS rebinding attack to trick the web browser to bypass same-origin-policy checks and to allow HTTP connections to localhost or to hosts on the local network. If a Node.js process with the debug port active is running on localhost or on a host on the local network, the malicious website could connect to it as a debugger, and get full code execution access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7160", "url": "https://www.suse.com/security/cve/CVE-2018-7160" }, { "category": "external", "summary": "SUSE Bug 1087463 for CVE-2018-7160", "url": "https://bugzilla.suse.com/1087463" }, { "category": "external", "summary": "SUSE Bug 1182620 for CVE-2018-7160", "url": "https://bugzilla.suse.com/1182620" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2018-7160" }, { "cve": "CVE-2018-7161", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7161" } ], "notes": [ { "category": "general", "text": "All versions of Node.js 8.x, 9.x, and 10.x are vulnerable and the severity is HIGH. An attacker can cause a denial of service (DoS) by causing a node server providing an http2 server to crash. This can be accomplished by interacting with the http2 server in a manner that triggers a cleanup bug where objects are used in native code after they are no longer available. This has been addressed by updating the http2 implementation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7161", "url": "https://www.suse.com/security/cve/CVE-2018-7161" }, { "category": "external", "summary": "SUSE Bug 1097404 for CVE-2018-7161", "url": "https://bugzilla.suse.com/1097404" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2018-7161" }, { "cve": "CVE-2018-7167", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7167" } ], "notes": [ { "category": "general", "text": "Calling Buffer.fill() or Buffer.alloc() with some parameters can lead to a hang which could result in a Denial of Service. In order to address this vulnerability, the implementations of Buffer.alloc() and Buffer.fill() were updated so that they zero fill instead of hanging in these cases. All versions of Node.js 6.x (LTS \"Boron\"), 8.x (LTS \"Carbon\"), and 9.x are vulnerable. All versions of Node.js 10.x (Current) are NOT vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7167", "url": "https://www.suse.com/security/cve/CVE-2018-7167" }, { "category": "external", "summary": "SUSE Bug 1097375 for CVE-2018-7167", "url": "https://bugzilla.suse.com/1097375" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2018-7167" }, { "cve": "CVE-2019-10160", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10160" } ], "notes": [ { "category": "general", "text": "A security regression of CVE-2019-9636 was discovered in python since commit d537ab0ff9767ef024f26246899728f0116b1ec3 affecting versions 2.7, 3.5, 3.6, 3.7 and from v3.8.0a4 through v3.8.0b1, which still allows an attacker to exploit CVE-2019-9636 by abusing the user and password parts of a URL. When an application parses user-supplied URLs to store cookies, authentication credentials, or other kind of information, it is possible for an attacker to provide specially crafted URLs to make the application locate host-related information (e.g. cookies, authentication data) and send them to a different host than where it should, unlike if the URLs had been correctly parsed. The result of an attack may vary based on the application.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10160", "url": "https://www.suse.com/security/cve/CVE-2019-10160" }, { "category": "external", "summary": "SUSE Bug 1138459 for CVE-2019-10160", "url": "https://bugzilla.suse.com/1138459" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "critical" } ], "title": "CVE-2019-10160" }, { "cve": "CVE-2019-11709", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11709" } ], "notes": [ { "category": "general", "text": "Mozilla developers and community members reported memory safety bugs present in Firefox 67 and Firefox ESR 60.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11709", "url": "https://www.suse.com/security/cve/CVE-2019-11709" }, { "category": "external", "summary": "SUSE Bug 1140868 for CVE-2019-11709", "url": "https://bugzilla.suse.com/1140868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11709" }, { "cve": "CVE-2019-11710", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11710" } ], "notes": [ { "category": "general", "text": "Mozilla developers and community members reported memory safety bugs present in Firefox 67. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox \u003c 68.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11710", "url": "https://www.suse.com/security/cve/CVE-2019-11710" }, { "category": "external", "summary": "SUSE Bug 1140868 for CVE-2019-11710", "url": "https://bugzilla.suse.com/1140868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11710" }, { "cve": "CVE-2019-11711", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11711" } ], "notes": [ { "category": "general", "text": "When an inner window is reused, it does not consider the use of document.domain for cross-origin protections. If pages on different subdomains ever cooperatively use document.domain, then either page can abuse this to inject script into arbitrary pages on the other subdomain, even those that did not use document.domain to relax their origin security. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11711", "url": "https://www.suse.com/security/cve/CVE-2019-11711" }, { "category": "external", "summary": "SUSE Bug 1140868 for CVE-2019-11711", "url": "https://bugzilla.suse.com/1140868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11711" }, { "cve": "CVE-2019-11712", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11712" } ], "notes": [ { "category": "general", "text": "POST requests made by NPAPI plugins, such as Flash, that receive a status 308 redirect response can bypass CORS requirements. This can allow an attacker to perform Cross-Site Request Forgery (CSRF) attacks. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11712", "url": "https://www.suse.com/security/cve/CVE-2019-11712" }, { "category": "external", "summary": "SUSE Bug 1140868 for CVE-2019-11712", "url": "https://bugzilla.suse.com/1140868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11712" }, { "cve": "CVE-2019-11713", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11713" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability can occur in HTTP/2 when a cached HTTP/2 stream is closed while still in use, resulting in a potentially exploitable crash. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11713", "url": "https://www.suse.com/security/cve/CVE-2019-11713" }, { "category": "external", "summary": "SUSE Bug 1140868 for CVE-2019-11713", "url": "https://bugzilla.suse.com/1140868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11713" }, { "cve": "CVE-2019-11714", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11714" } ], "notes": [ { "category": "general", "text": "Necko can access a child on the wrong thread during UDP connections, resulting in a potentially exploitable crash in some instances. This vulnerability affects Firefox \u003c 68.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11714", "url": "https://www.suse.com/security/cve/CVE-2019-11714" }, { "category": "external", "summary": "SUSE Bug 1140868 for CVE-2019-11714", "url": "https://bugzilla.suse.com/1140868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11714" }, { "cve": "CVE-2019-11715", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11715" } ], "notes": [ { "category": "general", "text": "Due to an error while parsing page content, it is possible for properly sanitized user input to be misinterpreted and lead to XSS hazards on web sites in certain circumstances. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11715", "url": "https://www.suse.com/security/cve/CVE-2019-11715" }, { "category": "external", "summary": "SUSE Bug 1140868 for CVE-2019-11715", "url": "https://bugzilla.suse.com/1140868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11715" }, { "cve": "CVE-2019-11716", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11716" } ], "notes": [ { "category": "general", "text": "Until explicitly accessed by script, window.globalThis is not enumerable and, as a result, is not visible to code such as Object.getOwnPropertyNames(window). Sites that deploy a sandboxing that depends on enumerating and freezing access to the window object may miss this, allowing their sandboxes to be bypassed. This vulnerability affects Firefox \u003c 68.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11716", "url": "https://www.suse.com/security/cve/CVE-2019-11716" }, { "category": "external", "summary": "SUSE Bug 1140868 for CVE-2019-11716", "url": "https://bugzilla.suse.com/1140868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11716" }, { "cve": "CVE-2019-11717", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11717" } ], "notes": [ { "category": "general", "text": "A vulnerability exists where the caret (\"^\") character is improperly escaped constructing some URIs due to it being used as a separator, allowing for possible spoofing of origin attributes. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11717", "url": "https://www.suse.com/security/cve/CVE-2019-11717" }, { "category": "external", "summary": "SUSE Bug 1140868 for CVE-2019-11717", "url": "https://bugzilla.suse.com/1140868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11717" }, { "cve": "CVE-2019-11718", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11718" } ], "notes": [ { "category": "general", "text": "Activity Stream can display content from sent from the Snippet Service website. This content is written to innerHTML on the Activity Stream page without sanitization, allowing for a potential access to other information available to the Activity Stream, such as browsing history, if the Snipper Service were compromised. This vulnerability affects Firefox \u003c 68.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11718", "url": "https://www.suse.com/security/cve/CVE-2019-11718" }, { "category": "external", "summary": "SUSE Bug 1140868 for CVE-2019-11718", "url": "https://bugzilla.suse.com/1140868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11718" }, { "cve": "CVE-2019-11719", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11719" } ], "notes": [ { "category": "general", "text": "When importing a curve25519 private key in PKCS#8format with leading 0x00 bytes, it is possible to trigger an out-of-bounds read in the Network Security Services (NSS) library. This could lead to information disclosure. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11719", "url": "https://www.suse.com/security/cve/CVE-2019-11719" }, { "category": "external", "summary": "SUSE Bug 1140868 for CVE-2019-11719", "url": "https://bugzilla.suse.com/1140868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11719" }, { "cve": "CVE-2019-11720", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11720" } ], "notes": [ { "category": "general", "text": "Some unicode characters are incorrectly treated as whitespace during the parsing of web content instead of triggering parsing errors. This allows malicious code to then be processed, evading cross-site scripting (XSS) filtering. This vulnerability affects Firefox \u003c 68.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11720", "url": "https://www.suse.com/security/cve/CVE-2019-11720" }, { "category": "external", "summary": "SUSE Bug 1140868 for CVE-2019-11720", "url": "https://bugzilla.suse.com/1140868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11720" }, { "cve": "CVE-2019-11721", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11721" } ], "notes": [ { "category": "general", "text": "The unicode latin \u0027kra\u0027 character can be used to spoof a standard \u0027k\u0027 character in the addressbar. This allows for domain spoofing attacks as do not display as punycode text, allowing for user confusion. This vulnerability affects Firefox \u003c 68.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11721", "url": "https://www.suse.com/security/cve/CVE-2019-11721" }, { "category": "external", "summary": "SUSE Bug 1140868 for CVE-2019-11721", "url": "https://bugzilla.suse.com/1140868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11721" }, { "cve": "CVE-2019-11723", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11723" } ], "notes": [ { "category": "general", "text": "A vulnerability exists during the installation of add-ons where the initial fetch ignored the origin attributes of the browsing context. This could leak cookies in private browsing mode or across different \"containers\" for people who use the Firefox Multi-Account Containers Web Extension. This vulnerability affects Firefox \u003c 68.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11723", "url": "https://www.suse.com/security/cve/CVE-2019-11723" }, { "category": "external", "summary": "SUSE Bug 1140868 for CVE-2019-11723", "url": "https://bugzilla.suse.com/1140868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11723" }, { "cve": "CVE-2019-11724", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11724" } ], "notes": [ { "category": "general", "text": "Application permissions give additional remote troubleshooting permission to the site input.mozilla.org, which has been retired and now redirects to another site. This additional permission is unnecessary and is a potential vector for malicious attacks. This vulnerability affects Firefox \u003c 68.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11724", "url": "https://www.suse.com/security/cve/CVE-2019-11724" }, { "category": "external", "summary": "SUSE Bug 1140868 for CVE-2019-11724", "url": "https://bugzilla.suse.com/1140868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11724" }, { "cve": "CVE-2019-11725", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11725" } ], "notes": [ { "category": "general", "text": "When a user navigates to site marked as unsafe by the Safebrowsing API, warning messages are displayed and navigation is interrupted but resources from the same site loaded through websockets are not blocked, leading to the loading of unsafe resources and bypassing safebrowsing protections. This vulnerability affects Firefox \u003c 68.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11725", "url": "https://www.suse.com/security/cve/CVE-2019-11725" }, { "category": "external", "summary": "SUSE Bug 1140868 for CVE-2019-11725", "url": "https://bugzilla.suse.com/1140868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11725" }, { "cve": "CVE-2019-11727", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11727" } ], "notes": [ { "category": "general", "text": "A vulnerability exists where it possible to force Network Security Services (NSS) to sign CertificateVerify with PKCS#1 v1.5 signatures when those are the only ones advertised by server in CertificateRequest in TLS 1.3. PKCS#1 v1.5 signatures should not be used for TLS 1.3 messages. This vulnerability affects Firefox \u003c 68.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11727", "url": "https://www.suse.com/security/cve/CVE-2019-11727" }, { "category": "external", "summary": "SUSE Bug 1140868 for CVE-2019-11727", "url": "https://bugzilla.suse.com/1140868" }, { "category": "external", "summary": "SUSE Bug 1141322 for CVE-2019-11727", "url": "https://bugzilla.suse.com/1141322" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2019-11727" }, { "cve": "CVE-2019-11728", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11728" } ], "notes": [ { "category": "general", "text": "The HTTP Alternative Services header, Alt-Svc, can be used by a malicious site to scan all TCP ports of any host that the accessible to a user when web content is loaded. This vulnerability affects Firefox \u003c 68.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11728", "url": "https://www.suse.com/security/cve/CVE-2019-11728" }, { "category": "external", "summary": "SUSE Bug 1140868 for CVE-2019-11728", "url": "https://bugzilla.suse.com/1140868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11728" }, { "cve": "CVE-2019-11729", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11729" } ], "notes": [ { "category": "general", "text": "Empty or malformed p256-ECDH public keys may trigger a segmentation fault due values being improperly sanitized before being copied into memory and used. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11729", "url": "https://www.suse.com/security/cve/CVE-2019-11729" }, { "category": "external", "summary": "SUSE Bug 1140868 for CVE-2019-11729", "url": "https://bugzilla.suse.com/1140868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11729" }, { "cve": "CVE-2019-11730", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11730" } ], "notes": [ { "category": "general", "text": "A vulnerability exists where if a user opens a locally saved HTML file, this file can use file: URIs to access other files in the same directory or sub-directories if the names are known or guessed. The Fetch API can then be used to read the contents of any files stored in these directories and they may uploaded to a server. It was demonstrated that in combination with a popular Android messaging app, if a malicious HTML attachment is sent to a user and they opened that attachment in Firefox, due to that app\u0027s predictable pattern for locally-saved file names, it is possible to read attachments the victim received from other correspondents. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11730", "url": "https://www.suse.com/security/cve/CVE-2019-11730" }, { "category": "external", "summary": "SUSE Bug 1140868 for CVE-2019-11730", "url": "https://bugzilla.suse.com/1140868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11730" }, { "cve": "CVE-2019-11733", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11733" } ], "notes": [ { "category": "general", "text": "When a master password is set, it is required to be entered again before stored passwords can be accessed in the \u0027Saved Logins\u0027 dialog. It was found that locally stored passwords can be copied to the clipboard thorough the \u0027copy password\u0027 context menu item without re-entering the master password if the master password had been previously entered in the same session, allowing for potential theft of stored passwords. This vulnerability affects Firefox \u003c 68.0.2 and Firefox ESR \u003c 68.0.2.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11733", "url": "https://www.suse.com/security/cve/CVE-2019-11733" }, { "category": "external", "summary": "SUSE Bug 1145665 for CVE-2019-11733", "url": "https://bugzilla.suse.com/1145665" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2019-11733" }, { "cve": "CVE-2019-11735", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11735" } ], "notes": [ { "category": "general", "text": "Mozilla developers and community members reported memory safety bugs present in Firefox 68 and Firefox ESR 68. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox \u003c 69 and Firefox ESR \u003c 68.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11735", "url": "https://www.suse.com/security/cve/CVE-2019-11735" }, { "category": "external", "summary": "SUSE Bug 1149293 for CVE-2019-11735", "url": "https://bugzilla.suse.com/1149293" }, { "category": "external", "summary": "SUSE Bug 1149323 for CVE-2019-11735", "url": "https://bugzilla.suse.com/1149323" }, { "category": "external", "summary": "SUSE Bug 1149324 for CVE-2019-11735", "url": "https://bugzilla.suse.com/1149324" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11735" }, { "cve": "CVE-2019-11736", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11736" } ], "notes": [ { "category": "general", "text": "The Mozilla Maintenance Service does not guard against files being hardlinked to another file in the updates directory, allowing for the replacement of local files, including the Maintenance Service executable, which is run with privileged access. Additionally, there was a race condition during checks for junctions and symbolic links by the Maintenance Service, allowing for potential local file and directory manipulation to be undetected in some circumstances. This allows for potential privilege escalation by a user with unprivileged local access. \u003cbr\u003e*Note: These attacks requires local system access and only affects Windows. Other operating systems are not affected.*. This vulnerability affects Firefox \u003c 69 and Firefox ESR \u003c 68.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11736", "url": "https://www.suse.com/security/cve/CVE-2019-11736" }, { "category": "external", "summary": "SUSE Bug 1149292 for CVE-2019-11736", "url": "https://bugzilla.suse.com/1149292" }, { "category": "external", "summary": "SUSE Bug 1149323 for CVE-2019-11736", "url": "https://bugzilla.suse.com/1149323" }, { "category": "external", "summary": "SUSE Bug 1149324 for CVE-2019-11736", "url": "https://bugzilla.suse.com/1149324" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11736" }, { "cve": "CVE-2019-11738", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11738" } ], "notes": [ { "category": "general", "text": "If a Content Security Policy (CSP) directive is defined that uses a hash-based source that takes the empty string as input, execution of any javascript: URIs will be allowed. This could allow for malicious JavaScript content to be run, bypassing CSP permissions. This vulnerability affects Firefox \u003c 69 and Firefox ESR \u003c 68.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11738", "url": "https://www.suse.com/security/cve/CVE-2019-11738" }, { "category": "external", "summary": "SUSE Bug 1149302 for CVE-2019-11738", "url": "https://bugzilla.suse.com/1149302" }, { "category": "external", "summary": "SUSE Bug 1149323 for CVE-2019-11738", "url": "https://bugzilla.suse.com/1149323" }, { "category": "external", "summary": "SUSE Bug 1149324 for CVE-2019-11738", "url": "https://bugzilla.suse.com/1149324" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2019-11738" }, { "cve": "CVE-2019-11740", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11740" } ], "notes": [ { "category": "general", "text": "Mozilla developers and community members reported memory safety bugs present in Firefox 68, Firefox ESR 68, and Firefox 60.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox \u003c 69, Thunderbird \u003c 68.1, Thunderbird \u003c 60.9, Firefox ESR \u003c 60.9, and Firefox ESR \u003c 68.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11740", "url": "https://www.suse.com/security/cve/CVE-2019-11740" }, { "category": "external", "summary": "SUSE Bug 1149299 for CVE-2019-11740", "url": "https://bugzilla.suse.com/1149299" }, { "category": "external", "summary": "SUSE Bug 1149323 for CVE-2019-11740", "url": "https://bugzilla.suse.com/1149323" }, { "category": "external", "summary": "SUSE Bug 1149324 for CVE-2019-11740", "url": "https://bugzilla.suse.com/1149324" }, { "category": "external", "summary": "SUSE Bug 1150940 for CVE-2019-11740", "url": "https://bugzilla.suse.com/1150940" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11740" }, { "cve": "CVE-2019-11742", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11742" } ], "notes": [ { "category": "general", "text": "A same-origin policy violation occurs allowing the theft of cross-origin images through a combination of SVG filters and a \u0026lt;canvas\u0026gt; element due to an error in how same-origin policy is applied to cached image content. The resulting same-origin policy violation could allow for data theft. This vulnerability affects Firefox \u003c 69, Thunderbird \u003c 68.1, Thunderbird \u003c 60.9, Firefox ESR \u003c 60.9, and Firefox ESR \u003c 68.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11742", "url": "https://www.suse.com/security/cve/CVE-2019-11742" }, { "category": "external", "summary": "SUSE Bug 1149303 for CVE-2019-11742", "url": "https://bugzilla.suse.com/1149303" }, { "category": "external", "summary": "SUSE Bug 1149323 for CVE-2019-11742", "url": "https://bugzilla.suse.com/1149323" }, { "category": "external", "summary": "SUSE Bug 1149324 for CVE-2019-11742", "url": "https://bugzilla.suse.com/1149324" }, { "category": "external", "summary": "SUSE Bug 1150940 for CVE-2019-11742", "url": "https://bugzilla.suse.com/1150940" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11742" }, { "cve": "CVE-2019-11743", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11743" } ], "notes": [ { "category": "general", "text": "Navigation events were not fully adhering to the W3C\u0027s \"Navigation-Timing Level 2\" draft specification in some instances for the unload event, which restricts access to detailed timing attributes to only be same-origin. This resulted in potential cross-origin information exposure of history through timing side-channel attacks. This vulnerability affects Firefox \u003c 69, Thunderbird \u003c 68.1, Thunderbird \u003c 60.9, Firefox ESR \u003c 60.9, and Firefox ESR \u003c 68.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11743", "url": "https://www.suse.com/security/cve/CVE-2019-11743" }, { "category": "external", "summary": "SUSE Bug 1149298 for CVE-2019-11743", "url": "https://bugzilla.suse.com/1149298" }, { "category": "external", "summary": "SUSE Bug 1149323 for CVE-2019-11743", "url": "https://bugzilla.suse.com/1149323" }, { "category": "external", "summary": "SUSE Bug 1149324 for CVE-2019-11743", "url": "https://bugzilla.suse.com/1149324" }, { "category": "external", "summary": "SUSE Bug 1150940 for CVE-2019-11743", "url": "https://bugzilla.suse.com/1150940" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2019-11743" }, { "cve": "CVE-2019-11744", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11744" } ], "notes": [ { "category": "general", "text": "Some HTML elements, such as \u0026lt;title\u0026gt; and \u0026lt;textarea\u0026gt;, can contain literal angle brackets without treating them as markup. It is possible to pass a literal closing tag to .innerHTML on these elements, and subsequent content after that will be parsed as if it were outside the tag. This can lead to XSS if a site does not filter user input as strictly for these elements as it does for other elements. This vulnerability affects Firefox \u003c 69, Thunderbird \u003c 68.1, Thunderbird \u003c 60.9, Firefox ESR \u003c 60.9, and Firefox ESR \u003c 68.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11744", "url": "https://www.suse.com/security/cve/CVE-2019-11744" }, { "category": "external", "summary": "SUSE Bug 1149304 for CVE-2019-11744", "url": "https://bugzilla.suse.com/1149304" }, { "category": "external", "summary": "SUSE Bug 1149323 for CVE-2019-11744", "url": "https://bugzilla.suse.com/1149323" }, { "category": "external", "summary": "SUSE Bug 1149324 for CVE-2019-11744", "url": "https://bugzilla.suse.com/1149324" }, { "category": "external", "summary": "SUSE Bug 1150940 for CVE-2019-11744", "url": "https://bugzilla.suse.com/1150940" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11744" }, { "cve": "CVE-2019-11746", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11746" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability can occur while manipulating video elements if the body is freed while still in use. This results in a potentially exploitable crash. This vulnerability affects Firefox \u003c 69, Thunderbird \u003c 68.1, Thunderbird \u003c 60.9, Firefox ESR \u003c 60.9, and Firefox ESR \u003c 68.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11746", "url": "https://www.suse.com/security/cve/CVE-2019-11746" }, { "category": "external", "summary": "SUSE Bug 1149297 for CVE-2019-11746", "url": "https://bugzilla.suse.com/1149297" }, { "category": "external", "summary": "SUSE Bug 1149323 for CVE-2019-11746", "url": "https://bugzilla.suse.com/1149323" }, { "category": "external", "summary": "SUSE Bug 1149324 for CVE-2019-11746", "url": "https://bugzilla.suse.com/1149324" }, { "category": "external", "summary": "SUSE Bug 1150940 for CVE-2019-11746", "url": "https://bugzilla.suse.com/1150940" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11746" }, { "cve": "CVE-2019-11747", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11747" } ], "notes": [ { "category": "general", "text": "The \"Forget about this site\" feature in the History pane is intended to remove all saved user data that indicates a user has visited a site. This includes removing any HTTP Strict Transport Security (HSTS) settings received from sites that use it. Due to a bug, sites on the pre-load list also have their HSTS setting removed. On the next visit to that site if the user specifies an http: URL rather than secure https: they will not be protected by the pre-loaded HSTS setting. After that visit the site\u0027s HSTS setting will be restored. This vulnerability affects Firefox \u003c 69 and Firefox ESR \u003c 68.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11747", "url": "https://www.suse.com/security/cve/CVE-2019-11747" }, { "category": "external", "summary": "SUSE Bug 1149301 for CVE-2019-11747", "url": "https://bugzilla.suse.com/1149301" }, { "category": "external", "summary": "SUSE Bug 1149323 for CVE-2019-11747", "url": "https://bugzilla.suse.com/1149323" }, { "category": "external", "summary": "SUSE Bug 1149324 for CVE-2019-11747", "url": "https://bugzilla.suse.com/1149324" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.4, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "low" } ], "title": "CVE-2019-11747" }, { "cve": "CVE-2019-11748", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11748" } ], "notes": [ { "category": "general", "text": "WebRTC in Firefox will honor persisted permissions given to sites for access to microphone and camera resources even when in a third-party context. In light of recent high profile vulnerabilities in other software, a decision was made to no longer persist these permissions. This avoids the possibility of trusted WebRTC resources being invisibly embedded in web content and abusing permissions previously given by users. Users will now be prompted for permissions on each use. This vulnerability affects Firefox \u003c 69 and Firefox ESR \u003c 68.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11748", "url": "https://www.suse.com/security/cve/CVE-2019-11748" }, { "category": "external", "summary": "SUSE Bug 1149291 for CVE-2019-11748", "url": "https://bugzilla.suse.com/1149291" }, { "category": "external", "summary": "SUSE Bug 1149323 for CVE-2019-11748", "url": "https://bugzilla.suse.com/1149323" }, { "category": "external", "summary": "SUSE Bug 1149324 for CVE-2019-11748", "url": "https://bugzilla.suse.com/1149324" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2019-11748" }, { "cve": "CVE-2019-11749", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11749" } ], "notes": [ { "category": "general", "text": "A vulnerability exists in WebRTC where malicious web content can use probing techniques on the getUserMedia API using constraints to reveal device properties of cameras on the system without triggering a user prompt or notification. This allows for the potential fingerprinting of users. This vulnerability affects Firefox \u003c 69 and Firefox ESR \u003c 68.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11749", "url": "https://www.suse.com/security/cve/CVE-2019-11749" }, { "category": "external", "summary": "SUSE Bug 1149290 for CVE-2019-11749", "url": "https://bugzilla.suse.com/1149290" }, { "category": "external", "summary": "SUSE Bug 1149323 for CVE-2019-11749", "url": "https://bugzilla.suse.com/1149323" }, { "category": "external", "summary": "SUSE Bug 1149324 for CVE-2019-11749", "url": "https://bugzilla.suse.com/1149324" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2019-11749" }, { "cve": "CVE-2019-11750", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11750" } ], "notes": [ { "category": "general", "text": "A type confusion vulnerability exists in Spidermonkey, which results in a non-exploitable crash. This vulnerability affects Firefox \u003c 69 and Firefox ESR \u003c 68.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11750", "url": "https://www.suse.com/security/cve/CVE-2019-11750" }, { "category": "external", "summary": "SUSE Bug 1149289 for CVE-2019-11750", "url": "https://bugzilla.suse.com/1149289" }, { "category": "external", "summary": "SUSE Bug 1149323 for CVE-2019-11750", "url": "https://bugzilla.suse.com/1149323" }, { "category": "external", "summary": "SUSE Bug 1149324 for CVE-2019-11750", "url": "https://bugzilla.suse.com/1149324" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2019-11750" }, { "cve": "CVE-2019-11751", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11751" } ], "notes": [ { "category": "general", "text": "Logging-related command line parameters are not properly sanitized when Firefox is launched by another program, such as when a user clicks on malicious links in a chat application. This can be used to write a log file to an arbitrary location such as the Windows \u0027Startup\u0027 folder. \u003cbr\u003e*Note: this issue only affects Firefox on Windows operating systems.*. This vulnerability affects Firefox \u003c 69 and Firefox ESR \u003c 68.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11751", "url": "https://www.suse.com/security/cve/CVE-2019-11751" }, { "category": "external", "summary": "SUSE Bug 1149286 for CVE-2019-11751", "url": "https://bugzilla.suse.com/1149286" }, { "category": "external", "summary": "SUSE Bug 1149323 for CVE-2019-11751", "url": "https://bugzilla.suse.com/1149323" }, { "category": "external", "summary": "SUSE Bug 1149324 for CVE-2019-11751", "url": "https://bugzilla.suse.com/1149324" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11751" }, { "cve": "CVE-2019-11752", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11752" } ], "notes": [ { "category": "general", "text": "It is possible to delete an IndexedDB key value and subsequently try to extract it during conversion. This results in a use-after-free and a potentially exploitable crash. This vulnerability affects Firefox \u003c 69, Thunderbird \u003c 68.1, Thunderbird \u003c 60.9, Firefox ESR \u003c 60.9, and Firefox ESR \u003c 68.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11752", "url": "https://www.suse.com/security/cve/CVE-2019-11752" }, { "category": "external", "summary": "SUSE Bug 1149296 for CVE-2019-11752", "url": "https://bugzilla.suse.com/1149296" }, { "category": "external", "summary": "SUSE Bug 1149323 for CVE-2019-11752", "url": "https://bugzilla.suse.com/1149323" }, { "category": "external", "summary": "SUSE Bug 1149324 for CVE-2019-11752", "url": "https://bugzilla.suse.com/1149324" }, { "category": "external", "summary": "SUSE Bug 1150940 for CVE-2019-11752", "url": "https://bugzilla.suse.com/1150940" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11752" }, { "cve": "CVE-2019-11753", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11753" } ], "notes": [ { "category": "general", "text": "The Firefox installer allows Firefox to be installed to a custom user writable location, leaving it unprotected from manipulation by unprivileged users or malware. If the Mozilla Maintenance Service is manipulated to update this unprotected location and the updated maintenance service in the unprotected location has been altered, the altered maintenance service can run with elevated privileges during the update process due to a lack of integrity checks. This allows for privilege escalation if the executable has been replaced locally. \u003cbr\u003e*Note: This attack requires local system access and only affects Windows. Other operating systems are not affected.*. This vulnerability affects Firefox \u003c 69, Firefox ESR \u003c 60.9, and Firefox ESR \u003c 68.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11753", "url": "https://www.suse.com/security/cve/CVE-2019-11753" }, { "category": "external", "summary": "SUSE Bug 1149295 for CVE-2019-11753", "url": "https://bugzilla.suse.com/1149295" }, { "category": "external", "summary": "SUSE Bug 1149323 for CVE-2019-11753", "url": "https://bugzilla.suse.com/1149323" }, { "category": "external", "summary": "SUSE Bug 1149324 for CVE-2019-11753", "url": "https://bugzilla.suse.com/1149324" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2019-11753" }, { "cve": "CVE-2019-11757", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11757" } ], "notes": [ { "category": "general", "text": "When following the value\u0027s prototype chain, it was possible to retain a reference to a locale, delete it, and subsequently reference it. This resulted in a use-after-free and a potentially exploitable crash. This vulnerability affects Firefox \u003c 70, Thunderbird \u003c 68.2, and Firefox ESR \u003c 68.2.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11757", "url": "https://www.suse.com/security/cve/CVE-2019-11757" }, { "category": "external", "summary": "SUSE Bug 1154738 for CVE-2019-11757", "url": "https://bugzilla.suse.com/1154738" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11757" }, { "cve": "CVE-2019-11758", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11758" } ], "notes": [ { "category": "general", "text": "Mozilla community member Philipp reported a memory safety bug present in Firefox 68 when 360 Total Security was installed. This bug showed evidence of memory corruption in the accessibility engine and we presume that with enough effort that it could be exploited to run arbitrary code. This vulnerability affects Firefox \u003c 69, Thunderbird \u003c 68.2, and Firefox ESR \u003c 68.2.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11758", "url": "https://www.suse.com/security/cve/CVE-2019-11758" }, { "category": "external", "summary": "SUSE Bug 1154738 for CVE-2019-11758", "url": "https://bugzilla.suse.com/1154738" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11758" }, { "cve": "CVE-2019-11759", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11759" } ], "notes": [ { "category": "general", "text": "An attacker could have caused 4 bytes of HMAC output to be written past the end of a buffer stored on the stack. This could be used by an attacker to execute arbitrary code or more likely lead to a crash. This vulnerability affects Firefox \u003c 70, Thunderbird \u003c 68.2, and Firefox ESR \u003c 68.2.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11759", "url": "https://www.suse.com/security/cve/CVE-2019-11759" }, { "category": "external", "summary": "SUSE Bug 1154738 for CVE-2019-11759", "url": "https://bugzilla.suse.com/1154738" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11759" }, { "cve": "CVE-2019-11760", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11760" } ], "notes": [ { "category": "general", "text": "A fixed-size stack buffer could overflow in nrappkit when doing WebRTC signaling. This resulted in a potentially exploitable crash in some instances. This vulnerability affects Firefox \u003c 70, Thunderbird \u003c 68.2, and Firefox ESR \u003c 68.2.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11760", "url": "https://www.suse.com/security/cve/CVE-2019-11760" }, { "category": "external", "summary": "SUSE Bug 1154738 for CVE-2019-11760", "url": "https://bugzilla.suse.com/1154738" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11760" }, { "cve": "CVE-2019-11761", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11761" } ], "notes": [ { "category": "general", "text": "By using a form with a data URI it was possible to gain access to the privileged JSONView object that had been cloned into content. Impact from exposing this object appears to be minimal, however it was a bypass of existing defense in depth mechanisms. This vulnerability affects Firefox \u003c 70, Thunderbird \u003c 68.2, and Firefox ESR \u003c 68.2.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11761", "url": "https://www.suse.com/security/cve/CVE-2019-11761" }, { "category": "external", "summary": "SUSE Bug 1154738 for CVE-2019-11761", "url": "https://bugzilla.suse.com/1154738" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11761" }, { "cve": "CVE-2019-11762", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11762" } ], "notes": [ { "category": "general", "text": "If two same-origin documents set document.domain differently to become cross-origin, it was possible for them to call arbitrary DOM methods/getters/setters on the now-cross-origin window. This vulnerability affects Firefox \u003c 70, Thunderbird \u003c 68.2, and Firefox ESR \u003c 68.2.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11762", "url": "https://www.suse.com/security/cve/CVE-2019-11762" }, { "category": "external", "summary": "SUSE Bug 1154738 for CVE-2019-11762", "url": "https://bugzilla.suse.com/1154738" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11762" }, { "cve": "CVE-2019-11763", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11763" } ], "notes": [ { "category": "general", "text": "Failure to correctly handle null bytes when processing HTML entities resulted in Firefox incorrectly parsing these entities. This could have led to HTML comment text being treated as HTML which could have led to XSS in a web application under certain conditions. It could have also led to HTML entities being masked from filters - enabling the use of entities to mask the actual characters of interest from filters. This vulnerability affects Firefox \u003c 70, Thunderbird \u003c 68.2, and Firefox ESR \u003c 68.2.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11763", "url": "https://www.suse.com/security/cve/CVE-2019-11763" }, { "category": "external", "summary": "SUSE Bug 1154738 for CVE-2019-11763", "url": "https://bugzilla.suse.com/1154738" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11763" }, { "cve": "CVE-2019-11764", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11764" } ], "notes": [ { "category": "general", "text": "Mozilla developers and community members reported memory safety bugs present in Firefox 69 and Firefox ESR 68.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could be exploited to run arbitrary code. This vulnerability affects Firefox \u003c 70, Thunderbird \u003c 68.2, and Firefox ESR \u003c 68.2.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11764", "url": "https://www.suse.com/security/cve/CVE-2019-11764" }, { "category": "external", "summary": "SUSE Bug 1154738 for CVE-2019-11764", "url": "https://bugzilla.suse.com/1154738" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11764" }, { "cve": "CVE-2019-13173", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-13173" } ], "notes": [ { "category": "general", "text": "fstream before 1.0.12 is vulnerable to Arbitrary File Overwrite. Extracting tarballs containing a hardlink to a file that already exists in the system, and a file that matches the hardlink, will overwrite the system\u0027s file with the contents of the extracted file. The fstream.DirWriter() function is vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-13173", "url": "https://www.suse.com/security/cve/CVE-2019-13173" }, { "category": "external", "summary": "SUSE Bug 1140290 for CVE-2019-13173", "url": "https://bugzilla.suse.com/1140290" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-13173" }, { "cve": "CVE-2019-15903", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15903" } ], "notes": [ { "category": "general", "text": "In libexpat before 2.2.8, crafted XML input could fool the parser into changing from DTD parsing to document parsing too early; a consecutive call to XML_GetCurrentLineNumber (or XML_GetCurrentColumnNumber) then resulted in a heap-based buffer over-read.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15903", "url": "https://www.suse.com/security/cve/CVE-2019-15903" }, { "category": "external", "summary": "SUSE Bug 1149429 for CVE-2019-15903", "url": "https://bugzilla.suse.com/1149429" }, { "category": "external", "summary": "SUSE Bug 1154738 for CVE-2019-15903", "url": "https://bugzilla.suse.com/1154738" }, { "category": "external", "summary": "SUSE Bug 1154806 for CVE-2019-15903", "url": "https://bugzilla.suse.com/1154806" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-15903" }, { "cve": "CVE-2019-5010", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-5010" } ], "notes": [ { "category": "general", "text": "An exploitable denial-of-service vulnerability exists in the X509 certificate parser of Python.org Python 2.7.11 / 3.6.6. A specially crafted X509 certificate can cause a NULL pointer dereference, resulting in a denial of service. An attacker can initiate or accept TLS connections using crafted certificates to trigger this vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-5010", "url": "https://www.suse.com/security/cve/CVE-2019-5010" }, { "category": "external", "summary": "SUSE Bug 1122191 for CVE-2019-5010", "url": "https://bugzilla.suse.com/1122191" }, { "category": "external", "summary": "SUSE Bug 1126909 for CVE-2019-5010", "url": "https://bugzilla.suse.com/1126909" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-5010" }, { "cve": "CVE-2019-5737", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-5737" } ], "notes": [ { "category": "general", "text": "In Node.js including 6.x before 6.17.0, 8.x before 8.15.1, 10.x before 10.15.2, and 11.x before 11.10.1, an attacker can cause a Denial of Service (DoS) by establishing an HTTP or HTTPS connection in keep-alive mode and by sending headers very slowly. This keeps the connection and associated resources alive for a long period of time. Potential attacks are mitigated by the use of a load balancer or other proxy layer. This vulnerability is an extension of CVE-2018-12121, addressed in November and impacts all active Node.js release lines including 6.x before 6.17.0, 8.x before 8.15.1, 10.x before 10.15.2, and 11.x before 11.10.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-5737", "url": "https://www.suse.com/security/cve/CVE-2019-5737" }, { "category": "external", "summary": "SUSE Bug 1127532 for CVE-2019-5737", "url": "https://bugzilla.suse.com/1127532" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "low" } ], "title": "CVE-2019-5737" }, { "cve": "CVE-2019-9511", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9511" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9511", "url": "https://www.suse.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "SUSE Bug 1145579 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1145579" }, { "category": "external", "summary": "SUSE Bug 1146091 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1146091" }, { "category": "external", "summary": "SUSE Bug 1146182 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1146182" }, { "category": "external", "summary": "SUSE Bug 1193427 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1193427" }, { "category": "external", "summary": "SUSE Bug 1202787 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1202787" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-9511" }, { "cve": "CVE-2019-9512", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9512" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9512", "url": "https://www.suse.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146099 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1146099" }, { "category": "external", "summary": "SUSE Bug 1146111 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1146111" }, { "category": "external", "summary": "SUSE Bug 1147142 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1147142" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-9512" }, { "cve": "CVE-2019-9513", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9513" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9513", "url": "https://www.suse.com/security/cve/CVE-2019-9513" }, { "category": "external", "summary": "SUSE Bug 1145580 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1145580" }, { "category": "external", "summary": "SUSE Bug 1146094 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1146094" }, { "category": "external", "summary": "SUSE Bug 1146184 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1146184" }, { "category": "external", "summary": "SUSE Bug 1193427 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1193427" }, { "category": "external", "summary": "SUSE Bug 1202787 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1202787" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-9513" }, { "cve": "CVE-2019-9514", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9514" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9514", "url": "https://www.suse.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "SUSE Bug 1145662 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1145662" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146095 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1146095" }, { "category": "external", "summary": "SUSE Bug 1146115 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1146115" }, { "category": "external", "summary": "SUSE Bug 1147142 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1147142" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-9514" }, { "cve": "CVE-2019-9515", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9515" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a denial of service. The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the peer reply with one acknowledgement per SETTINGS frame, an empty SETTINGS frame is almost equivalent in behavior to a ping. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9515", "url": "https://www.suse.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9515", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146100 for CVE-2019-9515", "url": "https://bugzilla.suse.com/1146100" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-9515" }, { "cve": "CVE-2019-9516", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9516" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9516", "url": "https://www.suse.com/security/cve/CVE-2019-9516" }, { "category": "external", "summary": "SUSE Bug 1145582 for CVE-2019-9516", "url": "https://bugzilla.suse.com/1145582" }, { "category": "external", "summary": "SUSE Bug 1146090 for CVE-2019-9516", "url": "https://bugzilla.suse.com/1146090" }, { "category": "external", "summary": "SUSE Bug 1193427 for CVE-2019-9516", "url": "https://bugzilla.suse.com/1193427" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-9516" }, { "cve": "CVE-2019-9517", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9517" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to unconstrained interal data buffering, potentially leading to a denial of service. The attacker opens the HTTP/2 window so the peer can send without constraint; however, they leave the TCP window closed so the peer cannot actually write (many of) the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the servers queue the responses, this can consume excess memory, CPU, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9517", "url": "https://www.suse.com/security/cve/CVE-2019-9517" }, { "category": "external", "summary": "SUSE Bug 1145575 for CVE-2019-9517", "url": "https://bugzilla.suse.com/1145575" }, { "category": "external", "summary": "SUSE Bug 1146097 for CVE-2019-9517", "url": "https://bugzilla.suse.com/1146097" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-9517" }, { "cve": "CVE-2019-9518", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9518" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer spends time processing each frame disproportionate to attack bandwidth. This can consume excess CPU.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9518", "url": "https://www.suse.com/security/cve/CVE-2019-9518" }, { "category": "external", "summary": "SUSE Bug 1145662 for CVE-2019-9518", "url": "https://bugzilla.suse.com/1145662" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9518", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146093 for CVE-2019-9518", "url": "https://bugzilla.suse.com/1146093" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-9518" }, { "cve": "CVE-2019-9636", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9636" } ], "notes": [ { "category": "general", "text": "Python 2.7.x through 2.7.16 and 3.x through 3.7.2 is affected by: Improper Handling of Unicode Encoding (with an incorrect netloc) during NFKC normalization. The impact is: Information disclosure (credentials, cookies, etc. that are cached against a given hostname). The components are: urllib.parse.urlsplit, urllib.parse.urlparse. The attack vector is: A specially crafted URL could be incorrectly parsed to locate cookies or authentication data and send that information to a different host than when parsed correctly. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.7, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.3, v3.7.3rc1, v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9636", "url": "https://www.suse.com/security/cve/CVE-2019-9636" }, { "category": "external", "summary": "SUSE Bug 1129346 for CVE-2019-9636", "url": "https://bugzilla.suse.com/1129346" }, { "category": "external", "summary": "SUSE Bug 1135433 for CVE-2019-9636", "url": "https://bugzilla.suse.com/1135433" }, { "category": "external", "summary": "SUSE Bug 1138459 for CVE-2019-9636", "url": "https://bugzilla.suse.com/1138459" }, { "category": "external", "summary": "SUSE Bug 1145004 for CVE-2019-9636", "url": "https://bugzilla.suse.com/1145004" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-9636" }, { "cve": "CVE-2019-9811", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9811" } ], "notes": [ { "category": "general", "text": "As part of a winning Pwn2Own entry, a researcher demonstrated a sandbox escape by installing a malicious language pack and then opening a browser feature that used the compromised translation. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9811", "url": "https://www.suse.com/security/cve/CVE-2019-9811" }, { "category": "external", "summary": "SUSE Bug 1140868 for CVE-2019-9811", "url": "https://bugzilla.suse.com/1140868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-9811" }, { "cve": "CVE-2019-9812", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9812" } ], "notes": [ { "category": "general", "text": "Given a compromised sandboxed content process due to a separate vulnerability, it is possible to escape that sandbox by loading accounts.firefox.com in that process and forcing a log-in to a malicious Firefox Sync account. Preference settings that disable the sandbox are then synchronized to the local machine and the compromised browser would restart without the sandbox if a crash is triggered. This vulnerability affects Firefox ESR \u003c 60.9, Firefox ESR \u003c 68.1, and Firefox \u003c 69.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9812", "url": "https://www.suse.com/security/cve/CVE-2019-9812" }, { "category": "external", "summary": "SUSE Bug 1149294 for CVE-2019-9812", "url": "https://bugzilla.suse.com/1149294" }, { "category": "external", "summary": "SUSE Bug 1149323 for CVE-2019-9812", "url": "https://bugzilla.suse.com/1149323" }, { "category": "external", "summary": "SUSE Bug 1149324 for CVE-2019-9812", "url": "https://bugzilla.suse.com/1149324" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-9812" }, { "cve": "CVE-2019-9947", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9947" } ], "notes": [ { "category": "general", "text": "An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \\r\\n (specifically in the path component of a URL that lacks a ? character) followed by an HTTP header or a Redis command. This is similar to the CVE-2019-9740 query string issue. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9947", "url": "https://www.suse.com/security/cve/CVE-2019-9947" }, { "category": "external", "summary": "SUSE Bug 1130840 for CVE-2019-9947", "url": "https://bugzilla.suse.com/1130840" }, { "category": "external", "summary": "SUSE Bug 1136184 for CVE-2019-9947", "url": "https://bugzilla.suse.com/1136184" }, { "category": "external", "summary": "SUSE Bug 1155094 for CVE-2019-9947", "url": "https://bugzilla.suse.com/1155094" }, { "category": "external", "summary": "SUSE Bug 1201559 for CVE-2019-9947", "url": "https://bugzilla.suse.com/1201559" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2019-9947" } ] }
suse-su-2019:2259-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for nodejs10", "title": "Title of the patch" }, { "category": "description", "text": "This update for nodejs10 to version 10.16.3 fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2019-9511: Fixed HTTP/2 implementations that are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service (bsc#1146091).\n- CVE-2019-9512: Fixed HTTP/2 flood using PING frames results in unbounded memory growth (bsc#1146099).\n- CVE-2019-9513: Fixed HTTP/2 implementation that is vulnerable to resource loops, potentially leading to a denial of service. (bsc#1146094).\n- CVE-2019-9514: Fixed HTTP/2 implementation that is vulnerable to a reset flood, potentially leading to a denial of service (bsc#1146095).\n- CVE-2019-9515: Fixed HTTP/2 flood using SETTINGS frames results in unbounded memory growth (bsc#1146100).\n- CVE-2019-9516: Fixed HTTP/2 implementation that is vulnerable to a header leak, potentially leading to a denial of service (bsc#1146090).\n- CVE-2019-9517: Fixed HTTP/2 implementations that are vulnerable to unconstrained interal data buffering (bsc#1146097).\n- CVE-2019-9518: Fixed HTTP/2 implementation that is vulnerable to a flood of empty frames, potentially leading to a denial of service (bsc#1146093).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-2259,SUSE-SLE-Module-Web-Scripting-15-2019-2259,SUSE-SLE-Module-Web-Scripting-15-SP1-2019-2259", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2259-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:2259-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192259-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:2259-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-September/005863.html" }, { "category": "self", "summary": "SUSE Bug 1146090", "url": "https://bugzilla.suse.com/1146090" }, { "category": "self", "summary": "SUSE Bug 1146091", "url": "https://bugzilla.suse.com/1146091" }, { "category": "self", "summary": "SUSE Bug 1146093", "url": "https://bugzilla.suse.com/1146093" }, { "category": "self", "summary": "SUSE Bug 1146094", "url": "https://bugzilla.suse.com/1146094" }, { "category": "self", "summary": "SUSE Bug 1146095", "url": "https://bugzilla.suse.com/1146095" }, { "category": "self", "summary": "SUSE Bug 1146097", "url": "https://bugzilla.suse.com/1146097" }, { "category": "self", "summary": "SUSE Bug 1146099", "url": "https://bugzilla.suse.com/1146099" }, { "category": "self", "summary": "SUSE Bug 1146100", "url": "https://bugzilla.suse.com/1146100" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9511 page", "url": "https://www.suse.com/security/cve/CVE-2019-9511/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9512 page", "url": "https://www.suse.com/security/cve/CVE-2019-9512/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9513 page", "url": "https://www.suse.com/security/cve/CVE-2019-9513/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9514 page", "url": "https://www.suse.com/security/cve/CVE-2019-9514/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9515 page", "url": "https://www.suse.com/security/cve/CVE-2019-9515/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9516 page", "url": "https://www.suse.com/security/cve/CVE-2019-9516/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9517 page", "url": "https://www.suse.com/security/cve/CVE-2019-9517/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9518 page", "url": "https://www.suse.com/security/cve/CVE-2019-9518/" } ], "title": "Security update for nodejs10", "tracking": { "current_release_date": "2019-09-02T07:04:04Z", "generator": { "date": "2019-09-02T07:04:04Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:2259-1", "initial_release_date": "2019-09-02T07:04:04Z", "revision_history": [ { "date": "2019-09-02T07:04:04Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "nodejs10-10.16.3-1.12.1.aarch64", "product": { "name": "nodejs10-10.16.3-1.12.1.aarch64", "product_id": "nodejs10-10.16.3-1.12.1.aarch64" } }, { "category": "product_version", "name": "nodejs10-devel-10.16.3-1.12.1.aarch64", "product": { "name": "nodejs10-devel-10.16.3-1.12.1.aarch64", "product_id": "nodejs10-devel-10.16.3-1.12.1.aarch64" } }, { "category": "product_version", "name": "npm10-10.16.3-1.12.1.aarch64", "product": { "name": "npm10-10.16.3-1.12.1.aarch64", "product_id": "npm10-10.16.3-1.12.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "nodejs10-10.16.3-1.12.1.i586", "product": { "name": "nodejs10-10.16.3-1.12.1.i586", "product_id": "nodejs10-10.16.3-1.12.1.i586" } }, { "category": "product_version", "name": "nodejs10-devel-10.16.3-1.12.1.i586", "product": { "name": "nodejs10-devel-10.16.3-1.12.1.i586", "product_id": "nodejs10-devel-10.16.3-1.12.1.i586" } }, { "category": "product_version", "name": "npm10-10.16.3-1.12.1.i586", "product": { "name": "npm10-10.16.3-1.12.1.i586", "product_id": "npm10-10.16.3-1.12.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "nodejs10-docs-10.16.3-1.12.1.noarch", "product": { "name": "nodejs10-docs-10.16.3-1.12.1.noarch", "product_id": "nodejs10-docs-10.16.3-1.12.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "nodejs10-10.16.3-1.12.1.ppc64le", "product": { "name": "nodejs10-10.16.3-1.12.1.ppc64le", "product_id": "nodejs10-10.16.3-1.12.1.ppc64le" } }, { "category": "product_version", "name": "nodejs10-devel-10.16.3-1.12.1.ppc64le", "product": { "name": "nodejs10-devel-10.16.3-1.12.1.ppc64le", "product_id": "nodejs10-devel-10.16.3-1.12.1.ppc64le" } }, { "category": "product_version", "name": "npm10-10.16.3-1.12.1.ppc64le", "product": { "name": "npm10-10.16.3-1.12.1.ppc64le", "product_id": "npm10-10.16.3-1.12.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "nodejs10-10.16.3-1.12.1.s390x", "product": { "name": "nodejs10-10.16.3-1.12.1.s390x", "product_id": "nodejs10-10.16.3-1.12.1.s390x" } }, { "category": "product_version", "name": "nodejs10-devel-10.16.3-1.12.1.s390x", "product": { "name": "nodejs10-devel-10.16.3-1.12.1.s390x", "product_id": "nodejs10-devel-10.16.3-1.12.1.s390x" } }, { "category": "product_version", "name": "npm10-10.16.3-1.12.1.s390x", "product": { "name": "npm10-10.16.3-1.12.1.s390x", "product_id": "npm10-10.16.3-1.12.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "nodejs10-10.16.3-1.12.1.x86_64", "product": { "name": "nodejs10-10.16.3-1.12.1.x86_64", "product_id": "nodejs10-10.16.3-1.12.1.x86_64" } }, { "category": "product_version", "name": "nodejs10-devel-10.16.3-1.12.1.x86_64", "product": { "name": "nodejs10-devel-10.16.3-1.12.1.x86_64", "product_id": "nodejs10-devel-10.16.3-1.12.1.x86_64" } }, { "category": "product_version", "name": "npm10-10.16.3-1.12.1.x86_64", "product": { "name": "npm10-10.16.3-1.12.1.x86_64", "product_id": "npm10-10.16.3-1.12.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Web and Scripting 15", "product": { "name": "SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-web-scripting:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product": { "name": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-web-scripting:15:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.16.3-1.12.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.aarch64" }, "product_reference": "nodejs10-10.16.3-1.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.16.3-1.12.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.ppc64le" }, "product_reference": "nodejs10-10.16.3-1.12.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.16.3-1.12.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.s390x" }, "product_reference": "nodejs10-10.16.3-1.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.16.3-1.12.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.x86_64" }, "product_reference": "nodejs10-10.16.3-1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.16.3-1.12.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.aarch64" }, "product_reference": "nodejs10-devel-10.16.3-1.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.16.3-1.12.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.ppc64le" }, "product_reference": "nodejs10-devel-10.16.3-1.12.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.16.3-1.12.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.s390x" }, "product_reference": "nodejs10-devel-10.16.3-1.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.16.3-1.12.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.x86_64" }, "product_reference": "nodejs10-devel-10.16.3-1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-docs-10.16.3-1.12.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-docs-10.16.3-1.12.1.noarch" }, "product_reference": "nodejs10-docs-10.16.3-1.12.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.16.3-1.12.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.aarch64" }, "product_reference": "npm10-10.16.3-1.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.16.3-1.12.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.ppc64le" }, "product_reference": "npm10-10.16.3-1.12.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.16.3-1.12.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.s390x" }, "product_reference": "npm10-10.16.3-1.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.16.3-1.12.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.x86_64" }, "product_reference": "npm10-10.16.3-1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.16.3-1.12.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.aarch64" }, "product_reference": "nodejs10-10.16.3-1.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.16.3-1.12.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.ppc64le" }, "product_reference": "nodejs10-10.16.3-1.12.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.16.3-1.12.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.s390x" }, "product_reference": "nodejs10-10.16.3-1.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.16.3-1.12.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.x86_64" }, "product_reference": "nodejs10-10.16.3-1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.16.3-1.12.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.aarch64" }, "product_reference": "nodejs10-devel-10.16.3-1.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.16.3-1.12.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.ppc64le" }, "product_reference": "nodejs10-devel-10.16.3-1.12.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.16.3-1.12.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.s390x" }, "product_reference": "nodejs10-devel-10.16.3-1.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.16.3-1.12.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.x86_64" }, "product_reference": "nodejs10-devel-10.16.3-1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-docs-10.16.3-1.12.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-docs-10.16.3-1.12.1.noarch" }, "product_reference": "nodejs10-docs-10.16.3-1.12.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.16.3-1.12.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.aarch64" }, "product_reference": "npm10-10.16.3-1.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.16.3-1.12.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.ppc64le" }, "product_reference": "npm10-10.16.3-1.12.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.16.3-1.12.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.s390x" }, "product_reference": "npm10-10.16.3-1.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.16.3-1.12.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.x86_64" }, "product_reference": "npm10-10.16.3-1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-9511", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9511" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9511", "url": "https://www.suse.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "SUSE Bug 1145579 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1145579" }, { "category": "external", "summary": "SUSE Bug 1146091 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1146091" }, { "category": "external", "summary": "SUSE Bug 1146182 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1146182" }, { "category": "external", "summary": "SUSE Bug 1193427 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1193427" }, { "category": "external", "summary": "SUSE Bug 1202787 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1202787" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-02T07:04:04Z", "details": "important" } ], "title": "CVE-2019-9511" }, { "cve": "CVE-2019-9512", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9512" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9512", "url": "https://www.suse.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146099 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1146099" }, { "category": "external", "summary": "SUSE Bug 1146111 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1146111" }, { "category": "external", "summary": "SUSE Bug 1147142 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1147142" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-02T07:04:04Z", "details": "important" } ], "title": "CVE-2019-9512" }, { "cve": "CVE-2019-9513", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9513" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9513", "url": "https://www.suse.com/security/cve/CVE-2019-9513" }, { "category": "external", "summary": "SUSE Bug 1145580 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1145580" }, { "category": "external", "summary": "SUSE Bug 1146094 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1146094" }, { "category": "external", "summary": "SUSE Bug 1146184 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1146184" }, { "category": "external", "summary": "SUSE Bug 1193427 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1193427" }, { "category": "external", "summary": "SUSE Bug 1202787 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1202787" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-02T07:04:04Z", "details": "important" } ], "title": "CVE-2019-9513" }, { "cve": "CVE-2019-9514", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9514" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9514", "url": "https://www.suse.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "SUSE Bug 1145662 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1145662" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146095 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1146095" }, { "category": "external", "summary": "SUSE Bug 1146115 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1146115" }, { "category": "external", "summary": "SUSE Bug 1147142 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1147142" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-02T07:04:04Z", "details": "important" } ], "title": "CVE-2019-9514" }, { "cve": "CVE-2019-9515", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9515" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a denial of service. The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the peer reply with one acknowledgement per SETTINGS frame, an empty SETTINGS frame is almost equivalent in behavior to a ping. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9515", "url": "https://www.suse.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9515", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146100 for CVE-2019-9515", "url": "https://bugzilla.suse.com/1146100" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-02T07:04:04Z", "details": "important" } ], "title": "CVE-2019-9515" }, { "cve": "CVE-2019-9516", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9516" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9516", "url": "https://www.suse.com/security/cve/CVE-2019-9516" }, { "category": "external", "summary": "SUSE Bug 1145582 for CVE-2019-9516", "url": "https://bugzilla.suse.com/1145582" }, { "category": "external", "summary": "SUSE Bug 1146090 for CVE-2019-9516", "url": "https://bugzilla.suse.com/1146090" }, { "category": "external", "summary": "SUSE Bug 1193427 for CVE-2019-9516", "url": "https://bugzilla.suse.com/1193427" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-02T07:04:04Z", "details": "important" } ], "title": "CVE-2019-9516" }, { "cve": "CVE-2019-9517", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9517" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to unconstrained interal data buffering, potentially leading to a denial of service. The attacker opens the HTTP/2 window so the peer can send without constraint; however, they leave the TCP window closed so the peer cannot actually write (many of) the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the servers queue the responses, this can consume excess memory, CPU, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9517", "url": "https://www.suse.com/security/cve/CVE-2019-9517" }, { "category": "external", "summary": "SUSE Bug 1145575 for CVE-2019-9517", "url": "https://bugzilla.suse.com/1145575" }, { "category": "external", "summary": "SUSE Bug 1146097 for CVE-2019-9517", "url": "https://bugzilla.suse.com/1146097" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-02T07:04:04Z", "details": "important" } ], "title": "CVE-2019-9517" }, { "cve": "CVE-2019-9518", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9518" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer spends time processing each frame disproportionate to attack bandwidth. This can consume excess CPU.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9518", "url": "https://www.suse.com/security/cve/CVE-2019-9518" }, { "category": "external", "summary": "SUSE Bug 1145662 for CVE-2019-9518", "url": "https://bugzilla.suse.com/1145662" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9518", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146093 for CVE-2019-9518", "url": "https://bugzilla.suse.com/1146093" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-02T07:04:04Z", "details": "important" } ], "title": "CVE-2019-9518" } ] }
gsd-2019-9514
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2019-9514", "description": "Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.", "id": "GSD-2019-9514", "references": [ "https://www.suse.com/security/cve/CVE-2019-9514.html", "https://www.debian.org/security/2020/dsa-4669", "https://www.debian.org/security/2019/dsa-4520", "https://www.debian.org/security/2019/dsa-4508", "https://www.debian.org/security/2019/dsa-4503", "https://access.redhat.com/errata/RHSA-2020:3197", "https://access.redhat.com/errata/RHSA-2020:3196", "https://access.redhat.com/errata/RHSA-2020:2565", "https://access.redhat.com/errata/RHSA-2020:2067", "https://access.redhat.com/errata/RHSA-2020:1445", "https://access.redhat.com/errata/RHSA-2020:0983", "https://access.redhat.com/errata/RHSA-2020:0922", "https://access.redhat.com/errata/RHSA-2020:0727", "https://access.redhat.com/errata/RHSA-2020:0406", "https://access.redhat.com/errata/RHSA-2019:4352", "https://access.redhat.com/errata/RHSA-2019:4273", "https://access.redhat.com/errata/RHSA-2019:4269", "https://access.redhat.com/errata/RHSA-2019:4045", "https://access.redhat.com/errata/RHSA-2019:4042", "https://access.redhat.com/errata/RHSA-2019:4041", "https://access.redhat.com/errata/RHSA-2019:4040", "https://access.redhat.com/errata/RHSA-2019:4021", "https://access.redhat.com/errata/RHSA-2019:4020", "https://access.redhat.com/errata/RHSA-2019:4019", "https://access.redhat.com/errata/RHSA-2019:4018", "https://access.redhat.com/errata/RHSA-2019:3906", "https://access.redhat.com/errata/RHSA-2019:3892", "https://access.redhat.com/errata/RHSA-2019:3265", "https://access.redhat.com/errata/RHSA-2019:3245", "https://access.redhat.com/errata/RHBA-2019:3139", "https://access.redhat.com/errata/RHSA-2019:3131", "https://access.redhat.com/errata/RHSA-2019:2966", "https://access.redhat.com/errata/RHSA-2019:2955", "https://access.redhat.com/errata/RHSA-2019:2939", "https://access.redhat.com/errata/RHSA-2019:2925", "https://access.redhat.com/errata/RHSA-2019:2861", "https://access.redhat.com/errata/RHSA-2019:2817", "https://access.redhat.com/errata/RHSA-2019:2796", "https://access.redhat.com/errata/RHSA-2019:2769", "https://access.redhat.com/errata/RHSA-2019:2766", "https://access.redhat.com/errata/RHSA-2019:2726", "https://access.redhat.com/errata/RHSA-2019:2690", "https://access.redhat.com/errata/RHSA-2019:2682", "https://access.redhat.com/errata/RHSA-2019:2661", "https://access.redhat.com/errata/RHSA-2019:2594", "https://ubuntu.com/security/CVE-2019-9514", "https://advisories.mageia.org/CVE-2019-9514.html", "https://security.archlinux.org/CVE-2019-9514", "https://alas.aws.amazon.com/cve/html/CVE-2019-9514.html", "https://linux.oracle.com/cve/CVE-2019-9514.html", "https://access.redhat.com/errata/RHBA-2019:2819" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2019-9514" ], "details": "Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.", "id": "GSD-2019-9514", "modified": "2023-12-13T01:23:47.286195Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "AKA": "HTTP/2 Reset Flood", "ASSIGNER": "[email protected]", "ID": "CVE-2019-9514", "STATE": "PUBLIC", "TITLE": "Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "credit": [ { "lang": "eng", "value": "Thanks to Jonathan Looney of Netflix for reporting this vulnerability." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both." } ] }, "generator": { "engine": "Vulnogram 0.0.7" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-400 Uncontrolled Resource Consumption" } ] } ] }, "references": { "reference_data": [ { "name": "VU#605641", "refsource": "CERT-VN", "url": "https://kb.cert.org/vuls/id/605641/" }, { "name": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "refsource": "MISC", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "name": "[trafficserver-dev] 20190813 Apache Traffic Server is vulnerable to various HTTP/2 attacks", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/bde52309316ae798186d783a5e29f4ad1527f61c9219a289d0eee0a7@%3Cdev.trafficserver.apache.org%3E" }, { "name": "[trafficserver-users] 20190813 Apache Traffic Server is vulnerable to various HTTP/2 attacks", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/392108390cef48af647a2e47b7fd5380e050e35ae8d1aa2030254c04@%3Cusers.trafficserver.apache.org%3E" }, { "name": "[trafficserver-announce] 20190813 Apache Traffic Server is vulnerable to various HTTP/2 attacks", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/ad3d01e767199c1aed8033bb6b3f5bf98c011c7c536f07a5d34b3c19@%3Cannounce.trafficserver.apache.org%3E" }, { "name": "20190814 APPLE-SA-2019-08-13-5 SwiftNIO HTTP/2 1.5.0", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Aug/24" }, { "name": "20190816 APPLE-SA-2019-08-13-5 SwiftNIO HTTP/2 1.5.0", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2019/Aug/16" }, { "name": "https://www.synology.com/security/advisory/Synology_SA_19_33", "refsource": "CONFIRM", "url": "https://www.synology.com/security/advisory/Synology_SA_19_33" }, { "name": "20190819 [SECURITY] [DSA 4503-1] golang-1.11 security update", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Aug/31" }, { "name": "DSA-4503", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2019/dsa-4503" }, { "name": "https://support.f5.com/csp/article/K01988340", "refsource": "CONFIRM", "url": "https://support.f5.com/csp/article/K01988340" }, { "name": "[oss-security] 20190819 [ANNOUNCE] Security release of Kubernetes v1.15.3, v1.14.6, v1.13.10 - CVE-2019-9512 and CVE-2019-9514", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2019/08/20/1" }, { "name": "https://security.netapp.com/advisory/ntap-20190823-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20190823-0001/" }, { "name": "https://security.netapp.com/advisory/ntap-20190823-0004/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20190823-0004/" }, { "name": "https://security.netapp.com/advisory/ntap-20190823-0005/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20190823-0005/" }, { "name": "openSUSE-SU-2019:2000", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00076.html" }, { "name": "FEDORA-2019-5a6a7bc12c", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP/" }, { "name": "FEDORA-2019-6a2980de56", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC/" }, { "name": "20190825 [SECURITY] [DSA 4508-1] h2o security update", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Aug/43" }, { "name": "DSA-4508", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2019/dsa-4508" }, { "name": "openSUSE-SU-2019:2056", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00002.html" }, { "name": "openSUSE-SU-2019:2072", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00011.html" }, { "name": "FEDORA-2019-55d101a740", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/LYO6E3H34C346D2E443GLXK7OK6KIYIQ/" }, { "name": "FEDORA-2019-65db7ad6c7", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/4BBP27PZGSY6OP6D26E5FW4GZKBFHNU7/" }, { "name": "openSUSE-SU-2019:2085", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00021.html" }, { "name": "RHSA-2019:2682", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2682" }, { "name": "DSA-4520", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2019/dsa-4520" }, { "name": "RHSA-2019:2726", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2726" }, { "name": "20190910 [SECURITY] [DSA 4520-1] trafficserver security update", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Sep/18" }, { "name": "RHSA-2019:2594", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2594" }, { "name": "openSUSE-SU-2019:2114", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html" }, { "name": "openSUSE-SU-2019:2115", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html" }, { "name": "RHSA-2019:2661", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2661" }, { "name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10296", "refsource": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10296" }, { "name": "RHSA-2019:2690", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2690" }, { "name": "RHSA-2019:2766", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2766" }, { "name": "openSUSE-SU-2019:2130", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00038.html" }, { "name": "RHSA-2019:2796", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2796" }, { "name": "RHSA-2019:2861", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2861" }, { "name": "RHSA-2019:2925", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2925" }, { "name": "RHSA-2019:2939", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2939" }, { "name": "RHSA-2019:2955", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2955" }, { "name": "RHSA-2019:2966", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2966" }, { "name": "https://support.f5.com/csp/article/K01988340?utm_source=f5support\u0026amp;utm_medium=RSS", "refsource": "CONFIRM", "url": "https://support.f5.com/csp/article/K01988340?utm_source=f5support\u0026amp;utm_medium=RSS" }, { "name": "RHSA-2019:3131", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:3131" }, { "name": "RHSA-2019:2769", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2769" }, { "name": "RHSA-2019:3245", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:3245" }, { "name": "RHSA-2019:3265", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:3265" }, { "name": "RHSA-2019:3892", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:3892" }, { "name": "RHSA-2019:3906", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:3906" }, { "name": "RHSA-2019:4018", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:4018" }, { "name": "RHSA-2019:4019", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:4019" }, { "name": "RHSA-2019:4021", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:4021" }, { "name": "RHSA-2019:4020", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:4020" }, { "name": "RHSA-2019:4045", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:4045" }, { "name": "RHSA-2019:4042", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:4042" }, { "name": "RHSA-2019:4040", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:4040" }, { "name": "RHSA-2019:4041", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:4041" }, { "name": "RHSA-2019:4269", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:4269" }, { "name": "RHSA-2019:4273", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:4273" }, { "name": "RHSA-2019:4352", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:4352" }, { "name": "RHSA-2020:0406", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2020:0406" }, { "name": "RHSA-2020:0727", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2020:0727" }, { "name": "USN-4308-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4308-1/" }, { "name": "DSA-4669", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2020/dsa-4669" }, { "name": "[debian-lts-announce] 20201208 [SECURITY] [DLA 2485-1] golang-golang-x-net-dev security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00011.html" }, { "name": "[oss-security] 20231018 Re: CVE-2023-44487: HTTP/2 Rapid Reset attack against many implementations", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2023/10/18/8" } ] }, "source": { "discovery": "UNKNOWN" } }, "gitlab.com": { "advisories": [ { "affected_range": "\u003c0.0.0-20190813141303-74dc4d7220e7", "affected_versions": "All versions before 0.0.0-20190813141303-74dc4d7220e7", "cvss_v2": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cwe_ids": [ "CWE-1035", "CWE-770", "CWE-937" ], "date": "2023-02-24", "description": "Some HTTP/2 implementations is vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.", "fixed_versions": [ "0.0.0-20190813141303-74dc4d7220e7" ], "identifier": "CVE-2019-9514", "identifiers": [ "GHSA-39qc-96h7-956f", "CVE-2019-9514" ], "not_impacted": "All versions starting from 0.0.0-20190813141303-74dc4d7220e7", "package_slug": "go/golang.org/x/net", "pubdate": "2022-05-24", "solution": "Upgrade to version 0.0.0-20190813141303-74dc4d7220e7 or above.", "title": "Allocation of Resources Without Limits or Throttling", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "https://go.dev/cl/190137", "https://go.dev/issue/33606", "https://go.googlesource.com/go/+/145e193131eb486077b66009beb051aba07c52a5", "https://groups.google.com/g/golang-announce/c/65QixT3tcmg/m/DrFiG6vvCwAJ", "https://pkg.go.dev/vuln/GO-2022-0536", "https://github.com/advisories/GHSA-39qc-96h7-956f" ], "uuid": "27c1c123-06b3-4b3e-a102-ab66324a4ffa" }, { "affected_range": "\u003c0.0.0-20190813141303-74dc4d7220e7", "affected_versions": "All versions before 0.0.0-20190813141303-74dc4d7220e7", "cvss_v2": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cwe_ids": [ "CWE-1035", "CWE-770", "CWE-937" ], "date": "2023-02-08", "description": "Some HTTP/2 implementations is vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.", "fixed_versions": [ "0.0.0-20190813141303-74dc4d7220e7" ], "identifier": "CVE-2019-9514", "identifiers": [ "GHSA-39qc-96h7-956f", "CVE-2019-9514" ], "not_impacted": "All versions starting from 0.0.0-20190813141303-74dc4d7220e7", "package_slug": "go/golang.org/x/net/http", "pubdate": "2022-05-24", "solution": "Upgrade to version 0.0.0-20190813141303-74dc4d7220e7 or above.", "title": "Allocation of Resources Without Limits or Throttling", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "https://access.redhat.com/errata/RHSA-2019:2594", "https://access.redhat.com/errata/RHSA-2019:2661", "https://access.redhat.com/errata/RHSA-2019:2682", "https://access.redhat.com/errata/RHSA-2019:2690", "https://access.redhat.com/errata/RHSA-2019:2726", "https://access.redhat.com/errata/RHSA-2019:2766", "https://access.redhat.com/errata/RHSA-2019:2769", "https://access.redhat.com/errata/RHSA-2019:2796", "https://access.redhat.com/errata/RHSA-2019:2861", "https://access.redhat.com/errata/RHSA-2019:2925", "https://access.redhat.com/errata/RHSA-2019:2939", "https://access.redhat.com/errata/RHSA-2019:2955", "https://access.redhat.com/errata/RHSA-2019:2966", "https://access.redhat.com/errata/RHSA-2019:3131", "https://access.redhat.com/errata/RHSA-2019:3245", "https://access.redhat.com/errata/RHSA-2019:3265", "https://access.redhat.com/errata/RHSA-2019:3892", "https://access.redhat.com/errata/RHSA-2019:3906", "https://access.redhat.com/errata/RHSA-2019:4018", "https://access.redhat.com/errata/RHSA-2019:4019", "https://access.redhat.com/errata/RHSA-2019:4020", "https://access.redhat.com/errata/RHSA-2019:4021", "https://access.redhat.com/errata/RHSA-2019:4040", "https://access.redhat.com/errata/RHSA-2019:4041", "https://access.redhat.com/errata/RHSA-2019:4042", "https://access.redhat.com/errata/RHSA-2019:4045", "https://access.redhat.com/errata/RHSA-2019:4269", "https://access.redhat.com/errata/RHSA-2019:4273", "https://access.redhat.com/errata/RHSA-2019:4352", "https://access.redhat.com/errata/RHSA-2020:0406", "https://access.redhat.com/errata/RHSA-2020:0727", "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "https://kb.cert.org/vuls/id/605641/", "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10296", "https://lists.apache.org/thread.html/392108390cef48af647a2e47b7fd5380e050e35ae8d1aa2030254c04@%3Cusers.trafficserver.apache.org%3E", "https://lists.apache.org/thread.html/ad3d01e767199c1aed8033bb6b3f5bf98c011c7c536f07a5d34b3c19@%3Cannounce.trafficserver.apache.org%3E", "https://lists.apache.org/thread.html/bde52309316ae798186d783a5e29f4ad1527f61c9219a289d0eee0a7@%3Cdev.trafficserver.apache.org%3E", "https://lists.debian.org/debian-lts-announce/2020/12/msg00011.html", "https://lists.fedoraproject.org/archives/list/[email protected]/message/4BBP27PZGSY6OP6D26E5FW4GZKBFHNU7/", "https://lists.fedoraproject.org/archives/list/[email protected]/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC/", "https://lists.fedoraproject.org/archives/list/[email protected]/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP/", "https://lists.fedoraproject.org/archives/list/[email protected]/message/LYO6E3H34C346D2E443GLXK7OK6KIYIQ/", "https://seclists.org/bugtraq/2019/Aug/24", "https://seclists.org/bugtraq/2019/Aug/31", "https://seclists.org/bugtraq/2019/Aug/43", "https://seclists.org/bugtraq/2019/Sep/18", "https://security.netapp.com/advisory/ntap-20190823-0001/", "https://security.netapp.com/advisory/ntap-20190823-0004/", "https://security.netapp.com/advisory/ntap-20190823-0005/", "https://support.f5.com/csp/article/K01988340", "https://support.f5.com/csp/article/K01988340?utm_source=f5support\u0026amp;utm_medium=RSS", "https://usn.ubuntu.com/4308-1/", "https://www.debian.org/security/2019/dsa-4503", "https://www.debian.org/security/2019/dsa-4508", "https://www.debian.org/security/2019/dsa-4520", "https://www.debian.org/security/2020/dsa-4669", "https://www.synology.com/security/advisory/Synology_SA_19_33", "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00076.html", "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00002.html", "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00011.html", "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00021.html", "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html", "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html", "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00038.html", "http://seclists.org/fulldisclosure/2019/Aug/16", "http://www.openwall.com/lists/oss-security/2019/08/20/1", "https://go.dev/cl/190137", "https://go.dev/issue/33606", "https://go.googlesource.com/go/+/145e193131eb486077b66009beb051aba07c52a5", "https://groups.google.com/g/golang-announce/c/65QixT3tcmg/m/DrFiG6vvCwAJ", "https://pkg.go.dev/vuln/GO-2022-0536", "https://github.com/advisories/GHSA-39qc-96h7-956f" ], "uuid": "8ae1f009-cc7d-47ed-b29a-f4a4a766a4bd" } ] }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:apple:swiftnio:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.4.0", "versionStartIncluding": "1.0.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe_name": [], "versionStartIncluding": "10.12", "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:*:*:*:*:*:*:*:*", "cpe_name": [], "versionStartIncluding": "14.04", "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "8.0.3", "versionStartIncluding": "8.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "7.1.6", "versionStartIncluding": "7.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "6.2.3", "versionStartIncluding": "6.0.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:synology:skynas:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:synology:diskstation_manager:6.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:synology:vs960hd_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:synology:vs960hd:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:openshift_container_platform:3.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:openshift_container_platform:3.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:jboss_core_services:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:single_sign-on:7.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:developer_tools:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:openshift_container_platform:4.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:openshift_container_platform:4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:openshift_service_mesh:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:openstack:14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:oracle:graalvm:19.2.0:*:*:*:enterprise:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "7.7.2.24", "versionStartIncluding": "7.7.2.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "7.8.2.13", "versionStartIncluding": "7.8.2.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "8.2.0", "versionStartIncluding": "8.1.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:netapp:cloud_insights:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:trident:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "14.1.2.1", "versionStartIncluding": "14.1.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "14.0.1.1", "versionStartIncluding": "14.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "13.1.3.2", "versionStartIncluding": "13.1.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "15.0.1.1", "versionStartIncluding": "15.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "12.1.5.1", "versionStartIncluding": "12.1.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "11.6.5.1", "versionStartIncluding": "11.6.1", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*", "cpe_name": [], "versionEndIncluding": "8.8.1", "versionStartIncluding": "8.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*", "cpe_name": [], "versionEndIncluding": "10.12.0", "versionStartIncluding": "10.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*", "cpe_name": [], "versionEndExcluding": "12.8.1", "versionStartIncluding": "12.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*", "cpe_name": [], "versionEndExcluding": "10.16.3", "versionStartIncluding": "10.13.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*", "cpe_name": [], "versionEndExcluding": "8.16.1", "versionStartIncluding": "8.9.0", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "[email protected]", "ID": "CVE-2019-9514" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-770" } ] } ] }, "references": { "reference_data": [ { "name": "VU#605641", "refsource": "CERT-VN", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://kb.cert.org/vuls/id/605641/" }, { "name": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "name": "[trafficserver-announce] 20190813 Apache Traffic Server is vulnerable to various HTTP/2 attacks", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.apache.org/thread.html/ad3d01e767199c1aed8033bb6b3f5bf98c011c7c536f07a5d34b3c19@%3Cannounce.trafficserver.apache.org%3E" }, { "name": "[trafficserver-users] 20190813 Apache Traffic Server is vulnerable to various HTTP/2 attacks", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.apache.org/thread.html/392108390cef48af647a2e47b7fd5380e050e35ae8d1aa2030254c04@%3Cusers.trafficserver.apache.org%3E" }, { "name": "[trafficserver-dev] 20190813 Apache Traffic Server is vulnerable to various HTTP/2 attacks", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.apache.org/thread.html/bde52309316ae798186d783a5e29f4ad1527f61c9219a289d0eee0a7@%3Cdev.trafficserver.apache.org%3E" }, { "name": "20190814 APPLE-SA-2019-08-13-5 SwiftNIO HTTP/2 1.5.0", "refsource": "BUGTRAQ", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/bugtraq/2019/Aug/24" }, { "name": "20190816 APPLE-SA-2019-08-13-5 SwiftNIO HTTP/2 1.5.0", "refsource": "FULLDISC", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2019/Aug/16" }, { "name": "https://www.synology.com/security/advisory/Synology_SA_19_33", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://www.synology.com/security/advisory/Synology_SA_19_33" }, { "name": "20190819 [SECURITY] [DSA 4503-1] golang-1.11 security update", "refsource": "BUGTRAQ", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/bugtraq/2019/Aug/31" }, { "name": "DSA-4503", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2019/dsa-4503" }, { "name": "https://support.f5.com/csp/article/K01988340", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://support.f5.com/csp/article/K01988340" }, { "name": "[oss-security] 20190819 [ANNOUNCE] Security release of Kubernetes v1.15.3, v1.14.6, v1.13.10 - CVE-2019-9512 and CVE-2019-9514", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2019/08/20/1" }, { "name": "https://security.netapp.com/advisory/ntap-20190823-0004/", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20190823-0004/" }, { "name": "https://security.netapp.com/advisory/ntap-20190823-0005/", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20190823-0005/" }, { "name": "https://security.netapp.com/advisory/ntap-20190823-0001/", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20190823-0001/" }, { "name": "openSUSE-SU-2019:2000", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00076.html" }, { "name": "FEDORA-2019-5a6a7bc12c", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP/" }, { "name": "FEDORA-2019-6a2980de56", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC/" }, { "name": "20190825 [SECURITY] [DSA 4508-1] h2o security update", "refsource": "BUGTRAQ", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/bugtraq/2019/Aug/43" }, { "name": "DSA-4508", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2019/dsa-4508" }, { "name": "openSUSE-SU-2019:2056", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00002.html" }, { "name": "openSUSE-SU-2019:2072", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00011.html" }, { "name": "FEDORA-2019-65db7ad6c7", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/4BBP27PZGSY6OP6D26E5FW4GZKBFHNU7/" }, { "name": "FEDORA-2019-55d101a740", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/LYO6E3H34C346D2E443GLXK7OK6KIYIQ/" }, { "name": "openSUSE-SU-2019:2085", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00021.html" }, { "name": "RHSA-2019:2682", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2682" }, { "name": "DSA-4520", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2019/dsa-4520" }, { "name": "RHSA-2019:2726", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2726" }, { "name": "20190910 [SECURITY] [DSA 4520-1] trafficserver security update", "refsource": "BUGTRAQ", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/bugtraq/2019/Sep/18" }, { "name": "RHSA-2019:2594", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2594" }, { "name": "openSUSE-SU-2019:2114", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html" }, { "name": "openSUSE-SU-2019:2115", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html" }, { "name": "RHSA-2019:2661", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2661" }, { "name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10296", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10296" }, { "name": "RHSA-2019:2690", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2690" }, { "name": "RHSA-2019:2766", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2766" }, { "name": "openSUSE-SU-2019:2130", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00038.html" }, { "name": "RHSA-2019:2796", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2796" }, { "name": "RHSA-2019:2861", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2861" }, { "name": "RHSA-2019:2925", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2925" }, { "name": "RHSA-2019:2939", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2939" }, { "name": "RHSA-2019:2955", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2955" }, { "name": "RHSA-2019:2966", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2966" }, { "name": "https://support.f5.com/csp/article/K01988340?utm_source=f5support\u0026amp;utm_medium=RSS", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://support.f5.com/csp/article/K01988340?utm_source=f5support\u0026amp;utm_medium=RSS" }, { "name": "RHSA-2019:3131", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3131" }, { "name": "RHSA-2019:2769", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2769" }, { "name": "RHSA-2019:3245", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3245" }, { "name": "RHSA-2019:3265", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3265" }, { "name": "RHSA-2019:3892", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3892" }, { "name": "RHSA-2019:3906", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3906" }, { "name": "RHSA-2019:4018", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:4018" }, { "name": "RHSA-2019:4020", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:4020" }, { "name": "RHSA-2019:4019", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:4019" }, { "name": "RHSA-2019:4021", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:4021" }, { "name": "RHSA-2019:4040", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:4040" }, { "name": "RHSA-2019:4042", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:4042" }, { "name": "RHSA-2019:4041", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:4041" }, { "name": "RHSA-2019:4045", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:4045" }, { "name": "RHSA-2019:4269", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:4269" }, { "name": "RHSA-2019:4273", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:4273" }, { "name": "RHSA-2019:4352", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:4352" }, { "name": "RHSA-2020:0406", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0406" }, { "name": "RHSA-2020:0727", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0727" }, { "name": "USN-4308-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4308-1/" }, { "name": "DSA-4669", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2020/dsa-4669" }, { "name": "[debian-lts-announce] 20201208 [SECURITY] [DLA 2485-1] golang-golang-x-net-dev security update", "refsource": "MLIST", "tags": [ "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00011.html" }, { "name": "[oss-security] 20231018 Re: CVE-2023-44487: HTTP/2 Rapid Reset attack against many implementations", "refsource": "MLIST", "tags": [], "url": "http://www.openwall.com/lists/oss-security/2023/10/18/8" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6 } }, "lastModifiedDate": "2023-10-19T03:15Z", "publishedDate": "2019-08-13T21:15Z" } } }
wid-sec-w-2024-1926
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "JBoss Enterprise Application Platform ist eine skalierbare Plattform f\u00fcr Java-Anwendungen, inklusive JBoss Application Server, JBoss Hibernate und Boss Seam.\r\nRed Hat Enterprise Linux (RHEL) ist eine popul\u00e4re Linux-Distribution.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in Red Hat JBoss Enterprise Application Platform auf Red Hat Enterprise Linux ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen preiszugeben, Dateien und Daten zu manipulieren oder Sicherheitsma\u00dfnahmen zu umgehen.", "title": "Angriff" }, { "category": "general", "text": "- Sonstiges\n- UNIX", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "[email protected]", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-1926 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1926.json" }, { "category": "self", "summary": "WID-SEC-2024-1926 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1926" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:5856 vom 2024-08-26", "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:10207 vom 2024-11-25", "url": "https://access.redhat.com/errata/RHSA-2024:10207" } ], "source_lang": "en-US", "title": "Red Hat JBoss Enterprise Application Platform: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-11-24T23:00:00.000+00:00", "generator": { "date": "2024-11-25T09:11:57.787+00:00", "engine": { "name": "BSI-WID", "version": "1.3.8" } }, "id": "WID-SEC-W-2024-1926", "initial_release_date": "2024-08-26T22:00:00.000+00:00", "revision_history": [ { "date": "2024-08-26T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-11-24T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Red Hat aufgenommen" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "7", "product": { "name": "Red Hat Enterprise Linux 7", "product_id": "T037110", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7" } } } ], "category": "product_name", "name": "Enterprise Linux" }, { "branches": [ { "category": "product_version_range", "name": "\u003c7.1.7", "product": { "name": "Red Hat JBoss Enterprise Application Platform \u003c7.1.7", "product_id": "T037109" } }, { "category": "product_version", "name": "7.1.7", "product": { "name": "Red Hat JBoss Enterprise Application Platform 7.1.7", "product_id": "T037109-fixed", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:7.1.7" } } }, { "category": "product_version_range", "name": "\u003c7.3.11", "product": { "name": "Red Hat JBoss Enterprise Application Platform \u003c7.3.11", "product_id": "T039412" } }, { "category": "product_version", "name": "7.3.11", "product": { "name": "Red Hat JBoss Enterprise Application Platform 7.3.11", "product_id": "T039412-fixed", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:7.3.11" } } } ], "category": "product_name", "name": "JBoss Enterprise Application Platform" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-10086", "notes": [ { "category": "description", "text": "Es gibt mehrere Schwachstellen in Red Hat JBoss Enterprise Application Platform auf Red Hat Enterprise Linux. Diese Schwachstellen bestehen in verschiedenen Komponenten wie Undertow, Log4j und HTTP/2 und FasterXML aufgrund einer Reihe von sicherheitsrelevanten Problemen wie unsachgem\u00e4\u00dfer Eingabevalidierung, unzureichenden Zugriffskontrollen, M\u00e4ngeln in kryptografischen Implementierungen und Fehlkonfigurationen bei der Behandlung von Benutzerdaten oder HTTP-Anfragen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen preiszugeben, Dateien und Daten zu manipulieren oder Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "T037109", "T037110", "T039412" ] }, "release_date": "2024-08-26T22:00:00.000+00:00", "title": "CVE-2019-10086" }, { "cve": "CVE-2019-10174", "notes": [ { "category": "description", "text": "Es gibt mehrere Schwachstellen in Red Hat JBoss Enterprise Application Platform auf Red Hat Enterprise Linux. Diese Schwachstellen bestehen in verschiedenen Komponenten wie Undertow, Log4j und HTTP/2 und FasterXML aufgrund einer Reihe von sicherheitsrelevanten Problemen wie unsachgem\u00e4\u00dfer Eingabevalidierung, unzureichenden Zugriffskontrollen, M\u00e4ngeln in kryptografischen Implementierungen und Fehlkonfigurationen bei der Behandlung von Benutzerdaten oder HTTP-Anfragen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen preiszugeben, Dateien und Daten zu manipulieren oder Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "T037109", "T037110", "T039412" ] }, "release_date": "2024-08-26T22:00:00.000+00:00", "title": "CVE-2019-10174" }, { "cve": "CVE-2019-12384", "notes": [ { "category": "description", "text": "Es gibt mehrere Schwachstellen in Red Hat JBoss Enterprise Application Platform auf Red Hat Enterprise Linux. Diese Schwachstellen bestehen in verschiedenen Komponenten wie Undertow, Log4j und HTTP/2 und FasterXML aufgrund einer Reihe von sicherheitsrelevanten Problemen wie unsachgem\u00e4\u00dfer Eingabevalidierung, unzureichenden Zugriffskontrollen, M\u00e4ngeln in kryptografischen Implementierungen und Fehlkonfigurationen bei der Behandlung von Benutzerdaten oder HTTP-Anfragen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen preiszugeben, Dateien und Daten zu manipulieren oder Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "T037109", "T037110", "T039412" ] }, "release_date": "2024-08-26T22:00:00.000+00:00", "title": "CVE-2019-12384" }, { "cve": "CVE-2019-14379", "notes": [ { "category": "description", "text": "Es gibt mehrere Schwachstellen in Red Hat JBoss Enterprise Application Platform auf Red Hat Enterprise Linux. Diese Schwachstellen bestehen in verschiedenen Komponenten wie Undertow, Log4j und HTTP/2 und FasterXML aufgrund einer Reihe von sicherheitsrelevanten Problemen wie unsachgem\u00e4\u00dfer Eingabevalidierung, unzureichenden Zugriffskontrollen, M\u00e4ngeln in kryptografischen Implementierungen und Fehlkonfigurationen bei der Behandlung von Benutzerdaten oder HTTP-Anfragen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen preiszugeben, Dateien und Daten zu manipulieren oder Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "T037109", "T037110", "T039412" ] }, "release_date": "2024-08-26T22:00:00.000+00:00", "title": "CVE-2019-14379" }, { "cve": "CVE-2019-14843", "notes": [ { "category": "description", "text": "Es gibt mehrere Schwachstellen in Red Hat JBoss Enterprise Application Platform auf Red Hat Enterprise Linux. Diese Schwachstellen bestehen in verschiedenen Komponenten wie Undertow, Log4j und HTTP/2 und FasterXML aufgrund einer Reihe von sicherheitsrelevanten Problemen wie unsachgem\u00e4\u00dfer Eingabevalidierung, unzureichenden Zugriffskontrollen, M\u00e4ngeln in kryptografischen Implementierungen und Fehlkonfigurationen bei der Behandlung von Benutzerdaten oder HTTP-Anfragen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen preiszugeben, Dateien und Daten zu manipulieren oder Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "T037109", "T037110", "T039412" ] }, "release_date": "2024-08-26T22:00:00.000+00:00", "title": "CVE-2019-14843" }, { "cve": "CVE-2019-14888", "notes": [ { "category": "description", "text": "Es gibt mehrere Schwachstellen in Red Hat JBoss Enterprise Application Platform auf Red Hat Enterprise Linux. Diese Schwachstellen bestehen in verschiedenen Komponenten wie Undertow, Log4j und HTTP/2 und FasterXML aufgrund einer Reihe von sicherheitsrelevanten Problemen wie unsachgem\u00e4\u00dfer Eingabevalidierung, unzureichenden Zugriffskontrollen, M\u00e4ngeln in kryptografischen Implementierungen und Fehlkonfigurationen bei der Behandlung von Benutzerdaten oder HTTP-Anfragen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen preiszugeben, Dateien und Daten zu manipulieren oder Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "T037109", "T037110", "T039412" ] }, "release_date": "2024-08-26T22:00:00.000+00:00", "title": "CVE-2019-14888" }, { "cve": "CVE-2019-16869", "notes": [ { "category": "description", "text": "Es gibt mehrere Schwachstellen in Red Hat JBoss Enterprise Application Platform auf Red Hat Enterprise Linux. Diese Schwachstellen bestehen in verschiedenen Komponenten wie Undertow, Log4j und HTTP/2 und FasterXML aufgrund einer Reihe von sicherheitsrelevanten Problemen wie unsachgem\u00e4\u00dfer Eingabevalidierung, unzureichenden Zugriffskontrollen, M\u00e4ngeln in kryptografischen Implementierungen und Fehlkonfigurationen bei der Behandlung von Benutzerdaten oder HTTP-Anfragen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen preiszugeben, Dateien und Daten zu manipulieren oder Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "T037109", "T037110", "T039412" ] }, "release_date": "2024-08-26T22:00:00.000+00:00", "title": "CVE-2019-16869" }, { "cve": "CVE-2019-17531", "notes": [ { "category": "description", "text": "Es gibt mehrere Schwachstellen in Red Hat JBoss Enterprise Application Platform auf Red Hat Enterprise Linux. Diese Schwachstellen bestehen in verschiedenen Komponenten wie Undertow, Log4j und HTTP/2 und FasterXML aufgrund einer Reihe von sicherheitsrelevanten Problemen wie unsachgem\u00e4\u00dfer Eingabevalidierung, unzureichenden Zugriffskontrollen, M\u00e4ngeln in kryptografischen Implementierungen und Fehlkonfigurationen bei der Behandlung von Benutzerdaten oder HTTP-Anfragen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen preiszugeben, Dateien und Daten zu manipulieren oder Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "T037109", "T037110", "T039412" ] }, "release_date": "2024-08-26T22:00:00.000+00:00", "title": "CVE-2019-17531" }, { "cve": "CVE-2019-20444", "notes": [ { "category": "description", "text": "Es gibt mehrere Schwachstellen in Red Hat JBoss Enterprise Application Platform auf Red Hat Enterprise Linux. Diese Schwachstellen bestehen in verschiedenen Komponenten wie Undertow, Log4j und HTTP/2 und FasterXML aufgrund einer Reihe von sicherheitsrelevanten Problemen wie unsachgem\u00e4\u00dfer Eingabevalidierung, unzureichenden Zugriffskontrollen, M\u00e4ngeln in kryptografischen Implementierungen und Fehlkonfigurationen bei der Behandlung von Benutzerdaten oder HTTP-Anfragen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen preiszugeben, Dateien und Daten zu manipulieren oder Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "T037109", "T037110", "T039412" ] }, "release_date": "2024-08-26T22:00:00.000+00:00", "title": "CVE-2019-20444" }, { "cve": "CVE-2019-20445", "notes": [ { "category": "description", "text": "Es gibt mehrere Schwachstellen in Red Hat JBoss Enterprise Application Platform auf Red Hat Enterprise Linux. Diese Schwachstellen bestehen in verschiedenen Komponenten wie Undertow, Log4j und HTTP/2 und FasterXML aufgrund einer Reihe von sicherheitsrelevanten Problemen wie unsachgem\u00e4\u00dfer Eingabevalidierung, unzureichenden Zugriffskontrollen, M\u00e4ngeln in kryptografischen Implementierungen und Fehlkonfigurationen bei der Behandlung von Benutzerdaten oder HTTP-Anfragen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen preiszugeben, Dateien und Daten zu manipulieren oder Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "T037109", "T037110", "T039412" ] }, "release_date": "2024-08-26T22:00:00.000+00:00", "title": "CVE-2019-20445" }, { "cve": "CVE-2019-9511", "notes": [ { "category": "description", "text": "Es gibt mehrere Schwachstellen in Red Hat JBoss Enterprise Application Platform auf Red Hat Enterprise Linux. Diese Schwachstellen bestehen in verschiedenen Komponenten wie Undertow, Log4j und HTTP/2 und FasterXML aufgrund einer Reihe von sicherheitsrelevanten Problemen wie unsachgem\u00e4\u00dfer Eingabevalidierung, unzureichenden Zugriffskontrollen, M\u00e4ngeln in kryptografischen Implementierungen und Fehlkonfigurationen bei der Behandlung von Benutzerdaten oder HTTP-Anfragen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen preiszugeben, Dateien und Daten zu manipulieren oder Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "T037109", "T037110", "T039412" ] }, "release_date": "2024-08-26T22:00:00.000+00:00", "title": "CVE-2019-9511" }, { "cve": "CVE-2019-9512", "notes": [ { "category": "description", "text": "Es gibt mehrere Schwachstellen in Red Hat JBoss Enterprise Application Platform auf Red Hat Enterprise Linux. Diese Schwachstellen bestehen in verschiedenen Komponenten wie Undertow, Log4j und HTTP/2 und FasterXML aufgrund einer Reihe von sicherheitsrelevanten Problemen wie unsachgem\u00e4\u00dfer Eingabevalidierung, unzureichenden Zugriffskontrollen, M\u00e4ngeln in kryptografischen Implementierungen und Fehlkonfigurationen bei der Behandlung von Benutzerdaten oder HTTP-Anfragen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen preiszugeben, Dateien und Daten zu manipulieren oder Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "T037109", "T037110", "T039412" ] }, "release_date": "2024-08-26T22:00:00.000+00:00", "title": "CVE-2019-9512" }, { "cve": "CVE-2019-9514", "notes": [ { "category": "description", "text": "Es gibt mehrere Schwachstellen in Red Hat JBoss Enterprise Application Platform auf Red Hat Enterprise Linux. Diese Schwachstellen bestehen in verschiedenen Komponenten wie Undertow, Log4j und HTTP/2 und FasterXML aufgrund einer Reihe von sicherheitsrelevanten Problemen wie unsachgem\u00e4\u00dfer Eingabevalidierung, unzureichenden Zugriffskontrollen, M\u00e4ngeln in kryptografischen Implementierungen und Fehlkonfigurationen bei der Behandlung von Benutzerdaten oder HTTP-Anfragen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen preiszugeben, Dateien und Daten zu manipulieren oder Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "T037109", "T037110", "T039412" ] }, "release_date": "2024-08-26T22:00:00.000+00:00", "title": "CVE-2019-9514" }, { "cve": "CVE-2019-9515", "notes": [ { "category": "description", "text": "Es gibt mehrere Schwachstellen in Red Hat JBoss Enterprise Application Platform auf Red Hat Enterprise Linux. Diese Schwachstellen bestehen in verschiedenen Komponenten wie Undertow, Log4j und HTTP/2 und FasterXML aufgrund einer Reihe von sicherheitsrelevanten Problemen wie unsachgem\u00e4\u00dfer Eingabevalidierung, unzureichenden Zugriffskontrollen, M\u00e4ngeln in kryptografischen Implementierungen und Fehlkonfigurationen bei der Behandlung von Benutzerdaten oder HTTP-Anfragen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen preiszugeben, Dateien und Daten zu manipulieren oder Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "T037109", "T037110", "T039412" ] }, "release_date": "2024-08-26T22:00:00.000+00:00", "title": "CVE-2019-9515" }, { "cve": "CVE-2020-1710", "notes": [ { "category": "description", "text": "Es gibt mehrere Schwachstellen in Red Hat JBoss Enterprise Application Platform auf Red Hat Enterprise Linux. Diese Schwachstellen bestehen in verschiedenen Komponenten wie Undertow, Log4j und HTTP/2 und FasterXML aufgrund einer Reihe von sicherheitsrelevanten Problemen wie unsachgem\u00e4\u00dfer Eingabevalidierung, unzureichenden Zugriffskontrollen, M\u00e4ngeln in kryptografischen Implementierungen und Fehlkonfigurationen bei der Behandlung von Benutzerdaten oder HTTP-Anfragen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen preiszugeben, Dateien und Daten zu manipulieren oder Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "T037109", "T037110", "T039412" ] }, "release_date": "2024-08-26T22:00:00.000+00:00", "title": "CVE-2020-1710" }, { "cve": "CVE-2020-1745", "notes": [ { "category": "description", "text": "Es gibt mehrere Schwachstellen in Red Hat JBoss Enterprise Application Platform auf Red Hat Enterprise Linux. Diese Schwachstellen bestehen in verschiedenen Komponenten wie Undertow, Log4j und HTTP/2 und FasterXML aufgrund einer Reihe von sicherheitsrelevanten Problemen wie unsachgem\u00e4\u00dfer Eingabevalidierung, unzureichenden Zugriffskontrollen, M\u00e4ngeln in kryptografischen Implementierungen und Fehlkonfigurationen bei der Behandlung von Benutzerdaten oder HTTP-Anfragen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen preiszugeben, Dateien und Daten zu manipulieren oder Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "T037109", "T037110", "T039412" ] }, "release_date": "2024-08-26T22:00:00.000+00:00", "title": "CVE-2020-1745" }, { "cve": "CVE-2020-1757", "notes": [ { "category": "description", "text": "Es gibt mehrere Schwachstellen in Red Hat JBoss Enterprise Application Platform auf Red Hat Enterprise Linux. Diese Schwachstellen bestehen in verschiedenen Komponenten wie Undertow, Log4j und HTTP/2 und FasterXML aufgrund einer Reihe von sicherheitsrelevanten Problemen wie unsachgem\u00e4\u00dfer Eingabevalidierung, unzureichenden Zugriffskontrollen, M\u00e4ngeln in kryptografischen Implementierungen und Fehlkonfigurationen bei der Behandlung von Benutzerdaten oder HTTP-Anfragen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen preiszugeben, Dateien und Daten zu manipulieren oder Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "T037109", "T037110", "T039412" ] }, "release_date": "2024-08-26T22:00:00.000+00:00", "title": "CVE-2020-1757" }, { "cve": "CVE-2021-4104", "notes": [ { "category": "description", "text": "Es gibt mehrere Schwachstellen in Red Hat JBoss Enterprise Application Platform auf Red Hat Enterprise Linux. Diese Schwachstellen bestehen in verschiedenen Komponenten wie Undertow, Log4j und HTTP/2 und FasterXML aufgrund einer Reihe von sicherheitsrelevanten Problemen wie unsachgem\u00e4\u00dfer Eingabevalidierung, unzureichenden Zugriffskontrollen, M\u00e4ngeln in kryptografischen Implementierungen und Fehlkonfigurationen bei der Behandlung von Benutzerdaten oder HTTP-Anfragen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen preiszugeben, Dateien und Daten zu manipulieren oder Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "T037109", "T037110", "T039412" ] }, "release_date": "2024-08-26T22:00:00.000+00:00", "title": "CVE-2021-4104" }, { "cve": "CVE-2022-23302", "notes": [ { "category": "description", "text": "Es gibt mehrere Schwachstellen in Red Hat JBoss Enterprise Application Platform auf Red Hat Enterprise Linux. Diese Schwachstellen bestehen in verschiedenen Komponenten wie Undertow, Log4j und HTTP/2 und FasterXML aufgrund einer Reihe von sicherheitsrelevanten Problemen wie unsachgem\u00e4\u00dfer Eingabevalidierung, unzureichenden Zugriffskontrollen, M\u00e4ngeln in kryptografischen Implementierungen und Fehlkonfigurationen bei der Behandlung von Benutzerdaten oder HTTP-Anfragen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen preiszugeben, Dateien und Daten zu manipulieren oder Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "T037109", "T037110", "T039412" ] }, "release_date": "2024-08-26T22:00:00.000+00:00", "title": "CVE-2022-23302" }, { "cve": "CVE-2022-23305", "notes": [ { "category": "description", "text": "Es gibt mehrere Schwachstellen in Red Hat JBoss Enterprise Application Platform auf Red Hat Enterprise Linux. Diese Schwachstellen bestehen in verschiedenen Komponenten wie Undertow, Log4j und HTTP/2 und FasterXML aufgrund einer Reihe von sicherheitsrelevanten Problemen wie unsachgem\u00e4\u00dfer Eingabevalidierung, unzureichenden Zugriffskontrollen, M\u00e4ngeln in kryptografischen Implementierungen und Fehlkonfigurationen bei der Behandlung von Benutzerdaten oder HTTP-Anfragen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen preiszugeben, Dateien und Daten zu manipulieren oder Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "T037109", "T037110", "T039412" ] }, "release_date": "2024-08-26T22:00:00.000+00:00", "title": "CVE-2022-23305" }, { "cve": "CVE-2022-23307", "notes": [ { "category": "description", "text": "Es gibt mehrere Schwachstellen in Red Hat JBoss Enterprise Application Platform auf Red Hat Enterprise Linux. Diese Schwachstellen bestehen in verschiedenen Komponenten wie Undertow, Log4j und HTTP/2 und FasterXML aufgrund einer Reihe von sicherheitsrelevanten Problemen wie unsachgem\u00e4\u00dfer Eingabevalidierung, unzureichenden Zugriffskontrollen, M\u00e4ngeln in kryptografischen Implementierungen und Fehlkonfigurationen bei der Behandlung von Benutzerdaten oder HTTP-Anfragen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen preiszugeben, Dateien und Daten zu manipulieren oder Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "T037109", "T037110", "T039412" ] }, "release_date": "2024-08-26T22:00:00.000+00:00", "title": "CVE-2022-23307" } ] }
WID-SEC-W-2024-1926
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "JBoss Enterprise Application Platform ist eine skalierbare Plattform f\u00fcr Java-Anwendungen, inklusive JBoss Application Server, JBoss Hibernate und Boss Seam.\r\nRed Hat Enterprise Linux (RHEL) ist eine popul\u00e4re Linux-Distribution.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in Red Hat JBoss Enterprise Application Platform auf Red Hat Enterprise Linux ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen preiszugeben, Dateien und Daten zu manipulieren oder Sicherheitsma\u00dfnahmen zu umgehen.", "title": "Angriff" }, { "category": "general", "text": "- Sonstiges\n- UNIX", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "[email protected]", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-1926 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1926.json" }, { "category": "self", "summary": "WID-SEC-2024-1926 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1926" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:5856 vom 2024-08-26", "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:10207 vom 2024-11-25", "url": "https://access.redhat.com/errata/RHSA-2024:10207" } ], "source_lang": "en-US", "title": "Red Hat JBoss Enterprise Application Platform: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-11-24T23:00:00.000+00:00", "generator": { "date": "2024-11-25T09:11:57.787+00:00", "engine": { "name": "BSI-WID", "version": "1.3.8" } }, "id": "WID-SEC-W-2024-1926", "initial_release_date": "2024-08-26T22:00:00.000+00:00", "revision_history": [ { "date": "2024-08-26T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-11-24T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Red Hat aufgenommen" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "7", "product": { "name": "Red Hat Enterprise Linux 7", "product_id": "T037110", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7" } } } ], "category": "product_name", "name": "Enterprise Linux" }, { "branches": [ { "category": "product_version_range", "name": "\u003c7.1.7", "product": { "name": "Red Hat JBoss Enterprise Application Platform \u003c7.1.7", "product_id": "T037109" } }, { "category": "product_version", "name": "7.1.7", "product": { "name": "Red Hat JBoss Enterprise Application Platform 7.1.7", "product_id": "T037109-fixed", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:7.1.7" } } }, { "category": "product_version_range", "name": "\u003c7.3.11", "product": { "name": "Red Hat JBoss Enterprise Application Platform \u003c7.3.11", "product_id": "T039412" } }, { "category": "product_version", "name": "7.3.11", "product": { "name": "Red Hat JBoss Enterprise Application Platform 7.3.11", "product_id": "T039412-fixed", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:7.3.11" } } } ], "category": "product_name", "name": "JBoss Enterprise Application Platform" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-10086", "notes": [ { "category": "description", "text": "Es gibt mehrere Schwachstellen in Red Hat JBoss Enterprise Application Platform auf Red Hat Enterprise Linux. Diese Schwachstellen bestehen in verschiedenen Komponenten wie Undertow, Log4j und HTTP/2 und FasterXML aufgrund einer Reihe von sicherheitsrelevanten Problemen wie unsachgem\u00e4\u00dfer Eingabevalidierung, unzureichenden Zugriffskontrollen, M\u00e4ngeln in kryptografischen Implementierungen und Fehlkonfigurationen bei der Behandlung von Benutzerdaten oder HTTP-Anfragen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen preiszugeben, Dateien und Daten zu manipulieren oder Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "T037109", "T037110", "T039412" ] }, "release_date": "2024-08-26T22:00:00.000+00:00", "title": "CVE-2019-10086" }, { "cve": "CVE-2019-10174", "notes": [ { "category": "description", "text": "Es gibt mehrere Schwachstellen in Red Hat JBoss Enterprise Application Platform auf Red Hat Enterprise Linux. Diese Schwachstellen bestehen in verschiedenen Komponenten wie Undertow, Log4j und HTTP/2 und FasterXML aufgrund einer Reihe von sicherheitsrelevanten Problemen wie unsachgem\u00e4\u00dfer Eingabevalidierung, unzureichenden Zugriffskontrollen, M\u00e4ngeln in kryptografischen Implementierungen und Fehlkonfigurationen bei der Behandlung von Benutzerdaten oder HTTP-Anfragen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen preiszugeben, Dateien und Daten zu manipulieren oder Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "T037109", "T037110", "T039412" ] }, "release_date": "2024-08-26T22:00:00.000+00:00", "title": "CVE-2019-10174" }, { "cve": "CVE-2019-12384", "notes": [ { "category": "description", "text": "Es gibt mehrere Schwachstellen in Red Hat JBoss Enterprise Application Platform auf Red Hat Enterprise Linux. Diese Schwachstellen bestehen in verschiedenen Komponenten wie Undertow, Log4j und HTTP/2 und FasterXML aufgrund einer Reihe von sicherheitsrelevanten Problemen wie unsachgem\u00e4\u00dfer Eingabevalidierung, unzureichenden Zugriffskontrollen, M\u00e4ngeln in kryptografischen Implementierungen und Fehlkonfigurationen bei der Behandlung von Benutzerdaten oder HTTP-Anfragen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen preiszugeben, Dateien und Daten zu manipulieren oder Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "T037109", "T037110", "T039412" ] }, "release_date": "2024-08-26T22:00:00.000+00:00", "title": "CVE-2019-12384" }, { "cve": "CVE-2019-14379", "notes": [ { "category": "description", "text": "Es gibt mehrere Schwachstellen in Red Hat JBoss Enterprise Application Platform auf Red Hat Enterprise Linux. Diese Schwachstellen bestehen in verschiedenen Komponenten wie Undertow, Log4j und HTTP/2 und FasterXML aufgrund einer Reihe von sicherheitsrelevanten Problemen wie unsachgem\u00e4\u00dfer Eingabevalidierung, unzureichenden Zugriffskontrollen, M\u00e4ngeln in kryptografischen Implementierungen und Fehlkonfigurationen bei der Behandlung von Benutzerdaten oder HTTP-Anfragen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen preiszugeben, Dateien und Daten zu manipulieren oder Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "T037109", "T037110", "T039412" ] }, "release_date": "2024-08-26T22:00:00.000+00:00", "title": "CVE-2019-14379" }, { "cve": "CVE-2019-14843", "notes": [ { "category": "description", "text": "Es gibt mehrere Schwachstellen in Red Hat JBoss Enterprise Application Platform auf Red Hat Enterprise Linux. Diese Schwachstellen bestehen in verschiedenen Komponenten wie Undertow, Log4j und HTTP/2 und FasterXML aufgrund einer Reihe von sicherheitsrelevanten Problemen wie unsachgem\u00e4\u00dfer Eingabevalidierung, unzureichenden Zugriffskontrollen, M\u00e4ngeln in kryptografischen Implementierungen und Fehlkonfigurationen bei der Behandlung von Benutzerdaten oder HTTP-Anfragen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen preiszugeben, Dateien und Daten zu manipulieren oder Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "T037109", "T037110", "T039412" ] }, "release_date": "2024-08-26T22:00:00.000+00:00", "title": "CVE-2019-14843" }, { "cve": "CVE-2019-14888", "notes": [ { "category": "description", "text": "Es gibt mehrere Schwachstellen in Red Hat JBoss Enterprise Application Platform auf Red Hat Enterprise Linux. Diese Schwachstellen bestehen in verschiedenen Komponenten wie Undertow, Log4j und HTTP/2 und FasterXML aufgrund einer Reihe von sicherheitsrelevanten Problemen wie unsachgem\u00e4\u00dfer Eingabevalidierung, unzureichenden Zugriffskontrollen, M\u00e4ngeln in kryptografischen Implementierungen und Fehlkonfigurationen bei der Behandlung von Benutzerdaten oder HTTP-Anfragen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen preiszugeben, Dateien und Daten zu manipulieren oder Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "T037109", "T037110", "T039412" ] }, "release_date": "2024-08-26T22:00:00.000+00:00", "title": "CVE-2019-14888" }, { "cve": "CVE-2019-16869", "notes": [ { "category": "description", "text": "Es gibt mehrere Schwachstellen in Red Hat JBoss Enterprise Application Platform auf Red Hat Enterprise Linux. Diese Schwachstellen bestehen in verschiedenen Komponenten wie Undertow, Log4j und HTTP/2 und FasterXML aufgrund einer Reihe von sicherheitsrelevanten Problemen wie unsachgem\u00e4\u00dfer Eingabevalidierung, unzureichenden Zugriffskontrollen, M\u00e4ngeln in kryptografischen Implementierungen und Fehlkonfigurationen bei der Behandlung von Benutzerdaten oder HTTP-Anfragen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen preiszugeben, Dateien und Daten zu manipulieren oder Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "T037109", "T037110", "T039412" ] }, "release_date": "2024-08-26T22:00:00.000+00:00", "title": "CVE-2019-16869" }, { "cve": "CVE-2019-17531", "notes": [ { "category": "description", "text": "Es gibt mehrere Schwachstellen in Red Hat JBoss Enterprise Application Platform auf Red Hat Enterprise Linux. Diese Schwachstellen bestehen in verschiedenen Komponenten wie Undertow, Log4j und HTTP/2 und FasterXML aufgrund einer Reihe von sicherheitsrelevanten Problemen wie unsachgem\u00e4\u00dfer Eingabevalidierung, unzureichenden Zugriffskontrollen, M\u00e4ngeln in kryptografischen Implementierungen und Fehlkonfigurationen bei der Behandlung von Benutzerdaten oder HTTP-Anfragen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen preiszugeben, Dateien und Daten zu manipulieren oder Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "T037109", "T037110", "T039412" ] }, "release_date": "2024-08-26T22:00:00.000+00:00", "title": "CVE-2019-17531" }, { "cve": "CVE-2019-20444", "notes": [ { "category": "description", "text": "Es gibt mehrere Schwachstellen in Red Hat JBoss Enterprise Application Platform auf Red Hat Enterprise Linux. Diese Schwachstellen bestehen in verschiedenen Komponenten wie Undertow, Log4j und HTTP/2 und FasterXML aufgrund einer Reihe von sicherheitsrelevanten Problemen wie unsachgem\u00e4\u00dfer Eingabevalidierung, unzureichenden Zugriffskontrollen, M\u00e4ngeln in kryptografischen Implementierungen und Fehlkonfigurationen bei der Behandlung von Benutzerdaten oder HTTP-Anfragen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen preiszugeben, Dateien und Daten zu manipulieren oder Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "T037109", "T037110", "T039412" ] }, "release_date": "2024-08-26T22:00:00.000+00:00", "title": "CVE-2019-20444" }, { "cve": "CVE-2019-20445", "notes": [ { "category": "description", "text": "Es gibt mehrere Schwachstellen in Red Hat JBoss Enterprise Application Platform auf Red Hat Enterprise Linux. Diese Schwachstellen bestehen in verschiedenen Komponenten wie Undertow, Log4j und HTTP/2 und FasterXML aufgrund einer Reihe von sicherheitsrelevanten Problemen wie unsachgem\u00e4\u00dfer Eingabevalidierung, unzureichenden Zugriffskontrollen, M\u00e4ngeln in kryptografischen Implementierungen und Fehlkonfigurationen bei der Behandlung von Benutzerdaten oder HTTP-Anfragen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen preiszugeben, Dateien und Daten zu manipulieren oder Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "T037109", "T037110", "T039412" ] }, "release_date": "2024-08-26T22:00:00.000+00:00", "title": "CVE-2019-20445" }, { "cve": "CVE-2019-9511", "notes": [ { "category": "description", "text": "Es gibt mehrere Schwachstellen in Red Hat JBoss Enterprise Application Platform auf Red Hat Enterprise Linux. Diese Schwachstellen bestehen in verschiedenen Komponenten wie Undertow, Log4j und HTTP/2 und FasterXML aufgrund einer Reihe von sicherheitsrelevanten Problemen wie unsachgem\u00e4\u00dfer Eingabevalidierung, unzureichenden Zugriffskontrollen, M\u00e4ngeln in kryptografischen Implementierungen und Fehlkonfigurationen bei der Behandlung von Benutzerdaten oder HTTP-Anfragen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen preiszugeben, Dateien und Daten zu manipulieren oder Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "T037109", "T037110", "T039412" ] }, "release_date": "2024-08-26T22:00:00.000+00:00", "title": "CVE-2019-9511" }, { "cve": "CVE-2019-9512", "notes": [ { "category": "description", "text": "Es gibt mehrere Schwachstellen in Red Hat JBoss Enterprise Application Platform auf Red Hat Enterprise Linux. Diese Schwachstellen bestehen in verschiedenen Komponenten wie Undertow, Log4j und HTTP/2 und FasterXML aufgrund einer Reihe von sicherheitsrelevanten Problemen wie unsachgem\u00e4\u00dfer Eingabevalidierung, unzureichenden Zugriffskontrollen, M\u00e4ngeln in kryptografischen Implementierungen und Fehlkonfigurationen bei der Behandlung von Benutzerdaten oder HTTP-Anfragen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen preiszugeben, Dateien und Daten zu manipulieren oder Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "T037109", "T037110", "T039412" ] }, "release_date": "2024-08-26T22:00:00.000+00:00", "title": "CVE-2019-9512" }, { "cve": "CVE-2019-9514", "notes": [ { "category": "description", "text": "Es gibt mehrere Schwachstellen in Red Hat JBoss Enterprise Application Platform auf Red Hat Enterprise Linux. Diese Schwachstellen bestehen in verschiedenen Komponenten wie Undertow, Log4j und HTTP/2 und FasterXML aufgrund einer Reihe von sicherheitsrelevanten Problemen wie unsachgem\u00e4\u00dfer Eingabevalidierung, unzureichenden Zugriffskontrollen, M\u00e4ngeln in kryptografischen Implementierungen und Fehlkonfigurationen bei der Behandlung von Benutzerdaten oder HTTP-Anfragen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen preiszugeben, Dateien und Daten zu manipulieren oder Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "T037109", "T037110", "T039412" ] }, "release_date": "2024-08-26T22:00:00.000+00:00", "title": "CVE-2019-9514" }, { "cve": "CVE-2019-9515", "notes": [ { "category": "description", "text": "Es gibt mehrere Schwachstellen in Red Hat JBoss Enterprise Application Platform auf Red Hat Enterprise Linux. Diese Schwachstellen bestehen in verschiedenen Komponenten wie Undertow, Log4j und HTTP/2 und FasterXML aufgrund einer Reihe von sicherheitsrelevanten Problemen wie unsachgem\u00e4\u00dfer Eingabevalidierung, unzureichenden Zugriffskontrollen, M\u00e4ngeln in kryptografischen Implementierungen und Fehlkonfigurationen bei der Behandlung von Benutzerdaten oder HTTP-Anfragen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen preiszugeben, Dateien und Daten zu manipulieren oder Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "T037109", "T037110", "T039412" ] }, "release_date": "2024-08-26T22:00:00.000+00:00", "title": "CVE-2019-9515" }, { "cve": "CVE-2020-1710", "notes": [ { "category": "description", "text": "Es gibt mehrere Schwachstellen in Red Hat JBoss Enterprise Application Platform auf Red Hat Enterprise Linux. Diese Schwachstellen bestehen in verschiedenen Komponenten wie Undertow, Log4j und HTTP/2 und FasterXML aufgrund einer Reihe von sicherheitsrelevanten Problemen wie unsachgem\u00e4\u00dfer Eingabevalidierung, unzureichenden Zugriffskontrollen, M\u00e4ngeln in kryptografischen Implementierungen und Fehlkonfigurationen bei der Behandlung von Benutzerdaten oder HTTP-Anfragen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen preiszugeben, Dateien und Daten zu manipulieren oder Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "T037109", "T037110", "T039412" ] }, "release_date": "2024-08-26T22:00:00.000+00:00", "title": "CVE-2020-1710" }, { "cve": "CVE-2020-1745", "notes": [ { "category": "description", "text": "Es gibt mehrere Schwachstellen in Red Hat JBoss Enterprise Application Platform auf Red Hat Enterprise Linux. Diese Schwachstellen bestehen in verschiedenen Komponenten wie Undertow, Log4j und HTTP/2 und FasterXML aufgrund einer Reihe von sicherheitsrelevanten Problemen wie unsachgem\u00e4\u00dfer Eingabevalidierung, unzureichenden Zugriffskontrollen, M\u00e4ngeln in kryptografischen Implementierungen und Fehlkonfigurationen bei der Behandlung von Benutzerdaten oder HTTP-Anfragen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen preiszugeben, Dateien und Daten zu manipulieren oder Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "T037109", "T037110", "T039412" ] }, "release_date": "2024-08-26T22:00:00.000+00:00", "title": "CVE-2020-1745" }, { "cve": "CVE-2020-1757", "notes": [ { "category": "description", "text": "Es gibt mehrere Schwachstellen in Red Hat JBoss Enterprise Application Platform auf Red Hat Enterprise Linux. Diese Schwachstellen bestehen in verschiedenen Komponenten wie Undertow, Log4j und HTTP/2 und FasterXML aufgrund einer Reihe von sicherheitsrelevanten Problemen wie unsachgem\u00e4\u00dfer Eingabevalidierung, unzureichenden Zugriffskontrollen, M\u00e4ngeln in kryptografischen Implementierungen und Fehlkonfigurationen bei der Behandlung von Benutzerdaten oder HTTP-Anfragen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen preiszugeben, Dateien und Daten zu manipulieren oder Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "T037109", "T037110", "T039412" ] }, "release_date": "2024-08-26T22:00:00.000+00:00", "title": "CVE-2020-1757" }, { "cve": "CVE-2021-4104", "notes": [ { "category": "description", "text": "Es gibt mehrere Schwachstellen in Red Hat JBoss Enterprise Application Platform auf Red Hat Enterprise Linux. Diese Schwachstellen bestehen in verschiedenen Komponenten wie Undertow, Log4j und HTTP/2 und FasterXML aufgrund einer Reihe von sicherheitsrelevanten Problemen wie unsachgem\u00e4\u00dfer Eingabevalidierung, unzureichenden Zugriffskontrollen, M\u00e4ngeln in kryptografischen Implementierungen und Fehlkonfigurationen bei der Behandlung von Benutzerdaten oder HTTP-Anfragen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen preiszugeben, Dateien und Daten zu manipulieren oder Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "T037109", "T037110", "T039412" ] }, "release_date": "2024-08-26T22:00:00.000+00:00", "title": "CVE-2021-4104" }, { "cve": "CVE-2022-23302", "notes": [ { "category": "description", "text": "Es gibt mehrere Schwachstellen in Red Hat JBoss Enterprise Application Platform auf Red Hat Enterprise Linux. Diese Schwachstellen bestehen in verschiedenen Komponenten wie Undertow, Log4j und HTTP/2 und FasterXML aufgrund einer Reihe von sicherheitsrelevanten Problemen wie unsachgem\u00e4\u00dfer Eingabevalidierung, unzureichenden Zugriffskontrollen, M\u00e4ngeln in kryptografischen Implementierungen und Fehlkonfigurationen bei der Behandlung von Benutzerdaten oder HTTP-Anfragen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen preiszugeben, Dateien und Daten zu manipulieren oder Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "T037109", "T037110", "T039412" ] }, "release_date": "2024-08-26T22:00:00.000+00:00", "title": "CVE-2022-23302" }, { "cve": "CVE-2022-23305", "notes": [ { "category": "description", "text": "Es gibt mehrere Schwachstellen in Red Hat JBoss Enterprise Application Platform auf Red Hat Enterprise Linux. Diese Schwachstellen bestehen in verschiedenen Komponenten wie Undertow, Log4j und HTTP/2 und FasterXML aufgrund einer Reihe von sicherheitsrelevanten Problemen wie unsachgem\u00e4\u00dfer Eingabevalidierung, unzureichenden Zugriffskontrollen, M\u00e4ngeln in kryptografischen Implementierungen und Fehlkonfigurationen bei der Behandlung von Benutzerdaten oder HTTP-Anfragen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen preiszugeben, Dateien und Daten zu manipulieren oder Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "T037109", "T037110", "T039412" ] }, "release_date": "2024-08-26T22:00:00.000+00:00", "title": "CVE-2022-23305" }, { "cve": "CVE-2022-23307", "notes": [ { "category": "description", "text": "Es gibt mehrere Schwachstellen in Red Hat JBoss Enterprise Application Platform auf Red Hat Enterprise Linux. Diese Schwachstellen bestehen in verschiedenen Komponenten wie Undertow, Log4j und HTTP/2 und FasterXML aufgrund einer Reihe von sicherheitsrelevanten Problemen wie unsachgem\u00e4\u00dfer Eingabevalidierung, unzureichenden Zugriffskontrollen, M\u00e4ngeln in kryptografischen Implementierungen und Fehlkonfigurationen bei der Behandlung von Benutzerdaten oder HTTP-Anfragen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen preiszugeben, Dateien und Daten zu manipulieren oder Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "T037109", "T037110", "T039412" ] }, "release_date": "2024-08-26T22:00:00.000+00:00", "title": "CVE-2022-23307" } ] }
wid-sec-w-2022-0770
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "IBM DB2 ist ein relationales Datenbanksystem (RDBS) von IBM.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in IBM DB2 ausnutzen, um seine Privilegien zu erh\u00f6hen oder einen Denial of Service zu verursachen", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "[email protected]", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-0770 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2020/wid-sec-w-2022-0770.json" }, { "category": "self", "summary": "WID-SEC-2022-0770 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0770" }, { "category": "external", "summary": "IBM Security Bulletin 6198380 vom 2020-04-23", "url": "https://www.ibm.com/support/pages/node/6198380" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:2603 vom 2020-06-17", "url": "https://access.redhat.com/errata/RHSA-2020:2603" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:4807 vom 2020-11-04", "url": "https://access.redhat.com/errata/RHSA-2020:4807" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:3225 vom 2021-08-20", "url": "https://access.redhat.com/errata/RHSA-2021:3225" }, { "category": "external", "summary": "Hitachi Vulnerability Information HITACHI-SEC-2022-115 vom 2022-05-27", "url": "https://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/hitachi-sec-2022-115/index.html" }, { "category": "external", "summary": "IBM Security Bulletin 6605881 vom 2022-07-21", "url": "https://www.ibm.com/blogs/psirt/security-bulletin-multiple-security-vulnerabilities-have-been-identified-in-ibm-db2-shipped-with-ibm-puredata-system-for-operational-analytics/" }, { "category": "external", "summary": "Dell Security Advisory DSA-2024-070 vom 2024-02-03", "url": "https://www.dell.com/support/kbdoc/000221770/dsa-2024-=" }, { "category": "external", "summary": "Hitachi Vulnerability Information HITACHI-SEC-2023-144 vom 2023-10-03", "url": "https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2023-144/index.html" }, { "category": "external", "summary": "IBM Security Bulletin 7153639 vom 2024-05-17", "url": "https://www.ibm.com/support/pages/node/7153639" } ], "source_lang": "en-US", "title": "IBM DB2: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-05-16T22:00:00.000+00:00", "generator": { "date": "2024-08-15T17:32:05.856+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2022-0770", "initial_release_date": "2020-04-23T22:00:00.000+00:00", "revision_history": [ { "date": "2020-04-23T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2020-06-17T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-11-03T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-08-19T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-05-26T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von HITACHI aufgenommen" }, { "date": "2022-07-20T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2023-10-03T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von HITACHI aufgenommen" }, { "date": "2024-02-04T23:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Dell aufgenommen" }, { "date": "2024-05-16T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von IBM aufgenommen" } ], "status": "final", "version": "9" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "EMC Avamar", "product": { "name": "EMC Avamar", "product_id": "T014381", "product_identification_helper": { "cpe": "cpe:/a:emc:avamar:-" } } } ], "category": "vendor", "name": "EMC" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "Hitachi Ops Center", "product": { "name": "Hitachi Ops Center", "product_id": "T017562", "product_identification_helper": { "cpe": "cpe:/a:hitachi:ops_center:-" } } }, { "category": "product_version_range", "name": "\u003cAnalyzer 10.9.3-00", "product": { "name": "Hitachi Ops Center \u003cAnalyzer 10.9.3-00", "product_id": "T030196" } }, { "category": "product_version_range", "name": "\u003cViewpoint 10.9.3-00", "product": { "name": "Hitachi Ops Center \u003cViewpoint 10.9.3-00", "product_id": "T030197" } } ], "category": "product_name", "name": "Ops Center" } ], "category": "vendor", "name": "Hitachi" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "11.1", "product": { "name": "IBM DB2 11.1", "product_id": "342000", "product_identification_helper": { "cpe": "cpe:/a:ibm:db2:11.1" } } }, { "category": "product_version", "name": "11.5", "product": { "name": "IBM DB2 11.5", "product_id": "695419", "product_identification_helper": { "cpe": "cpe:/a:ibm:db2:11.5" } } } ], "category": "product_name", "name": "DB2" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2009-0001", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2009-0001" }, { "cve": "CVE-2014-0114", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2014-0114" }, { "cve": "CVE-2014-0193", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2014-0193" }, { "cve": "CVE-2014-3488", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2014-3488" }, { "cve": "CVE-2015-2156", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2015-2156" }, { "cve": "CVE-2016-2402", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2016-2402" }, { "cve": "CVE-2017-12972", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2017-12972" }, { "cve": "CVE-2017-12973", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2017-12973" }, { "cve": "CVE-2017-12974", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2017-12974" }, { "cve": "CVE-2017-18640", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2017-18640" }, { "cve": "CVE-2017-3734", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2017-3734" }, { "cve": "CVE-2017-5637", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2017-5637" }, { "cve": "CVE-2018-10237", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2018-10237" }, { "cve": "CVE-2018-11771", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2018-11771" }, { "cve": "CVE-2018-8009", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2018-8009" }, { "cve": "CVE-2018-8012", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2018-8012" }, { "cve": "CVE-2019-0201", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2019-0201" }, { "cve": "CVE-2019-10086", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2019-10086" }, { "cve": "CVE-2019-10172", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2019-10172" }, { "cve": "CVE-2019-10202", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2019-10202" }, { "cve": "CVE-2019-12402", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2019-12402" }, { "cve": "CVE-2019-16869", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2019-16869" }, { "cve": "CVE-2019-17195", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2019-17195" }, { "cve": "CVE-2019-17571", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2019-17571" }, { "cve": "CVE-2019-9512", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2019-9512" }, { "cve": "CVE-2019-9514", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2019-9514" }, { "cve": "CVE-2019-9515", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2019-9515" }, { "cve": "CVE-2019-9518", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2019-9518" } ] }
WID-SEC-W-2022-0770
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "IBM DB2 ist ein relationales Datenbanksystem (RDBS) von IBM.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in IBM DB2 ausnutzen, um seine Privilegien zu erh\u00f6hen oder einen Denial of Service zu verursachen", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "[email protected]", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-0770 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2020/wid-sec-w-2022-0770.json" }, { "category": "self", "summary": "WID-SEC-2022-0770 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0770" }, { "category": "external", "summary": "IBM Security Bulletin 6198380 vom 2020-04-23", "url": "https://www.ibm.com/support/pages/node/6198380" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:2603 vom 2020-06-17", "url": "https://access.redhat.com/errata/RHSA-2020:2603" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:4807 vom 2020-11-04", "url": "https://access.redhat.com/errata/RHSA-2020:4807" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:3225 vom 2021-08-20", "url": "https://access.redhat.com/errata/RHSA-2021:3225" }, { "category": "external", "summary": "Hitachi Vulnerability Information HITACHI-SEC-2022-115 vom 2022-05-27", "url": "https://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/hitachi-sec-2022-115/index.html" }, { "category": "external", "summary": "IBM Security Bulletin 6605881 vom 2022-07-21", "url": "https://www.ibm.com/blogs/psirt/security-bulletin-multiple-security-vulnerabilities-have-been-identified-in-ibm-db2-shipped-with-ibm-puredata-system-for-operational-analytics/" }, { "category": "external", "summary": "Dell Security Advisory DSA-2024-070 vom 2024-02-03", "url": "https://www.dell.com/support/kbdoc/000221770/dsa-2024-=" }, { "category": "external", "summary": "Hitachi Vulnerability Information HITACHI-SEC-2023-144 vom 2023-10-03", "url": "https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2023-144/index.html" }, { "category": "external", "summary": "IBM Security Bulletin 7153639 vom 2024-05-17", "url": "https://www.ibm.com/support/pages/node/7153639" } ], "source_lang": "en-US", "title": "IBM DB2: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-05-16T22:00:00.000+00:00", "generator": { "date": "2024-08-15T17:32:05.856+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2022-0770", "initial_release_date": "2020-04-23T22:00:00.000+00:00", "revision_history": [ { "date": "2020-04-23T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2020-06-17T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-11-03T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-08-19T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-05-26T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von HITACHI aufgenommen" }, { "date": "2022-07-20T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2023-10-03T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von HITACHI aufgenommen" }, { "date": "2024-02-04T23:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Dell aufgenommen" }, { "date": "2024-05-16T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von IBM aufgenommen" } ], "status": "final", "version": "9" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "EMC Avamar", "product": { "name": "EMC Avamar", "product_id": "T014381", "product_identification_helper": { "cpe": "cpe:/a:emc:avamar:-" } } } ], "category": "vendor", "name": "EMC" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "Hitachi Ops Center", "product": { "name": "Hitachi Ops Center", "product_id": "T017562", "product_identification_helper": { "cpe": "cpe:/a:hitachi:ops_center:-" } } }, { "category": "product_version_range", "name": "\u003cAnalyzer 10.9.3-00", "product": { "name": "Hitachi Ops Center \u003cAnalyzer 10.9.3-00", "product_id": "T030196" } }, { "category": "product_version_range", "name": "\u003cViewpoint 10.9.3-00", "product": { "name": "Hitachi Ops Center \u003cViewpoint 10.9.3-00", "product_id": "T030197" } } ], "category": "product_name", "name": "Ops Center" } ], "category": "vendor", "name": "Hitachi" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "11.1", "product": { "name": "IBM DB2 11.1", "product_id": "342000", "product_identification_helper": { "cpe": "cpe:/a:ibm:db2:11.1" } } }, { "category": "product_version", "name": "11.5", "product": { "name": "IBM DB2 11.5", "product_id": "695419", "product_identification_helper": { "cpe": "cpe:/a:ibm:db2:11.5" } } } ], "category": "product_name", "name": "DB2" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2009-0001", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2009-0001" }, { "cve": "CVE-2014-0114", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2014-0114" }, { "cve": "CVE-2014-0193", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2014-0193" }, { "cve": "CVE-2014-3488", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2014-3488" }, { "cve": "CVE-2015-2156", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2015-2156" }, { "cve": "CVE-2016-2402", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2016-2402" }, { "cve": "CVE-2017-12972", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2017-12972" }, { "cve": "CVE-2017-12973", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2017-12973" }, { "cve": "CVE-2017-12974", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2017-12974" }, { "cve": "CVE-2017-18640", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2017-18640" }, { "cve": "CVE-2017-3734", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2017-3734" }, { "cve": "CVE-2017-5637", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2017-5637" }, { "cve": "CVE-2018-10237", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2018-10237" }, { "cve": "CVE-2018-11771", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2018-11771" }, { "cve": "CVE-2018-8009", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2018-8009" }, { "cve": "CVE-2018-8012", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2018-8012" }, { "cve": "CVE-2019-0201", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2019-0201" }, { "cve": "CVE-2019-10086", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2019-10086" }, { "cve": "CVE-2019-10172", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2019-10172" }, { "cve": "CVE-2019-10202", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2019-10202" }, { "cve": "CVE-2019-12402", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2019-12402" }, { "cve": "CVE-2019-16869", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2019-16869" }, { "cve": "CVE-2019-17195", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2019-17195" }, { "cve": "CVE-2019-17571", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2019-17571" }, { "cve": "CVE-2019-9512", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2019-9512" }, { "cve": "CVE-2019-9514", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2019-9514" }, { "cve": "CVE-2019-9515", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2019-9515" }, { "cve": "CVE-2019-9518", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2019-9518" } ] }
var-201908-0264
Vulnerability from variot
Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both. Multiple HTTP/2 implementations are vulnerable to a variety of denial-of-service (DoS) attacks. HTTP/2 is the second version of the hypertext transfer protocol, which is mainly used to ensure the communication between the client and the server. A resource management error vulnerability exists in HTTP/2. An attacker could exploit this vulnerability to cause a denial of service. it exists that Twisted incorrectly validated or sanitized certain URIs or HTTP methods. A remote attacker could use this issue to inject invalid characters and possibly perform header injection attacks. (CVE-2019-12387). Description:
Red Hat Decision Manager is an open source decision management platform that combines business rules management, complex event processing, Decision Model & Notation (DMN) execution, and Business Optimizer for solving planning problems. It automates business decisions and makes that logic available to the entire business.
It is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Important: go-toolset:rhel8 security and bug fix update Advisory ID: RHSA-2019:2726-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2019:2726 Issue date: 2019-09-10 CVE Names: CVE-2019-9512 CVE-2019-9514 ==================================================================== 1. Summary:
An update for the go-toolset:rhel8 module is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux AppStream (v. 8) - aarch64, noarch, ppc64le, s390x, x86_64
- Description:
Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.
Security Fix(es):
-
HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)
-
HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
-
Failure trying to conntect to image registry using TLS when buildah is compiled with FIPS mode (BZ#1743169)
-
Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
- Bugs fixed (https://bugzilla.redhat.com/):
1735645 - CVE-2019-9512 HTTP/2: flood using PING frames results in unbounded memory growth 1735744 - CVE-2019-9514 HTTP/2: flood using HEADERS frames results in unbounded memory growth 1743169 - Failure trying to conntect to image registry using TLS when buildah is compiled with FIPS mode [8.0.0.z]
- Package List:
Red Hat Enterprise Linux AppStream (v. 8):
Source: go-toolset-1.11.13-1.module+el8.0.1+4087+d8180914.src.rpm golang-1.11.13-2.module+el8.0.1+4087+d8180914.src.rpm
aarch64: go-toolset-1.11.13-1.module+el8.0.1+4087+d8180914.aarch64.rpm golang-1.11.13-2.module+el8.0.1+4087+d8180914.aarch64.rpm golang-bin-1.11.13-2.module+el8.0.1+4087+d8180914.aarch64.rpm
noarch: golang-docs-1.11.13-2.module+el8.0.1+4087+d8180914.noarch.rpm golang-misc-1.11.13-2.module+el8.0.1+4087+d8180914.noarch.rpm golang-src-1.11.13-2.module+el8.0.1+4087+d8180914.noarch.rpm golang-tests-1.11.13-2.module+el8.0.1+4087+d8180914.noarch.rpm
ppc64le: go-toolset-1.11.13-1.module+el8.0.1+4087+d8180914.ppc64le.rpm golang-1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le.rpm golang-bin-1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le.rpm
s390x: go-toolset-1.11.13-1.module+el8.0.1+4087+d8180914.s390x.rpm golang-1.11.13-2.module+el8.0.1+4087+d8180914.s390x.rpm golang-bin-1.11.13-2.module+el8.0.1+4087+d8180914.s390x.rpm
x86_64: go-toolset-1.11.13-1.module+el8.0.1+4087+d8180914.x86_64.rpm golang-1.11.13-2.module+el8.0.1+4087+d8180914.x86_64.rpm golang-bin-1.11.13-2.module+el8.0.1+4087+d8180914.x86_64.rpm golang-race-1.11.13-2.module+el8.0.1+4087+d8180914.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2019-9512 https://access.redhat.com/security/cve/CVE-2019-9514 https://access.redhat.com/security/updates/classification/#important
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2019 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIVAwUBXXeqD9zjgjWX9erEAQjHCw//fBf/BN7Wxsf+MDtBBRRBzgPGKstVU/e3 GUq9YUtdkUcHdKU/O5mEc9ai16t10nJ58WyClbzcAHgoUaI/9ZqC+g5GS/Y+P7Tm kVSq+qMLQ2/4u3aZtHg+ugjf5nJ6nkCpLgWyZ3wAYP5F3z5GWvCulWo/VM/23806 wtFf3NfHtkpHi9jkm3cxzjx3AVBb/ao/nAjKl1FYwEWoPHB14Q39Y0YzggSqQg6u mHmB+LoHj+jxYQfUm+EmZQ0VIXwMGbmvlpzREMz0Lk9+qoXVsdaTfHNitikVswWO HSbddPTtw9yXDsZPBUtvR7e6tPgQYlf/2LJyT+SpFjmU9LlFhwBVgusk0FCZ7dOU Vqzl9jZqUQPKPzILzyU63eT/P0sC9Uf9w1LCiyForkbXu0dep3e3ShcwC011svXx n38MLdL2nLHn1gPq0F2albE7LqsLqzJgTzBvx3A+zwuxFb4A+COD5jqFP3tr7RIt IgdbXoObXf7rSDnTb9mRLoSEF+otKWt0NRNSKJxQ2ec/dDd/L3ACJPv8uJVdUaNP Rq7hjyll9/KzFU7KHJlSJmGYjbkvx1FtW45FL5ZyuScPgEpDQw3RqXp59Nv83kpJ xMWQXp/R2QccrG9NwfkOMGYULGsfKGmMYt7N+XkODCXP4gpEMz0+fmyBF/NioKbY p88aZTP38Io=6X8m -----END PGP SIGNATURE-----
-- RHSA-announce mailing list [email protected] https://www.redhat.com/mailman/listinfo/rhsa-announce . Description:
Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. Solution:
For OpenShift Container Platform 4.1 see the following documentation, which will be updated shortly for release 4.1.21, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:
https://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-rel ease-notes.html
The fixes are too intrusive to backport to the version in the oldstable distribution (stretch). An upgrade to Debian stable (buster) is recommended instead.
For the stable distribution (buster), these problems have been fixed in version 8.0.2+ds-1+deb10u1.
We recommend that you upgrade your trafficserver packages.
For the detailed security status of trafficserver please refer to its security tracker page at: https://security-tracker.debian.org/tracker/trafficserver
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: [email protected] -----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAl12uUMACgkQEMKTtsN8 TjbP/Q//UvaJG0Gts7+yZcOmkiaVinEtOzN445QNHGGQMKPfR4/hCuY6TrO0aWUM msNVTMwiEgLtXBqjNC2mT7f1UzQjZ76wb7wXAayaTsUsidMqsL9ZkVpzGSLrMBur wrhUpJRbDp/29qBdETP5bpjAp/Q7HMN1d9WbJa1ao2UpG1J2zpB8jQP0UjfVuM8W JwDlgj+Oj7M4CuQgN1A4vtK62f5k8X+d4bZZZSNUqkHKJuNFB1STDrDuZ+5aCPGo h0PYB/NX21T3W6AfGHIRwJda4IsSqRI/UnNIQygRs2QRiSzkGInCmb5KjsXKAiqF SnYLqKlxAcQ/8+zsEUqQKziBrZX6QsIiKFDYRV29KoK3AwDm7s5Q4KHzXGtNX5Mp a0GzAccDa1GpTxzSI8u5Jo60Ygf2ETkpwiyWSUivcFnzASyDCAwNLAwPAWpfARhO 2rE+LIi42dGnGfa2plKt7jvQDBj2hBvRHd8nMT8ugoJCTQCNnHC9X5/RNWPqIZmR XVHQSRTR8BCCnTdRuvXJB3oQyRQZORMqrsYoARm50+J/v2wJ/Q8Wo4kwWXpflDoH SAO10qjWU9Ja5giiQJh9ToJKPfx6sAma77XoaBz0HteCs3uCvyJK5cpmmoMcImyh 3po/YTjSdJRYZI9YjLWT1ZDP6TeueBkIqf07uuT9Kk92VWuyfhs=UFIM -----END PGP SIGNATURE----- . Each of these container images includes gRPC, which has been updated with the below fixes. Description:
AMQ Broker is a high-performance messaging implementation based on ActiveMQ Artemis. It uses an asynchronous journal for fast message persistence, and supports multiple languages, protocols, and platforms. For further information, refer to the release notes linked to in the References section. Solution:
Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.
The References section of this erratum contains a download link (you must log in to download the update). Description:
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (10.16.3)
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201908-0264", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "big-ip local traffic manager", "scope": "lt", "trust": 1.0, "vendor": "f5", "version": "15.0.1.1" }, { "model": "big-ip local traffic manager", "scope": "lt", "trust": 1.0, "vendor": "f5", "version": "13.1.3.2" }, { "model": "traffic server", "scope": "lte", "trust": 1.0, "vendor": "apache", "version": "6.2.3" }, { "model": "traffic server", "scope": "gte", "trust": 1.0, "vendor": "apache", "version": "6.0.0" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "10.0" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "19.04" }, { "model": "enterprise linux eus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "8.1" }, { "model": "big-ip local traffic manager", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "11.6.1" }, { "model": "node.js", "scope": "gte", "trust": 1.0, "vendor": "nodejs", "version": "8.0.0" }, { "model": "enterprise linux server", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.0" }, { "model": "big-ip local traffic manager", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "12.1.0" }, { "model": "big-ip local traffic manager", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "14.1.0" }, { "model": "node.js", "scope": "gte", "trust": 1.0, "vendor": "nodejs", "version": "10.0.0" }, { "model": "traffic server", "scope": "gte", "trust": 1.0, "vendor": "apache", "version": "7.0.0" }, { "model": "graalvm", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "19.2.0" }, { "model": "quay", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "3.0.0" }, { "model": "cloud insights", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "node.js", "scope": "lte", "trust": 1.0, "vendor": "nodejs", "version": "8.8.1" }, { "model": "big-ip local traffic manager", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "15.0.0" }, { "model": "jboss enterprise application platform", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.3.0" }, { "model": "single sign-on", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.3" }, { "model": "web gateway", "scope": "gte", "trust": 1.0, "vendor": "mcafee", "version": "7.7.2.0" }, { "model": "openshift container platform", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "3.10" }, { "model": "openshift container platform", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "3.9" }, { "model": "node.js", "scope": "lt", "trust": 1.0, "vendor": "nodejs", "version": "12.8.1" }, { "model": "fedora", "scope": "eq", "trust": 1.0, "vendor": "fedoraproject", "version": "29" }, { "model": "traffic server", "scope": "lte", "trust": 1.0, "vendor": "apache", "version": "8.0.3" }, { "model": "software collections", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "1.0" }, { "model": "node.js", "scope": "lt", "trust": 1.0, "vendor": "nodejs", "version": "10.16.3" }, { "model": "node.js", "scope": "gte", "trust": 1.0, "vendor": "nodejs", "version": "10.13.0" }, { "model": "vs960hd", "scope": "eq", "trust": 1.0, "vendor": "synology", "version": null }, { "model": "web gateway", "scope": "gte", "trust": 1.0, "vendor": "mcafee", "version": "8.1.0" }, { "model": "fedora", "scope": "eq", "trust": 1.0, "vendor": "fedoraproject", "version": "30" }, { "model": "trident", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "big-ip local traffic manager", "scope": "lt", "trust": 1.0, "vendor": "f5", "version": "11.6.5.1" }, { "model": "big-ip local traffic manager", "scope": "lt", "trust": 1.0, "vendor": "f5", "version": "14.1.2.1" }, { "model": "diskstation manager", "scope": "eq", "trust": 1.0, "vendor": "synology", "version": "6.2" }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.0" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "9.0" }, { "model": "web gateway", "scope": "lt", "trust": 1.0, "vendor": "mcafee", "version": "7.8.2.13" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "18.04" }, { "model": "big-ip local traffic manager", "scope": "lt", "trust": 1.0, "vendor": "f5", "version": "12.1.5.1" }, { "model": "big-ip local traffic manager", "scope": "lt", "trust": 1.0, "vendor": "f5", "version": "14.0.1.1" }, { "model": "node.js", "scope": "lt", "trust": 1.0, "vendor": "nodejs", "version": "8.16.1" }, { "model": "swiftnio", "scope": "lte", "trust": 1.0, "vendor": "apple", "version": "1.4.0" }, { "model": "leap", "scope": "eq", "trust": 1.0, "vendor": "opensuse", "version": "15.0" }, { "model": "skynas", "scope": "eq", "trust": 1.0, "vendor": "synology", "version": null }, { "model": "developer tools", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "1.0" }, { "model": "openshift container platform", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "4.1" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "16.04" }, { "model": "openshift service mesh", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "1.0" }, { "model": "node.js", "scope": "gte", "trust": 1.0, "vendor": "nodejs", "version": "12.0.0" }, { "model": "openstack", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "14" }, { "model": "jboss enterprise application platform", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.2.0" }, { "model": "web gateway", "scope": "gte", "trust": 1.0, "vendor": "mcafee", "version": "7.8.2.0" }, { "model": "openshift container platform", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "3.11" }, { "model": "big-ip local traffic manager", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "13.1.0" }, { "model": "openshift container platform", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "4.2" }, { "model": "enterprise linux", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "8.0" }, { "model": "big-ip local traffic manager", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "14.0.0" }, { "model": "traffic server", "scope": "lte", "trust": 1.0, "vendor": "apache", "version": "7.1.6" }, { "model": "node.js", "scope": "lte", "trust": 1.0, "vendor": "nodejs", "version": "10.12.0" }, { "model": "traffic server", "scope": "gte", "trust": 1.0, "vendor": "apache", "version": "8.0.0" }, { "model": "leap", "scope": "eq", "trust": 1.0, "vendor": "opensuse", "version": "15.1" }, { "model": "web gateway", "scope": "lt", "trust": 1.0, "vendor": "mcafee", "version": "8.2.0" }, { "model": "swiftnio", "scope": "gte", "trust": 1.0, "vendor": "apple", "version": "1.0.0" }, { "model": "jboss core services", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "1.0" }, { "model": "node.js", "scope": "gte", "trust": 1.0, "vendor": "nodejs", "version": "8.9.0" }, { "model": "web gateway", "scope": "lt", "trust": 1.0, "vendor": "mcafee", "version": "7.7.2.24" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "akamai", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "amazon", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "apache traffic server", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "apple", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "cloudflare", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "envoy", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "facebook", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "go programming language", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "litespeed", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "microsoft", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "netty", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "node js", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "synology", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "twisted", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "ubuntu", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "grpc", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "nghttp2", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "nginx", "version": null } ], "sources": [ { "db": "CERT/CC", "id": "VU#605641" }, { "db": "NVD", "id": "CVE-2019-9514" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Red Hat", "sources": [ { "db": "PACKETSTORM", "id": "158650" }, { "db": "PACKETSTORM", "id": "154425" }, { "db": "PACKETSTORM", "id": "155037" }, { "db": "PACKETSTORM", "id": "158651" }, { "db": "PACKETSTORM", "id": "154475" }, { "db": "PACKETSTORM", "id": "156852" }, { "db": "PACKETSTORM", "id": "154663" } ], "trust": 0.7 }, "cve": "CVE-2019-9514", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "[email protected]", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2019-9514", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 1.1, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-160949", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "[email protected]", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2019-9514", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "[email protected]", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2019-9514", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "[email protected]", "id": "CVE-2019-9514", "trust": 1.0, "value": "HIGH" }, { "author": "[email protected]", "id": "CVE-2019-9514", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201908-931", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-160949", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2019-9514", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-160949" }, { "db": "VULMON", "id": "CVE-2019-9514" }, { "db": "CNNVD", "id": "CNNVD-201908-931" }, { "db": "NVD", "id": "CVE-2019-9514" }, { "db": "NVD", "id": "CVE-2019-9514" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both. Multiple HTTP/2 implementations are vulnerable to a variety of denial-of-service (DoS) attacks. HTTP/2 is the second version of the hypertext transfer protocol, which is mainly used to ensure the communication between the client and the server. A resource management error vulnerability exists in HTTP/2. An attacker could exploit this vulnerability to cause a denial of service. it exists that Twisted incorrectly validated or sanitized certain\nURIs or HTTP methods. A remote attacker could use this issue to inject\ninvalid characters and possibly perform header injection attacks. \n(CVE-2019-12387). Description:\n\nRed Hat Decision Manager is an open source decision management platform\nthat combines business rules management, complex event processing, Decision\nModel \u0026 Notation (DMN) execution, and Business Optimizer for solving\nplanning problems. It automates business decisions and makes that logic\navailable to the entire business. \n\nIt is recommended to halt the server by stopping the JBoss Application\nServer process before installing this update; after installing the update,\nrestart the server by starting the JBoss Application Server process. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n==================================================================== \nRed Hat Security Advisory\n\nSynopsis: Important: go-toolset:rhel8 security and bug fix update\nAdvisory ID: RHSA-2019:2726-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://access.redhat.com/errata/RHSA-2019:2726\nIssue date: 2019-09-10\nCVE Names: CVE-2019-9512 CVE-2019-9514\n====================================================================\n1. Summary:\n\nAn update for the go-toolset:rhel8 module is now available for Red Hat\nEnterprise Linux 8. \n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux AppStream (v. 8) - aarch64, noarch, ppc64le, s390x, x86_64\n\n3. Description:\n\nGo Toolset provides the Go programming language tools and libraries. Go is\nalternatively known as golang. \n\nSecurity Fix(es):\n\n* HTTP/2: flood using PING frames results in unbounded memory growth\n(CVE-2019-9512)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth\n(CVE-2019-9514)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section. \n\nBug Fix(es):\n\n* Failure trying to conntect to image registry using TLS when buildah is\ncompiled with FIPS mode (BZ#1743169)\n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1735645 - CVE-2019-9512 HTTP/2: flood using PING frames results in unbounded memory growth\n1735744 - CVE-2019-9514 HTTP/2: flood using HEADERS frames results in unbounded memory growth\n1743169 - Failure trying to conntect to image registry using TLS when buildah is compiled with FIPS mode [8.0.0.z]\n\n6. Package List:\n\nRed Hat Enterprise Linux AppStream (v. 8):\n\nSource:\ngo-toolset-1.11.13-1.module+el8.0.1+4087+d8180914.src.rpm\ngolang-1.11.13-2.module+el8.0.1+4087+d8180914.src.rpm\n\naarch64:\ngo-toolset-1.11.13-1.module+el8.0.1+4087+d8180914.aarch64.rpm\ngolang-1.11.13-2.module+el8.0.1+4087+d8180914.aarch64.rpm\ngolang-bin-1.11.13-2.module+el8.0.1+4087+d8180914.aarch64.rpm\n\nnoarch:\ngolang-docs-1.11.13-2.module+el8.0.1+4087+d8180914.noarch.rpm\ngolang-misc-1.11.13-2.module+el8.0.1+4087+d8180914.noarch.rpm\ngolang-src-1.11.13-2.module+el8.0.1+4087+d8180914.noarch.rpm\ngolang-tests-1.11.13-2.module+el8.0.1+4087+d8180914.noarch.rpm\n\nppc64le:\ngo-toolset-1.11.13-1.module+el8.0.1+4087+d8180914.ppc64le.rpm\ngolang-1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le.rpm\ngolang-bin-1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le.rpm\n\ns390x:\ngo-toolset-1.11.13-1.module+el8.0.1+4087+d8180914.s390x.rpm\ngolang-1.11.13-2.module+el8.0.1+4087+d8180914.s390x.rpm\ngolang-bin-1.11.13-2.module+el8.0.1+4087+d8180914.s390x.rpm\n\nx86_64:\ngo-toolset-1.11.13-1.module+el8.0.1+4087+d8180914.x86_64.rpm\ngolang-1.11.13-2.module+el8.0.1+4087+d8180914.x86_64.rpm\ngolang-bin-1.11.13-2.module+el8.0.1+4087+d8180914.x86_64.rpm\ngolang-race-1.11.13-2.module+el8.0.1+4087+d8180914.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2019-9512\nhttps://access.redhat.com/security/cve/CVE-2019-9514\nhttps://access.redhat.com/security/updates/classification/#important\n\n8. Contact:\n\nThe Red Hat security contact is \[email protected]\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2019 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n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\np88aZTP38Io=6X8m\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\[email protected]\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. Description:\n\nRed Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments. Solution:\n\nFor OpenShift Container Platform 4.1 see the following documentation, which\nwill be updated shortly for release 4.1.21, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-rel\nease-notes.html\n\n5. \n\nThe fixes are too intrusive to backport to the version in the oldstable\ndistribution (stretch). An upgrade to Debian stable (buster) is\nrecommended instead. \n\nFor the stable distribution (buster), these problems have been fixed in\nversion 8.0.2+ds-1+deb10u1. \n\nWe recommend that you upgrade your trafficserver packages. \n\nFor the detailed security status of trafficserver please refer to\nits security tracker page at:\nhttps://security-tracker.debian.org/tracker/trafficserver\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: [email protected]\n-----BEGIN PGP SIGNATURE-----\n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\n3po/YTjSdJRYZI9YjLWT1ZDP6TeueBkIqf07uuT9Kk92VWuyfhs=UFIM\n-----END PGP SIGNATURE-----\n. Each of these container images includes gRPC,\nwhich has been updated with the below fixes. Description:\n\nAMQ Broker is a high-performance messaging implementation based on ActiveMQ\nArtemis. It uses an asynchronous journal for fast message persistence, and\nsupports multiple languages, protocols, and platforms. For further information, refer to the release notes linked to\nin the References section. Solution:\n\nBefore applying the update, back up your existing installation, including\nall applications, configuration files, databases and database settings, and\nso on. \n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Description:\n\nNode.js is a software development platform for building fast and scalable\nnetwork applications in the JavaScript programming language. \n\nThe following packages have been upgraded to a later upstream version:\nnodejs (10.16.3)", "sources": [ { "db": "NVD", "id": "CVE-2019-9514" }, { "db": "CERT/CC", "id": "VU#605641" }, { "db": "VULHUB", "id": "VHN-160949" }, { "db": "VULMON", "id": "CVE-2019-9514" }, { "db": "PACKETSTORM", "id": "168812" }, { "db": "PACKETSTORM", "id": "158650" }, { "db": "PACKETSTORM", "id": "154425" }, { "db": "PACKETSTORM", "id": "155037" }, { "db": "PACKETSTORM", "id": "158651" }, { "db": "PACKETSTORM", "id": "154222" }, { "db": "PACKETSTORM", "id": "154430" }, { "db": "PACKETSTORM", "id": "154475" }, { "db": "PACKETSTORM", "id": "156852" }, { "db": "PACKETSTORM", "id": "154663" } ], "trust": 2.7 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-9514", "trust": 2.8 }, { "db": "CERT/CC", "id": "VU#605641", "trust": 2.6 }, { "db": "MCAFEE", "id": "SB10296", "trust": 1.8 }, { "db": "OPENWALL", "id": "OSS-SECURITY/2019/08/20/1", "trust": 1.8 }, { "db": "OPENWALL", "id": "OSS-SECURITY/2023/10/18/8", "trust": 1.0 }, { "db": "PACKETSTORM", "id": "158651", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201908-931", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "156852", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "155484", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "157214", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "157741", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "155705", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "156209", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "156941", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "158095", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "156628", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "155352", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "155520", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "154135", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "155396", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "155728", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.4238", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.4737", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.4332", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.4324", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.1544", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.1030", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.2619", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.4533", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.0643", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.1766", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.3152", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.1076", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.0994", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.3114", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.3597.2", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.0007", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.4645", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.4596", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.4586", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.0100", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.4788", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.2071", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.4697", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.4484", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.1335", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.1427", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.4368", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.4665", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.0832", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.3597.3", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2022072128", "trust": 0.6 }, { "db": "ICS CERT", "id": "ICSA-19-346-01", "trust": 0.6 }, { "db": "NSFOCUS", "id": "43921", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "158650", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-160949", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2019-9514", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "168812", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "154425", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "155037", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "154222", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "154430", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "154475", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "154663", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#605641" }, { "db": "VULHUB", "id": "VHN-160949" }, { "db": "VULMON", "id": "CVE-2019-9514" }, { "db": "PACKETSTORM", "id": "168812" }, { "db": "PACKETSTORM", "id": "158650" }, { "db": "PACKETSTORM", "id": "154425" }, { "db": "PACKETSTORM", "id": "155037" }, { "db": "PACKETSTORM", "id": "158651" }, { "db": "PACKETSTORM", "id": "154222" }, { "db": "PACKETSTORM", "id": "154430" }, { "db": "PACKETSTORM", "id": "154475" }, { "db": "PACKETSTORM", "id": "156852" }, { "db": "PACKETSTORM", "id": "154663" }, { "db": "CNNVD", "id": "CNNVD-201908-931" }, { "db": "NVD", "id": "CVE-2019-9514" } ] }, "id": "VAR-201908-0264", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-160949" } ], "trust": 0.01 }, "last_update_date": "2024-11-29T21:56:50.615000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HTTP/2 Remedial measures to achieve security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=96615" }, { "title": "Red Hat: Important: container-tools:1.0 security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20194273 - Security Advisory" }, { "title": "Red Hat: Important: go-toolset-1.11 and go-toolset-1.11-golang security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20192682 - Security Advisory" }, { "title": "Red Hat: Important: OpenShift Container Platform 3.11 HTTP/2 security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20193906 - Security Advisory" }, { "title": "Red Hat: Important: Red Hat OpenShift Container Platform 4.1 openshift RPM security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20192661 - Security Advisory" }, { "title": "Red Hat: Important: OpenShift Container Platform 4.2 security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20193245 - Security Advisory" }, { "title": "Red Hat: Important: go-toolset:rhel8 security and bug fix update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20192726 - Security Advisory" }, { "title": "Red Hat: Important: OpenShift Container Platform 4.1 security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20193265 - Security Advisory" }, { "title": "Red Hat: Important: containernetworking-plugins security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20200406 - Security Advisory" }, { "title": "Red Hat: Important: OpenShift Container Platform 4.1.20 golang security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20193131 - Security Advisory" }, { "title": "Red Hat: Important: OpenShift Container Platform 3.9 security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20192769 - Security Advisory" }, { "title": "Debian CVElist Bug Report Logs: golang-1.13: CVE-2019-14809", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=4f1284fb5317a7db524840483ee9db6f" }, { "title": "Red Hat: Important: OpenShift Container Platform 3.10 security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20192690 - Security Advisory" }, { "title": "Red Hat: Important: OpenShift Container Platform 4.1.18 gRPC security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20192861 - Security Advisory" }, { "title": "Red Hat: Important: container-tools:rhel8 security and bug fix update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20194269 - Security Advisory" }, { "title": "Red Hat: CVE-2019-9514", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database\u0026qid=CVE-2019-9514" }, { "title": "Red Hat: Important: Red Hat OpenShift Enterprise 4.1.15 gRPC security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20192766 - Security Advisory" }, { "title": "Red Hat: Important: Red Hat Quay v3.1.1 security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20192966 - Security Advisory" }, { "title": "Red Hat: Important: Red Hat Single Sign-On 7.3.5 security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20194045 - Security Advisory" }, { "title": "Red Hat: Important: Red Hat JBoss Enterprise Application Platform 7.2.5 security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20194021 - Security Advisory" }, { "title": "Red Hat: Important: OpenShift Container Platform 4.1.14 security and bug fix update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20192594 - Security Advisory" }, { "title": "Red Hat: Important: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 6 security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20194018 - Security Advisory" }, { "title": "Debian CVElist Bug Report Logs: CVE-2019-9512 CVE-2019-9514 CVE-2019-9515", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=7cb587dafb04d397dd392a7f09dec1d9" }, { "title": "Debian CVElist Bug Report Logs: CVE-2019-9512 CVE-2019-9514 CVE-2019-9515", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=84ba5eefbc1d57b08d1c61852a12e026" }, { "title": "Amazon Linux AMI: ALAS-2019-1270", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=ALAS-2019-1270" }, { "title": "Debian Security Advisories: DSA-4503-1 golang-1.11 -- security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=99481074beb7ec3119ad722cad3dd9cc" }, { "title": "Debian Security Advisories: DSA-4508-1 h2o -- security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=728a827d177258876055a9107f821dfe" }, { "title": "Red Hat: Important: Red Hat Single Sign-On 7.3.5 security update on RHEL 7", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20194041 - Security Advisory" }, { "title": "Arch Linux Issues: ", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues\u0026qid=CVE-2019-9514" }, { "title": "Red Hat: Important: Red Hat Single Sign-On 7.3.5 security update on RHEL 8", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20194042 - Security Advisory" }, { "title": "Red Hat: Important: Red Hat Single Sign-On 7.3.5 security update on RHEL 6", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20194040 - Security Advisory" }, { "title": "Red Hat: Important: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20194019 - Security Advisory" }, { "title": "Red Hat: Important: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 8 security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20194020 - Security Advisory" }, { "title": "Red Hat: Important: nodejs:10 security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20192925 - Security Advisory" }, { "title": "Red Hat: Important: rh-nodejs8-nodejs security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20192955 - Security Advisory" }, { "title": "Debian Security Advisories: DSA-4520-1 trafficserver -- security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=3b21ecf9ab12cf6e0b56a2ef2ccf56b8" }, { "title": "Red Hat: Important: Red Hat JBoss Fuse/A-MQ 6.3 R14 security and bug fix update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20194352 - Security Advisory" }, { "title": "Red Hat: Important: EAP Continuous Delivery Technical Preview Release 18 security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20202565 - Security Advisory" }, { "title": "Apple: SwiftNIO HTTP/2 1.5.0", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories\u0026qid=39f63f0751cdcda5bff86ad147e8e1d5" }, { "title": "Arch Linux Advisories: [ASA-201908-15] go: multiple issues", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories\u0026qid=ASA-201908-15" }, { "title": "Red Hat: Important: rh-nodejs10-nodejs security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20192939 - Security Advisory" }, { "title": "Ubuntu Security Notice: twisted vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-4308-1" }, { "title": "Arch Linux Advisories: [ASA-201908-16] go-pie: multiple issues", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories\u0026qid=ASA-201908-16" }, { "title": "Red Hat: Important: Red Hat Data Grid 7.3.3 security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20200727 - Security Advisory" }, { "title": "Debian Security Advisories: DSA-4669-1 nodejs -- security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=0919b27d8bf334fac6a8fbea7195b6b0" }, { "title": "Red Hat: Important: Red Hat AMQ Broker 7.4.3 release and security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20201445 - Security Advisory" }, { "title": "Red Hat: Important: Red Hat AMQ Broker 7.6 release and security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20200922 - Security Advisory" }, { "title": "Amazon Linux 2: ALAS2-2019-1272", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2\u0026qid=ALAS2-2019-1272" }, { "title": "Red Hat: Important: Red Hat Fuse 7.6.0 security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20200983 - Security Advisory" }, { "title": "IBM: Security Bulletin: IBM Cloud Transformation Advisor is affected by vulnerabilities in WebSphere Application Server Liberty (CVE-2019-9515, CVE-2019-9518, CVE-2019-9517, CVE-2019-9512, CVE-2019-9514, CVE-2019-9513)", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog\u0026qid=cbf2ee0b22e92590472860fdb3718cab" }, { "title": "Red Hat: Important: Red Hat Process Automation Manager 7.8.0 Security Update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20203197 - Security Advisory" }, { "title": "Red Hat: Important: Red Hat Fuse 7.5.0 security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20193892 - Security Advisory" }, { "title": "Red Hat: Important: Red Hat Decision Manager 7.8.0 Security Update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20203196 - Security Advisory" }, { "title": "IBM: IBM Security Bulletin: Version 8.15.0 of Node.js included in IBM Cloud Event Management 2.3.0 has several security vulnerabilities.", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog\u0026qid=3b9c6b5fbfb51d956856e88dff5a7acd" }, { "title": "IBM: IBM Security Bulletin: Multiple vulnerabilities affect IBM\u00ae SDK for Node.js\u2122 in IBM Cloud", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog\u0026qid=89d19e42a01e098dd5f88e0433d2bb5d" }, { "title": "IBM: IBM Security Bulletin: Node.js vulnerabilities affect IBM Spectrum Control (formerly Tivoli Storage Productivity Center) (CVE-2019-9511, CVE-2019-9512, CVE-2019-9513, CVE-2019-9514, CVE-2019-9515, CVE-2019-9516, CVE-2019-9517, CVE-2019-9518)", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog\u0026qid=5ad9418973cac91ba73c01ad16b1f5a4" }, { "title": "IBM: IBM Security Bulletin: Multiple vulnerabilities in Node.js affect IBM i", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog\u0026qid=247686da02fe524817c1939b0f6b6a5c" }, { "title": "IBM: Security Bulletin: IBM Cloud Transformation Advisor is affected by a Node.js vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog\u0026qid=8f76cfb8f0c5ea84a0bc28705788f854" }, { "title": "IBM: IBM Security Bulletin: Multiple vulnerabilities in Node.js affect IBM Cloud App Management", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog\u0026qid=1ce0280dd79176d32c26f34906d1d4de" }, { "title": "IBM: IBM Security Bulletin: Multiple vulnerabilities in Node.js affect IBM Cloud App Management", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog\u0026qid=b76ff63209def4a949aa18bdf6b518b8" }, { "title": "Red Hat: Important: Red Hat build of Thorntail 2.5.1 security and bug fix update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20202067 - Security Advisory" }, { "title": "Fortinet Security Advisories: HTTP/2 Multiple DoS Attacks (VU#605641)", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=fortinet_security_advisories\u0026qid=FG-IR-19-225" }, { "title": "metarget", "trust": 0.1, "url": "https://github.com/brant-ruan/metarget " }, { "title": "Symantec Threat Intelligence Blog", "trust": 0.1, "url": "https://www.symantec.com/blogs/threat-intelligence/microsoft-patch-tuesday-august-2019" }, { "title": "BleepingComputer", "trust": 0.1, "url": "https://www.bleepingcomputer.com/news/security/severe-flaws-in-kubernetes-expose-all-servers-to-dos-attacks/" }, { "title": "Threatpost", "trust": 0.1, "url": "https://threatpost.com/http-bugs/147405/" } ], "sources": [ { "db": "VULMON", "id": "CVE-2019-9514" }, { "db": "CNNVD", "id": "CNNVD-201908-931" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-400", "trust": 1.1 }, { "problemtype": "CWE-770", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-160949" }, { "db": "NVD", "id": "CVE-2019-9514" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.0, "url": "https://www.debian.org/security/2019/dsa-4503" }, { "trust": 2.6, "url": "https://github.com/netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "trust": 2.6, "url": "https://www.synology.com/security/advisory/synology_sa_19_33" }, { "trust": 2.5, "url": "https://access.redhat.com/errata/rhsa-2019:4273" }, { "trust": 2.4, "url": "https://access.redhat.com/errata/rhsa-2019:3892" }, { "trust": 2.4, "url": "https://access.redhat.com/errata/rhsa-2019:4018" }, { "trust": 2.4, "url": "https://access.redhat.com/errata/rhsa-2019:4019" }, { "trust": 2.4, "url": "https://access.redhat.com/errata/rhsa-2019:4020" }, { "trust": 2.4, "url": "https://access.redhat.com/errata/rhsa-2019:4021" }, { "trust": 2.4, "url": "https://access.redhat.com/errata/rhsa-2019:4040" }, { "trust": 2.4, "url": "https://access.redhat.com/errata/rhsa-2019:4041" }, { "trust": 2.4, "url": "https://access.redhat.com/errata/rhsa-2019:4042" }, { "trust": 2.4, "url": "https://access.redhat.com/errata/rhsa-2019:4045" }, { "trust": 2.4, "url": "https://access.redhat.com/errata/rhsa-2019:4269" }, { "trust": 2.4, "url": "https://access.redhat.com/errata/rhsa-2019:4352" }, { "trust": 1.9, "url": "https://access.redhat.com/errata/rhsa-2019:2726" }, { "trust": 1.9, "url": "https://access.redhat.com/errata/rhsa-2019:2766" }, { "trust": 1.9, "url": "https://access.redhat.com/errata/rhsa-2019:2925" }, { "trust": 1.9, "url": "https://access.redhat.com/errata/rhsa-2019:3265" }, { "trust": 1.9, "url": "https://usn.ubuntu.com/4308-1/" }, { "trust": 1.8, "url": "https://seclists.org/bugtraq/2019/aug/24" }, { "trust": 1.8, "url": "https://seclists.org/bugtraq/2019/aug/31" }, { "trust": 1.8, "url": "https://seclists.org/bugtraq/2019/aug/43" }, { "trust": 1.8, "url": "https://seclists.org/bugtraq/2019/sep/18" }, { "trust": 1.8, "url": "https://kb.cert.org/vuls/id/605641/" }, { "trust": 1.8, "url": "https://security.netapp.com/advisory/ntap-20190823-0001/" }, { "trust": 1.8, "url": "https://security.netapp.com/advisory/ntap-20190823-0004/" }, { "trust": 1.8, "url": "https://security.netapp.com/advisory/ntap-20190823-0005/" }, { "trust": 1.8, "url": "https://support.f5.com/csp/article/k01988340" }, { "trust": 1.8, "url": "https://www.debian.org/security/2019/dsa-4508" }, { "trust": 1.8, "url": "https://www.debian.org/security/2019/dsa-4520" }, { "trust": 1.8, "url": "https://www.debian.org/security/2020/dsa-4669" }, { "trust": 1.8, "url": "http://seclists.org/fulldisclosure/2019/aug/16" }, { "trust": 1.8, "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00011.html" }, { "trust": 1.8, "url": "http://www.openwall.com/lists/oss-security/2019/08/20/1" }, { "trust": 1.8, "url": "https://access.redhat.com/errata/rhsa-2019:2594" }, { "trust": 1.8, "url": "https://access.redhat.com/errata/rhsa-2019:2661" }, { "trust": 1.8, "url": "https://access.redhat.com/errata/rhsa-2019:2682" }, { "trust": 1.8, "url": "https://access.redhat.com/errata/rhsa-2019:2690" }, { "trust": 1.8, "url": "https://access.redhat.com/errata/rhsa-2019:2769" }, { "trust": 1.8, "url": "https://access.redhat.com/errata/rhsa-2019:2796" }, { "trust": 1.8, "url": "https://access.redhat.com/errata/rhsa-2019:2861" }, { "trust": 1.8, "url": "https://access.redhat.com/errata/rhsa-2019:2939" }, { "trust": 1.8, "url": "https://access.redhat.com/errata/rhsa-2019:2955" }, { "trust": 1.8, "url": "https://access.redhat.com/errata/rhsa-2019:2966" }, { "trust": 1.8, "url": "https://access.redhat.com/errata/rhsa-2019:3131" }, { "trust": 1.8, "url": "https://access.redhat.com/errata/rhsa-2019:3245" }, { "trust": 1.8, "url": "https://access.redhat.com/errata/rhsa-2019:3906" }, { "trust": 1.8, "url": "https://access.redhat.com/errata/rhsa-2020:0406" }, { "trust": 1.8, "url": "https://access.redhat.com/errata/rhsa-2020:0727" }, { "trust": 1.8, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00076.html" }, { "trust": 1.8, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00002.html" }, { "trust": 1.8, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00011.html" }, { "trust": 1.8, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00021.html" }, { "trust": 1.8, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html" }, { "trust": 1.8, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html" }, { "trust": 1.8, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00038.html" }, { "trust": 1.7, "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=sb10296" }, { "trust": 1.6, "url": "https://blogs.akamai.com/sitr/2019/08/http2-vulnerabilities.html" }, { "trust": 1.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-9514" }, { "trust": 1.0, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4zqghe3wtylyayjeidjvf2figqtaypmc/" }, { "trust": 1.0, "url": "https://support.f5.com/csp/article/k01988340?utm_source=f5support\u0026amp%3butm_medium=rss" }, { "trust": 1.0, "url": "https://lists.apache.org/thread.html/ad3d01e767199c1aed8033bb6b3f5bf98c011c7c536f07a5d34b3c19%40%3cannounce.trafficserver.apache.org%3e" }, { "trust": 1.0, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4bbp27pzgsy6op6d26e5fw4gzkbfhnu7/" }, { "trust": 1.0, "url": "http://www.openwall.com/lists/oss-security/2023/10/18/8" }, { "trust": 1.0, "url": "https://lists.apache.org/thread.html/392108390cef48af647a2e47b7fd5380e050e35ae8d1aa2030254c04%40%3cusers.trafficserver.apache.org%3e" }, { "trust": 1.0, "url": "https://lists.apache.org/thread.html/bde52309316ae798186d783a5e29f4ad1527f61c9219a289d0eee0a7%40%3cdev.trafficserver.apache.org%3e" }, { "trust": 1.0, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/cmnfx5mnyrwwimo4btkyqcgudmho3axp/" }, { "trust": 1.0, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/lyo6e3h34c346d2e443glxk7ok6kiyiq/" }, { "trust": 0.9, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-9512" }, { "trust": 0.8, "url": "https://vuls.cert.org/confluence/pages/viewpage.action?pageid=56393752" }, { "trust": 0.8, "url": "https://tools.ietf.org/html/rfc7540" }, { "trust": 0.8, "url": "https://tools.ietf.org/html/rfc7541" }, { "trust": 0.8, "url": "https://blog.cloudflare.com/on-the-recent-http-2-dos-attacks/" }, { "trust": 0.8, "url": "https://blog.litespeedtech.com/2019/08/15/litespeed-addresses-http-2-dos-advisories/" }, { "trust": 0.8, "url": "https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2019-9511https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2019-9512https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2019-9513https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2019-9514https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2019-9518" }, { "trust": 0.8, "url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/lyo6e3h34c346d2e443glxk7ok6kiyiq/" }, { "trust": 0.8, "url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/cmnfx5mnyrwwimo4btkyqcgudmho3axp/" }, { "trust": 0.8, "url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/4bbp27pzgsy6op6d26e5fw4gzkbfhnu7/" }, { "trust": 0.8, "url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/4zqghe3wtylyayjeidjvf2figqtaypmc/" }, { "trust": 0.8, "url": "https://lists.apache.org/thread.html/ad3d01e767199c1aed8033bb6b3f5bf98c011c7c536f07a5d34b3c19@%3cannounce.trafficserver.apache.org%3e" }, { "trust": 0.8, "url": "https://lists.apache.org/thread.html/bde52309316ae798186d783a5e29f4ad1527f61c9219a289d0eee0a7@%3cdev.trafficserver.apache.org%3e" }, { "trust": 0.8, "url": "https://lists.apache.org/thread.html/392108390cef48af647a2e47b7fd5380e050e35ae8d1aa2030254c04@%3cusers.trafficserver.apache.org%3e" }, { "trust": 0.7, "url": "https://support.f5.com/csp/article/k01988340?utm_source=f5support\u0026utm_medium=rss" }, { "trust": 0.7, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-9515" }, { "trust": 0.7, "url": "https://access.redhat.com/security/cve/cve-2019-9512" }, { "trust": 0.7, "url": "https://access.redhat.com/security/updates/classification/#important" }, { "trust": 0.7, "url": "https://access.redhat.com/security/cve/cve-2019-9514" }, { "trust": 0.7, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.7, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.7, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.6, "url": "http2-cves/" }, { "trust": 0.6, "url": "https://www.cloudfoundry.org/blog/various-" }, { "trust": 0.6, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-9518" }, { "trust": 0.6, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-9517" }, { "trust": 0.6, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-9516" }, { "trust": 0.6, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-9515" }, { "trust": 0.6, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-9514" }, { "trust": 0.6, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-9513" }, { "trust": 0.6, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-9512" }, { "trust": 0.6, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-9511" }, { "trust": 0.6, "url": "https://support.apple.com/en-au/ht210436" }, { "trust": 0.6, "url": "https://support.f5.com/csp/article/k50233772" }, { "trust": 0.6, "url": "https://www.ibm.com/support/pages/node/1126605" }, { "trust": 0.6, "url": "https://www.suse.com/support/update/announcement/2019/suse-su-201914246-1.html" }, { "trust": 0.6, "url": "https://www.ibm.com/support/pages/node/1104951" }, { "trust": 0.6, "url": "https://access.redhat.com/errata/rhsa-2019:3905" }, { "trust": 0.6, "url": "https://www.us-cert.gov/ics/advisories/icsa-19-346-01" }, { "trust": 0.6, "url": "https://www.ibm.com/support/pages/node/1109787" }, { "trust": 0.6, "url": "https://www.ibm.com/support/pages/node/1109781" }, { "trust": 0.6, "url": "https://www.ibm.com/support/pages/node/1108515" }, { "trust": 0.6, "url": "https://www.ibm.com/support/pages/node/1109775" }, { "trust": 0.6, "url": "https://www.ibm.com/support/pages/node/1165894" }, { "trust": 0.6, "url": "https://www.ibm.com/support/pages/node/1165906" }, { "trust": 0.6, "url": "https://www.ibm.com/support/pages/node/1135167" }, { "trust": 0.6, "url": "https://www.ibm.com/support/pages/node/1164346" }, { "trust": 0.6, "url": "https://www.ibm.com/support/pages/node/1164364" }, { "trust": 0.6, "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20200059-1.html" }, { "trust": 0.6, "url": "https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-in-dependent-libraries-affect-ibm-db2-leading-to-denial-of-service-or-privilege-escalation/" }, { "trust": 0.6, "url": "https://www.ibm.com/support/pages/node/1128387" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/157214/red-hat-security-advisory-2020-1445-01.html" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.4368/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.4788/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.4586/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.0994/" }, { "trust": 0.6, "url": "https://www.ibm.com/blogs/psirt/security-bulletin-vulnerabilities-in-node-js-affect-ibm-spectrum-protect-plus-cve-2019-15606-cve-2019-15604-cve-2019-15605-cve-2019-9511-cve-2019-9516-cve-2019-9512-cve-2019-9517-cve-2019-951/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.4332/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.0643/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.4484/" }, { "trust": 0.6, "url": "https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-have-been-identified-in-db2-that-affect-the-ibm-performance-management-product/" }, { "trust": 0.6, "url": "http2-implementation-vulnerablility/" }, { "trust": 0.6, "url": "https://www.ibm.com/blogs/psirt/security-bulletin-websphere-liberty-susceptible-to-" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/155728/red-hat-security-advisory-2019-4352-01.html" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.2619/" }, { "trust": 0.6, "url": "https://portal.msrc.microsoft.com/zh-cn/security-guidance/advisory/cve-2019-9514" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.3114/" }, { "trust": 0.6, "url": "https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-in-kubernetes-affect-ibm-infosphere-information-server/" }, { "trust": 0.6, "url": "https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-in-ibm-websphere-application-server-liberty-affect-ibm-spectrum-protect-operations-center-and-client-management-service/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.1335/" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/157741/red-hat-security-advisory-2020-2067-01.html" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/156209/red-hat-security-advisory-2020-0406-01.html" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.3597.3/" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/158095/red-hat-security-advisory-2020-2565-01.html" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.4737/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.0832/" }, { "trust": 0.6, "url": "https://www.ibm.com/support/pages/node/1137466" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/http-2-multiple-vulnerabilities-30040" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/155484/red-hat-security-advisory-2019-4019-01.html" }, { "trust": 0.6, "url": "https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-in-netty-affect-ibm-operations-analytics-predictive-insights-cve-2019-9514-cve-2019-9512-cve-2019-9518-cve-2019-9515/" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/43921" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.1076/" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/156628/red-hat-security-advisory-2020-0727-01.html" }, { "trust": 0.6, "url": "https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-in-dependent-libraries-affect-ibm-db2-leading-to-denial-of-service-or-privilege-escalation-3/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.1544/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.2071/" }, { "trust": 0.6, "url": "https://www.ibm.com/support/pages/node/1127397" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.1427/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.4645/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.3597.2/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.4665/" }, { "trust": 0.6, "url": "https://www.ibm.com/blogs/psirt/security-bulletin-ibm-watson-discovery-for-ibm-cloud-pak-for-data-affected-by-vulnerability-in-netty/" }, { "trust": 0.6, "url": "https://www.ibm.com/blogs/psirt/security-bulletin-vulnerabilities-in-netty-affect-ibm-netcool-agile-service-manager/" }, { "trust": 0.6, "url": "https://pivotal.io/security/cve-2019-9517" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.4697/" }, { "trust": 0.6, "url": "https://www.ibm.com/blogs/psirt/security-bulletin-ibm-db2-warehouse-has-released-a-fix-in-response-to-multiple-vulnerabilities-found-in-ibm-db2/" }, { "trust": 0.6, "url": "https://www.ibm.com/blogs/psirt/security-bulletin-ibm-cloud-transformation-advisor-is-affected-by-vulnerabilities-in-websphere-application-server-liberty-cve-2019-9515-cve-2019-9518-cve-2019-9517-cve-2019-9512-cve-2019-9514-c/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.4596/" }, { "trust": 0.6, "url": "https://support.apple.com/en-us/ht210436" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/155520/red-hat-security-advisory-2019-4045-01.html" }, { "trust": 0.6, "url": "https://www.ibm.com/blogs/psirt/security-bulletin-multiple-security-vulnerabilities-in-ibm-websphere-application-server-affect-ibm-sterling-b2b-integrator/" }, { "trust": 0.6, "url": "https://www.ibm.com/support/pages/node/1128279" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/156852/red-hat-security-advisory-2020-0922-01.html" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/156941/red-hat-security-advisory-2020-0983-01.html" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.1766/" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/154135/debian-security-advisory-4503-1.html" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022072128" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.3152/" }, { "trust": 0.6, "url": "https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-in-dependent-libraries-affect-ibm-db2-leading-to-denial-of-service-or-privilege-escalation-2/" }, { "trust": 0.6, "url": "https://www.ibm.com/blogs/psirt/security-bulletin-ibm-infosphere-information-server-is-affected-by-multiple-vulnerabilities-in-websphere-application-server-liberty/" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/158651/red-hat-security-advisory-2020-3197-01.html" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.4324/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.4533/" }, { "trust": 0.6, "url": "https://www.ibm.com/support/pages/node/1150960" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/155396/red-hat-security-advisory-2019-3906-01.html" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.0100/" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/155705/red-hat-security-advisory-2019-4273-01.html" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.0007/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.4238/" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/155352/red-hat-security-advisory-2019-3892-01.html" }, { "trust": 0.6, "url": "https://www.ibm.com/support/pages/node/1165852" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.1030/" }, { "trust": 0.6, "url": "https://www.ibm.com/support/pages/node/1127853" }, { "trust": 0.6, "url": "https://www.ibm.com/support/pages/node/1168528" }, { "trust": 0.5, "url": "https://access.redhat.com/security/cve/cve-2019-9515" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-9518" }, { "trust": 0.4, "url": "https://access.redhat.com/security/cve/cve-2019-9518" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-9511" }, { "trust": 0.3, "url": "https://www.debian.org/security/faq" }, { "trust": 0.3, "url": "https://www.debian.org/security/" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-20444" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2019-20445" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2019-20444" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2019-16869" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2020-7238" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-16869" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-20445" }, { "trust": 0.3, "url": "https://access.redhat.com/security/team/key/" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-9513" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-14060" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-11112" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-12406" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-9547" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-11113" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-10968" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2019-17573" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-1718" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-9546" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-14060" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2019-13990" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-11620" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-10672" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2019-12406" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-17573" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-11612" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-20330" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-14061" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-11619" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-10673" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-1718" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-9548" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-13990" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-14062" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-8840" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-10672" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-10969" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-11619" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-11620" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-7238" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-11111" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2019-20330" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2019-12423" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-11112" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-11612" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-12423" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-10968" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-11111" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-10969" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-14061" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-11113" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-14062" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-10673" }, { "trust": 0.2, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.2, "url": "https://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-rel" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2019-9511" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-9517" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2019-9517" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2019-9516" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-9516" }, { "trust": 0.1, "url": "https://kc.mcafee.com/corporate/index?page=content\u0026amp;id=sb10296" }, { "trust": 0.1, "url": "https://support.f5.com/csp/article/k01988340?utm_source=f5support\u0026amp;amp;utm_medium=rss" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/770.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://www.kb.cert.org/vuls/id/605641" }, { "trust": 0.1, "url": "https://security-tracker.debian.org/tracker/nodejs" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-15606" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-15604" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-15605" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2020:3196" }, { "trust": 0.1, "url": "https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?downloadtype=distributions\u0026product=rhdm\u0026version=7.8.0" }, { "trust": 0.1, "url": "https://access.redhat.com/documentation/en-us/red_hat_decision_manager/7.8/html/release_notes_for_red_hat_decision_manager_7.8/index" }, { "trust": 0.1, "url": "https://access.redhat.com/documentation/en-us/red_hat_process_automation_manager/7.8/html/release_notes_for_red_hat_process_automation_manager_7.8/index" }, { "trust": 0.1, "url": "https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?downloadtype=distributions\u0026product=rhpam\u0026version=7.8.0" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2020:3197" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-10086" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-10086" }, { "trust": 0.1, "url": "https://security-tracker.debian.org/tracker/h2o" }, { "trust": 0.1, "url": "https://security-tracker.debian.org/tracker/trafficserver" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-0222" }, { "trust": 0.1, "url": "https://access.redhat.com/documentation/en-us/red_hat_amq/7.6/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-10247" }, { "trust": 0.1, "url": "https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?downloadtype=distributions\u0026product=jboss.amq.broker\u0026version=7.6.0\u0026productchanged=yes" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0222" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2020:0922" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-10241" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-10247" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-10241" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-9513" } ], "sources": [ { "db": "CERT/CC", "id": "VU#605641" }, { "db": "VULHUB", "id": "VHN-160949" }, { "db": "VULMON", "id": "CVE-2019-9514" }, { "db": "PACKETSTORM", "id": "168812" }, { "db": "PACKETSTORM", "id": "158650" }, { "db": "PACKETSTORM", "id": "154425" }, { "db": "PACKETSTORM", "id": "155037" }, { "db": "PACKETSTORM", "id": "158651" }, { "db": "PACKETSTORM", "id": "154222" }, { "db": "PACKETSTORM", "id": "154430" }, { "db": "PACKETSTORM", "id": "154475" }, { "db": "PACKETSTORM", "id": "156852" }, { "db": "PACKETSTORM", "id": "154663" }, { "db": "CNNVD", "id": "CNNVD-201908-931" }, { "db": "NVD", "id": "CVE-2019-9514" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#605641" }, { "db": "VULHUB", "id": "VHN-160949" }, { "db": "VULMON", "id": "CVE-2019-9514" }, { "db": "PACKETSTORM", "id": "168812" }, { "db": "PACKETSTORM", "id": "158650" }, { "db": "PACKETSTORM", "id": "154425" }, { "db": "PACKETSTORM", "id": "155037" }, { "db": "PACKETSTORM", "id": "158651" }, { "db": "PACKETSTORM", "id": "154222" }, { "db": "PACKETSTORM", "id": "154430" }, { "db": "PACKETSTORM", "id": "154475" }, { "db": "PACKETSTORM", "id": "156852" }, { "db": "PACKETSTORM", "id": "154663" }, { "db": "CNNVD", "id": "CNNVD-201908-931" }, { "db": "NVD", "id": "CVE-2019-9514" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-08-13T00:00:00", "db": "CERT/CC", "id": "VU#605641" }, { "date": "2019-08-13T00:00:00", "db": "VULHUB", "id": "VHN-160949" }, { "date": "2019-08-13T00:00:00", "db": "VULMON", "id": "CVE-2019-9514" }, { "date": "2020-04-28T19:12:00", "db": "PACKETSTORM", "id": "168812" }, { "date": "2020-07-29T17:52:58", "db": "PACKETSTORM", "id": "158650" }, { "date": "2019-09-10T23:10:30", "db": "PACKETSTORM", "id": "154425" }, { "date": "2019-10-31T14:23:11", "db": "PACKETSTORM", "id": "155037" }, { "date": "2020-07-29T17:53:05", "db": "PACKETSTORM", "id": "158651" }, { "date": "2019-08-26T16:13:10", "db": "PACKETSTORM", "id": "154222" }, { "date": "2019-09-10T23:12:17", "db": "PACKETSTORM", "id": "154430" }, { "date": "2019-09-12T20:40:57", "db": "PACKETSTORM", "id": "154475" }, { "date": "2020-03-23T15:57:42", "db": "PACKETSTORM", "id": "156852" }, { "date": "2019-09-30T13:33:33", "db": "PACKETSTORM", "id": "154663" }, { "date": "2019-08-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201908-931" }, { "date": "2019-08-13T21:15:12.443000", "db": "NVD", "id": "CVE-2019-9514" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-11-19T00:00:00", "db": "CERT/CC", "id": "VU#605641" }, { "date": "2020-10-22T00:00:00", "db": "VULHUB", "id": "VHN-160949" }, { "date": "2020-12-09T00:00:00", "db": "VULMON", "id": "CVE-2019-9514" }, { "date": "2022-07-22T00:00:00", "db": "CNNVD", "id": "CNNVD-201908-931" }, { "date": "2024-11-21T04:51:46.663000", "db": "NVD", "id": "CVE-2019-9514" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201908-931" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HTTP/2 implementations do not robustly handle abnormal traffic and resource exhaustion", "sources": [ { "db": "CERT/CC", "id": "VU#605641" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201908-931" } ], "trust": 0.6 } }
fkie_cve-2019-9514
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apple:swiftnio:*:*:*:*:*:*:*:*", "matchCriteriaId": "93988E60-006B-434D-AB16-1FA1D2FEBC2A", "versionEndIncluding": "1.4.0", "versionStartIncluding": "1.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "1D294D56-E784-4DA8-9C2C-BC5A05C92C0C", "versionStartIncluding": "10.12", "vulnerable": false }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:*:*:*:*:*:*:*:*", "matchCriteriaId": "65B1D2F6-BC1F-47AF-B4E6-4B50986AC622", "versionStartIncluding": "14.04", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "603BF43B-FC99-4039-A3C0-467F015A32FA", "versionEndIncluding": "6.2.3", "versionStartIncluding": "6.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "07BB02CE-D4F2-459C-B0C6-FF78BF7996AE", "versionEndIncluding": "7.1.6", "versionStartIncluding": "7.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "D875E0D8-D109-4F7F-A4C4-9EDD66CEE74E", "versionEndIncluding": "8.0.3", "versionStartIncluding": "8.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", "matchCriteriaId": "CD783B0C-9246-47D9-A937-6144FE8BFF0F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:synology:skynas:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C997777-BE79-4F77-90D7-E1A71D474D88", "vulnerable": true }, { "criteria": "cpe:2.3:o:synology:diskstation_manager:6.2:*:*:*:*:*:*:*", "matchCriteriaId": "D9685B12-824F-42AD-B87C-6E7A78BB7FA5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:synology:vs960hd_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D0C5120-B961-440F-B454-584BC54B549C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:synology:vs960hd:-:*:*:*:*:*:*:*", "matchCriteriaId": "1CCBDFF9-AF42-4681-879B-CF789EBAD130", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*", "matchCriteriaId": "D100F7CE-FC64-4CC6-852A-6136D72DA419", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "matchCriteriaId": "97A4B8DF-58DA-4AB6-A1F9-331B36409BA3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "matchCriteriaId": "F1E78106-58E6-4D59-990F-75DA575BFAD9", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:developer_tools:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "60937D60-6B78-400F-8D30-7FCF328659A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:jboss_core_services:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "A2466282-51AB-478D-9FF4-FA524265ED2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "0952BA1A-5DF9-400F-B01F-C3A398A8A2D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "8B157A2D-3422-4224-82D9-15AB3B989075", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:openshift_container_platform:3.9:*:*:*:*:*:*:*", "matchCriteriaId": "309CB6F8-F178-454C-BE97-787F78647C28", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:openshift_container_platform:3.10:*:*:*:*:*:*:*", "matchCriteriaId": "4DBCD38F-BBE8-488C-A8C3-5782F191D915", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*", "matchCriteriaId": "2F87326E-0B56-4356-A889-73D026DB1D4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:openshift_container_platform:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "064E7BDD-4EF0-4A0D-A38D-8C75BAFEDCEF", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:openshift_container_platform:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "4C85A84D-A70F-4B02-9E5D-CD9660ABF048", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:openshift_service_mesh:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "732F14CE-7994-4DD2-A28B-AE9E79826C01", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:openstack:14:*:*:*:*:*:*:*", "matchCriteriaId": "EB7F358B-5E56-41AB-BB8A-23D3CB7A248B", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1987BDA-0113-4603-B9BE-76647EB043F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:single_sign-on:7.3:*:*:*:*:*:*:*", "matchCriteriaId": "E939A0E0-3437-459E-9FAB-FE42811B1D32", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "9D7EE4B6-A6EC-4B9B-91DF-79615796673F", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "92BC9265-6959-4D37-BE5E-8C45E98992F8", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "825ECE2D-E232-46E0-A047-074B34DB1E97", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:graalvm:19.2.0:*:*:*:enterprise:*:*:*", "matchCriteriaId": "C120C2F1-D50D-49CC-8E96-207ACCA49674", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "765E9856-2748-4A8B-91F5-A4DB3C8C547A", "versionEndExcluding": "7.7.2.24", "versionStartIncluding": "7.7.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "EE6E66B1-3291-4E8E-93D6-30E9FDCF983E", "versionEndExcluding": "7.8.2.13", "versionStartIncluding": "7.8.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "227104AD-396D-4ADD-87C7-C4CD5583DA04", "versionEndExcluding": "8.2.0", "versionStartIncluding": "8.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:cloud_insights:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FCA75B-4282-4E0F-95B4-640A82C8E91C", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:trident:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D9A34F5-AC03-4098-A37D-AD50727DDB11", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "99C12BA5-2D81-4973-824E-2BDDA70F2485", "versionEndExcluding": "11.6.5.1", "versionStartIncluding": "11.6.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "591EA641-C103-4575-97D5-15D41B20E581", "versionEndExcluding": "12.1.5.1", "versionStartIncluding": "12.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "A3F3F4FD-8BB9-468D-B50F-B25B17AF0F3A", "versionEndExcluding": "13.1.3.2", "versionStartIncluding": "13.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "63529AEA-8B74-4CA1-BADF-14514D243DC5", "versionEndExcluding": "14.0.1.1", "versionStartIncluding": "14.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "A4D87CCF-ED81-4B69-9D02-D5B79082E0FF", "versionEndExcluding": "14.1.2.1", "versionStartIncluding": "14.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "5485F6ED-F324-4124-9116-79E70909C5F7", "versionEndExcluding": "15.0.1.1", "versionStartIncluding": "15.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*", "matchCriteriaId": "74FB695D-2C76-47AB-988E-5629D2E695E5", "versionEndIncluding": "8.8.1", "versionStartIncluding": "8.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*", "matchCriteriaId": "CFC0252A-DF1D-4CF4-B450-27267227B599", "versionEndExcluding": "8.16.1", "versionStartIncluding": "8.9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*", "matchCriteriaId": "25A3180B-21AF-4010-9DAB-41ADFD2D8031", "versionEndIncluding": "10.12.0", "versionStartIncluding": "10.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*", "matchCriteriaId": "2EC65858-FF7B-4171-82EA-80942D426F40", "versionEndExcluding": "10.16.3", "versionStartIncluding": "10.13.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*", "matchCriteriaId": "F522C500-AA33-4029-865F-F27FB00A354E", "versionEndExcluding": "12.8.1", "versionStartIncluding": "12.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both." }, { "lang": "es", "value": "Algunas implementaciones de HTTP / 2 son vulnerables a una inundaci\u00f3n de reinicio, lo que puede conducir a una denegaci\u00f3n de servicio. El atacante abre una serie de secuencias y env\u00eda una solicitud no v\u00e1lida sobre cada secuencia que deber\u00eda solicitar una secuencia de tramas RST_STREAM del par. Dependiendo de c\u00f3mo el igual pone en cola las tramas RST_STREAM, esto puede consumir un exceso de memoria, CPU o ambos." } ], "id": "CVE-2019-9514", "lastModified": "2025-01-14T19:29:55.853", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "[email protected]", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "[email protected]", "type": "Primary" } ] }, "published": "2019-08-13T21:15:12.443", "references": [ { "source": "[email protected]", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00076.html" }, { "source": "[email protected]", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00002.html" }, { "source": "[email protected]", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00011.html" }, { "source": "[email protected]", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00021.html" }, { "source": "[email protected]", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html" }, { "source": "[email protected]", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html" }, { "source": "[email protected]", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00038.html" }, { "source": "[email protected]", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2019/Aug/16" }, { "source": "[email protected]", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2019/08/20/1" }, { "source": "[email protected]", "url": "http://www.openwall.com/lists/oss-security/2023/10/18/8" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2594" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2661" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2682" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2690" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2726" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2766" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2769" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2796" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2861" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2925" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2939" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2955" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2966" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3131" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3245" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3265" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3892" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3906" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:4018" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:4019" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:4020" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:4021" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:4040" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:4041" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:4042" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:4045" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:4269" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:4273" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:4352" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0406" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0727" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "source": "[email protected]", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://kb.cert.org/vuls/id/605641/" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10296" }, { "source": "[email protected]", "url": "https://lists.apache.org/thread.html/392108390cef48af647a2e47b7fd5380e050e35ae8d1aa2030254c04%40%3Cusers.trafficserver.apache.org%3E" }, { "source": "[email protected]", "url": "https://lists.apache.org/thread.html/ad3d01e767199c1aed8033bb6b3f5bf98c011c7c536f07a5d34b3c19%40%3Cannounce.trafficserver.apache.org%3E" }, { "source": "[email protected]", "url": "https://lists.apache.org/thread.html/bde52309316ae798186d783a5e29f4ad1527f61c9219a289d0eee0a7%40%3Cdev.trafficserver.apache.org%3E" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00011.html" }, { "source": "[email protected]", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4BBP27PZGSY6OP6D26E5FW4GZKBFHNU7/" }, { "source": "[email protected]", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC/" }, { "source": "[email protected]", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP/" }, { "source": "[email protected]", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LYO6E3H34C346D2E443GLXK7OK6KIYIQ/" }, { "source": "[email protected]", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/bugtraq/2019/Aug/24" }, { "source": "[email protected]", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/bugtraq/2019/Aug/31" }, { "source": "[email protected]", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/bugtraq/2019/Aug/43" }, { "source": "[email protected]", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/bugtraq/2019/Sep/18" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20190823-0001/" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20190823-0004/" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20190823-0005/" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://support.f5.com/csp/article/K01988340" }, { "source": "[email protected]", "url": "https://support.f5.com/csp/article/K01988340?utm_source=f5support\u0026amp%3Butm_medium=RSS" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4308-1/" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2019/dsa-4503" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2019/dsa-4508" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2019/dsa-4520" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2020/dsa-4669" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://www.synology.com/security/advisory/Synology_SA_19_33" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00076.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00002.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00011.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00038.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2019/Aug/16" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2019/08/20/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2023/10/18/8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2594" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2661" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2682" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2690" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2726" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2766" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2769" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2796" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2861" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2925" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2939" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2955" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2966" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3131" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3245" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3265" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3892" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3906" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:4018" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:4019" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:4020" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:4021" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:4040" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:4041" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:4042" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:4045" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:4269" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:4273" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:4352" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0406" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0727" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://kb.cert.org/vuls/id/605641/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10296" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/392108390cef48af647a2e47b7fd5380e050e35ae8d1aa2030254c04%40%3Cusers.trafficserver.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/ad3d01e767199c1aed8033bb6b3f5bf98c011c7c536f07a5d34b3c19%40%3Cannounce.trafficserver.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/bde52309316ae798186d783a5e29f4ad1527f61c9219a289d0eee0a7%40%3Cdev.trafficserver.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00011.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4BBP27PZGSY6OP6D26E5FW4GZKBFHNU7/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LYO6E3H34C346D2E443GLXK7OK6KIYIQ/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/bugtraq/2019/Aug/24" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/bugtraq/2019/Aug/31" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/bugtraq/2019/Aug/43" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/bugtraq/2019/Sep/18" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20190823-0001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20190823-0004/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20190823-0005/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.f5.com/csp/article/K01988340" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.f5.com/csp/article/K01988340?utm_source=f5support\u0026amp%3Butm_medium=RSS" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4308-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2019/dsa-4503" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2019/dsa-4508" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2019/dsa-4520" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2020/dsa-4669" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.synology.com/security/advisory/Synology_SA_19_33" } ], "sourceIdentifier": "[email protected]", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-400" } ], "source": "[email protected]", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-770" } ], "source": "[email protected]", "type": "Primary" } ] }
ghsa-39qc-96h7-956f
Vulnerability from github
Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. Servers that accept direct connections from untrusted clients could be remotely made to allocate an unlimited amount of memory, until the program crashes. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.
Specific Go Packages Affected
golang.org/x/net/http2
{ "affected": [ { "package": { "ecosystem": "Go", "name": "golang.org/x/net" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "0.0.0-20190813141303-74dc4d7220e7" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2019-9514" ], "database_specific": { "cwe_ids": [ "CWE-400", "CWE-770" ], "github_reviewed": true, "github_reviewed_at": "2023-02-08T00:30:39Z", "nvd_published_at": "2019-08-13T21:15:00Z", "severity": "HIGH" }, "details": "Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. Servers that accept direct connections from untrusted clients could be remotely made to allocate an unlimited amount of memory, until the program crashes. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.\n\n### Specific Go Packages Affected\ngolang.org/x/net/http2", "id": "GHSA-39qc-96h7-956f", "modified": "2024-05-20T21:30:41Z", "published": "2022-05-24T16:53:19Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:2594" }, { "type": "WEB", "url": "https://go.dev/cl/190137" }, { "type": "WEB", "url": "https://go.dev/issue/33606" }, { "type": "WEB", "url": "https://go.googlesource.com/go/+/145e193131eb486077b66009beb051aba07c52a5" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/65QixT3tcmg/m/DrFiG6vvCwAJ" }, { "type": "WEB", "url": "https://kb.cert.org/vuls/id/605641" }, { "type": "WEB", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10296" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/392108390cef48af647a2e47b7fd5380e050e35ae8d1aa2030254c04@%3Cusers.trafficserver.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/ad3d01e767199c1aed8033bb6b3f5bf98c011c7c536f07a5d34b3c19@%3Cannounce.trafficserver.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/bde52309316ae798186d783a5e29f4ad1527f61c9219a289d0eee0a7@%3Cdev.trafficserver.apache.org%3E" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00011.html" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/4BBP27PZGSY6OP6D26E5FW4GZKBFHNU7" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/LYO6E3H34C346D2E443GLXK7OK6KIYIQ" }, { "type": "WEB", "url": "https://pkg.go.dev/vuln/GO-2022-0536" }, { "type": "WEB", "url": "https://seclists.org/bugtraq/2019/Aug/24" }, { "type": "WEB", "url": "https://seclists.org/bugtraq/2019/Aug/31" }, { "type": "WEB", "url": "https://seclists.org/bugtraq/2019/Aug/43" }, { "type": "WEB", "url": "https://seclists.org/bugtraq/2019/Sep/18" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20190823-0001" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20190823-0004" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20190823-0005" }, { "type": "WEB", "url": "https://support.f5.com/csp/article/K01988340" }, { "type": "WEB", "url": "https://support.f5.com/csp/article/K01988340?utm_source=f5support\u0026amp;utm_medium=RSS" }, { "type": "WEB", "url": "https://usn.ubuntu.com/4308-1" }, { "type": "WEB", "url": "https://www.debian.org/security/2019/dsa-4503" }, { "type": "WEB", "url": "https://www.debian.org/security/2019/dsa-4508" }, { "type": "WEB", "url": "https://www.debian.org/security/2019/dsa-4520" }, { "type": "WEB", "url": "https://www.debian.org/security/2020/dsa-4669" }, { "type": "WEB", "url": "https://www.synology.com/security/advisory/Synology_SA_19_33" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:2661" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:2682" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:2690" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:2726" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:2766" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:2769" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:2796" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:2861" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:2925" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:2939" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:2955" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:2966" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:3131" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:3245" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:3265" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:3892" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:3906" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:4018" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:4019" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:4020" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:4021" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:4040" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:4041" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:4042" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:4045" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:4269" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:4273" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:4352" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2020:0406" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2020:0727" }, { "type": "WEB", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00076.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00002.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00011.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00021.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00038.html" }, { "type": "WEB", "url": "http://seclists.org/fulldisclosure/2019/Aug/16" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2019/08/20/1" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2023/10/18/8" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ], "summary": "golang.org/x/net/http vulnerable to a reset flood" }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.